CheckPoint Software > Case Studies > Securing Mobile Devices: A Case Study of Tech Electronics and Check Point

Securing Mobile Devices: A Case Study of Tech Electronics and Check Point

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Network Security
  • Robots - Wheeled Robots
Applicable Industries
  • Electronics
  • Telecommunications
Applicable Functions
  • Logistics & Transportation
  • Quality Assurance
Use Cases
  • Inventory Management
  • Tamper Detection
About The Customer
Tech Electronics is an IT services company with offices in St. Louis, Mo., and Columbia, Mo., but has customers in nearly all market segments, all over the country. Many of these customers deal with sensitive information on a daily basis. Because Tech Electronics employees handle much of this information remotely, it is critical for the company to assure its customers that the data is safe with them. The company sought a solution to guarantee security and centrally manage security updates across all endpoints on the network. The company's IT Manager, Michael Scott, emphasized the importance of securing every device that could potentially store or access sensitive data to protect their customers and build a reputation as a high-tech and high-security company.
The Challenge
Tech Electronics, an IT services company with a wide customer base across the country, faced a significant challenge in securing remote access to customer information. The company's employees handle sensitive data remotely, making it crucial for the company to assure its customers that their data is safe. The company sought a solution to guarantee security and centrally manage security updates across all endpoints on the network. The first challenge was securing mobile connections over the open Internet, with the idea of using a Virtual Private Network (VPN) to secure communications in transit. Another challenge was the logistics of implementing a security solution on new phones for over 200 employees, which involved taking delivery of the phones, uploading the security solution, and distributing the phones to employees in the field. Lastly, the company needed a way to manage updates centrally and automatically once the new phones were distributed.
The Solution
To address these challenges, Tech Electronics chose the Connectra and SecureClient Mobile solutions from Check Point Software. Connectra is a unified Web Security gateway that combines SSL VPN, endpoint security, and intrusion prevention in a single solution, while SecureClient Mobile provides firewall protection and secure, uninterrupted remote access for mobile devices. These solutions were implemented on an abbreviated timetable due to various issues that delayed the security evaluation process. Within four weeks, the product was securing data transmissions for nearly every phone on the network. The solution was found to be incredibly reliable, with most service problems being related to a device's data connectivity, not Check Point's ability to secure it. The company is now considering adopting other products from Check Point to secure other endpoints.
Operational Impact
  • The implementation of Check Point's Connectra and SecureClient Mobile solutions has significantly improved Tech Electronics' security across the board. With these solutions encrypting all incoming and outgoing data on each mobile device, the company was able to secure everything from sensitive customer files to random text messages about quarterly sales. The solution also provided a high degree of control, allowing all traffic and data to be routed through a secured gateway. Furthermore, the centralized management and policy control enabled by Check Point SmartCenter allowed Tech Electronics IT officials to administer updates and enforce compliance with corporate security policies every time a user connects to the network. The company now has peace of mind knowing that they are taking the necessary precautions to secure their customer's data and their proprietary data.
Quantitative Benefit
  • Secured mobile connections over the open Internet for over 200 employees.
  • Implemented the security solution within four weeks.
  • Almost 11 months of reliable service with most service problems being related to a device's data connectivity, not Check Point's ability to secure it.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.