CheckPoint Software > Case Studies > Laurenty's Journey to Unify Security and Comply with GDPR using Check Point Infinity Architecture

Laurenty's Journey to Unify Security and Comply with GDPR using Check Point Infinity Architecture

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • Glass
  • National Security & Defense
Applicable Functions
  • Quality Assurance
Use Cases
  • Inventory Management
  • Tamper Detection
Services
  • Cybersecurity Services
  • System Integration
About The Customer
Laurenty is a family group based in Belgium, with a presence in the Grand Duchy of Luxembourg and France. The company specializes in cleaning, road sweeping, building, and green spaces. With an annual turnover of more than €120 million, Laurenty serves around 5,000 clients with the help of its 4,300 employees. The company was facing challenges in unifying its security standards across networks and endpoints and needed to comply with the European General Data Protection Regulation (GDPR) laws. The company's IT security infrastructure was technically outdated and fragmented, and it needed a strong encryption solution to protect its laptops against data breaches.
The Challenge
Laurenty, a family group specializing in cleaning, road sweeping, building, and green spaces, faced a significant challenge in unifying its security standards across networks and endpoints. The company needed to comply with the European General Data Protection Regulation (GDPR) laws, which were set to come into force in 2018. In 2015, Laurenty realized that its IT security infrastructure was technically outdated and fragmented. The company was using several point products to address specific security challenges, which resulted in multiple consoles, different approaches, and no global visibility. Furthermore, the impending GDPR regulations required all European companies to demonstrate that all personal data held by them is protected, particularly against theft. Non-compliance could result in severe penalties of up to 4% of the company's annual turnover. To protect its laptops against data breaches, Laurenty needed a strong encryption solution.
The Solution
Laurenty turned to Check Point Infinity Architecture to unify its security infrastructure and achieve compliance with the highest security standards. With the help of Shinka, an IT security integrator and a recognized Check Point partner, a global solution was implemented, protecting both endpoints and network while incorporating the principles of Check Point Infinity architecture. The first priority was to protect the company’s endpoint devices against zero day and other advanced threats. Check Point SandBlast Agent was used to protect Laurenty against all kinds of unknown malware, bots, phishing, and ransomware attacks. The company also used full disk and media encryption and port protection to meet all endpoint security requirements and achieve GDPR compliance. Laurenty chose Check Point’s Complete Endpoint Protection Suite as it provided data security, network security, advanced threat prevention, forensics, and remote access VPN for complete endpoint protection in one package. The company also replaced the old gateways with the new Check Point 5600 appliances with SandBlast Next Generation Threat Prevention (NGTX) to defend the company’s network against zero-day threats.
Operational Impact
  • By choosing Check Point to protect both the endpoints and the network, Laurenty has seen the advantages of Check Point Infinity architecture, which focuses on delivering the most advanced threat prevention. The Infinity architecture breaks down security silos by ensuring comprehensive and timely intelligence across the entire infrastructure. Check Point ThreatCloud houses all threat intelligence, which is derived from a broad array of sources. The main reason Laurenty chose Check Point endpoint solution, besides the advanced threat prevention capabilities, is the fact that all the endpoint suite products can be managed by one single console. This has made the task of managing the complete endpoint suite much easier. The integration of endpoint and network security management is an additional benefit as it allows for security forensics, security analysis, and search security events from one management appliance.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.