CheckPoint Software > Case Studies > Securing Confidential Data: Michael Page International's Deployment of Check Point Data Security Products

Securing Confidential Data: Michael Page International's Deployment of Check Point Data Security Products

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Application Security
  • Platform as a Service (PaaS) - Device Management Platforms
Applicable Industries
  • Electronics
  • National Security & Defense
Use Cases
  • Cybersecurity
  • Inventory Management
Services
  • Cybersecurity Services
About The Customer
Michael Page International is a world-leading professional recruitment agency. Founded in 1976, the company has grown to employ more than 5,000 people in 166 offices across 28 countries worldwide. Michael Page sources permanent, contract temp, and interim employees for clients ranging from global multi-nationals to small and medium enterprises (SMEs). As a recruitment agency, it holds a significant amount of confidential data, making data security a top priority. The company operates a large network of PCs and laptops across its offices, which are used by directors, senior management, and IT staff.
The Challenge
Michael Page International, a leading professional recruitment agency, faced a significant challenge in securing its confidential data across office-based PCs and a fleet of 50 laptops used by directors, senior management, and IT staff. The company, with around 300 PCs in 65 offices across the UK, needed a solution that could protect against data loss or theft, and could be easily deployed and controlled across a distributed network. The need for confidentiality was paramount in their business, as their clients and applicants depended on it. The challenge was to find a solution that would not only secure the data but also operate automatically without disrupting the end user, and reduce the burden on IT support staff.
The Solution
After evaluating possible solutions, Michael Page chose Check Point Full Disk Encryption and Media Encryption products. Check Point Full Disk Encryption provides automatic real-time encryption of a PC’s entire hard drive, which can be configured to meet the customer’s needs. Pre-boot authentication increases security by requiring a username and password before the operating system loads. Check Point Media Encryption was chosen for its full control over USB ports, devices, and media drives, its centralized management, and ability to provide complete audits of device usage. It prevents unauthorized copying of sensitive data by combining port and device management, content filtering, and centralized auditing with robust media encryption. These products offer automated, industry-proven solutions that deploy quickly and easily to protect all sensitive data, and are scalable to meet the needs of any sized company.
Operational Impact
  • The deployment of Check Point's data security products has resulted in a significant improvement in data security for Michael Page. The Full Disk Encryption solution protects sensitive data on the laptops used by the company's directors, senior management, and IT personnel. The Media Encryption solution gives centralized, granular management over functions such as auditing and controlling data being copied to removable drives and storage media from office-based PCs. The solutions have been 'fit and forget' after initial set-up, giving the company complete control over these endpoints. Any changes, such as giving a member of staff permission to use a USB device, are quickly done. The successful deployment in the UK has led to plans to roll out the Check Point products to its Asia-Pacific operations, allowing for a standardized, robust approach to data security across all regions.
Quantitative Benefit
  • Secured confidential data on all laptops, PCs, and removable media against theft, data leakage, and inadvertent loss
  • Deployed on desktop PCs in 65 UK offices, and on a fleet of 50 laptops
  • Centralized deployment, administration, and management reduced burden on IT support staff

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.