CheckPoint Software > Case Studies > Optimal Media Enhances Cybersecurity and Efficiency with Check Point Infinity

Optimal Media Enhances Cybersecurity and Efficiency with Check Point Infinity

CheckPoint Software Logo
Technology Category
  • Analytics & Modeling - Real Time Analytics
  • Sensors - Level Sensors
Applicable Industries
  • National Security & Defense
  • Packaging
Applicable Functions
  • Logistics & Transportation
  • Quality Assurance
Use Cases
  • Inventory Management
  • Tamper Detection
Services
  • Cybersecurity Services
About The Customer
Optimal media GmbH is a subsidiary of Edel AG, one of Europe's leading independent media groups. The company is one of Europe’s most modern and innovative media services providers, with branches in Berlin, Hamburg, Stockholm, and London. Optimal media specializes in the production of high-quality printed materials and packaging, as well as the production of CDs, DVDs, Blu-ray discs, and records. It also operates a full-service print shop, digital distribution centers, a logistics and fulfillment center, an audio mastering studio, and an Authoring Studio. Its clientele includes well-known music labels and distributors, software companies, film studios and distributors, media and book publishers, agencies, artists, and industrial customers from Germany and worldwide.
The Challenge
Optimal media GmbH, a leading media services provider in Europe, faced significant challenges in protecting its intellectual property and preventing the loss of sensitive customer data. The company's IT department was responsible for network and IT security systems for all eight of Edel AG’s European offices. The data they received from customers for the production of CDs or records contained highly sensitive information and intellectual property that required robust protection. The International Federation of the Phonographic Industry (IFPI) audited the IT security systems at optimal media each year, and the company had always passed. However, the threat level was becoming increasingly critical, and the time required to prepare for the audits was becoming unmanageable. Their existing, outdated firewall solution was insufficient for long-term use as it could not handle unknown threats.
The Solution
Optimal media implemented Check Point Infinity architecture to achieve a new standard of security. The solution provided comprehensive protection and visibility for all network traffic, identifying and blocking all types of threats in real-time and classifying all applications and protocols. The high-performance security gateway, powered by Check Point Infinity R80.10 version, and using R80.10 security management, controlled all networks, users, applications, and data leveraging a unified security policy. The Data Loss Prevention (DLP) feature prevented sensitive information from leaving the organization from any application and protocol. Check Point’s zero-day threat prevention solution, SandBlast, prevented advanced threats and cyberattacks in real time, keeping them outside the network. The entire security was consolidated into a single platform managed by a unified, single-pane-of-glass management, providing complete protection.
Operational Impact
  • The implementation of Check Point Infinity architecture significantly improved the security level at optimal media. The SandBlast software enabled the company to better assess attack patterns that they had not been able to prevent before. With Check Point DLP, they could monitor incoming and outgoing traffic for the first time. The solution allowed them to check documents and clean them from threats while preventing the data from falling into the wrong hands. The on-premise appliance solution was the best option for the company due to their clients’ needs for high levels of security. The integrated Check Point solution increased their cybersecurity level and improved the visibility of all the processes going on in the network. The new integrated solution also brought operational efficiency for the company, saving valuable time and money in security operation and management.
Quantitative Benefit
  • Saved 4-6 hours per week in security management and security audits
  • Reduced the amount of time required to prepare all of the information for the annual security audit
  • Prevented data leakage of sensitive information and intellectual property

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.