CheckPoint Software > Case Studies > State Transport Leasing Company (STLC) Enhances Cyber Security with Check Point

State Transport Leasing Company (STLC) Enhances Cyber Security with Check Point

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • National Security & Defense
  • Transportation
Applicable Functions
  • Logistics & Transportation
Use Cases
  • Tamper Detection
  • Vehicle-to-Infrastructure
Services
  • Cybersecurity Services
  • System Integration
About The Customer
State Transport Leasing Company (STLC) is a leading Russian leasing company specializing in the leasing of air transport, sea and river vessels, railway vehicles, trucks, and special equipment such as energy-efficient passenger transport. STLC's customers and partners include flagship Russian and international banks, manufacturers of air, rail, and road transport, and carrier companies. Established in 2001 as ZAO Civilian Aviation Leasing Company, STLC expanded its portfolio in 2005 to include road transport and infrastructure. Today, STLC is the largest Russian leasing company entrusted with the financing of high-profile civilian aviation and transport projects, such as deliveries of the Sukhoi Superjet 100 passenger plane.
The Challenge
State Transport Leasing Company (STLC), a leading Russian leasing company specializing in transport, was facing several challenges related to its cyber security. The company needed to consolidate multiple security solutions to simplify management and improve security. The corporate network was under constant threat from both external and internal sources, and there was a need to protect against advanced and zero-day threats. The company also wanted to enhance endpoint security without interrupting the business flow. The challenge was to increase security effectiveness and ease the workload of the security admin. In recent years, the company had faced issues related to data protection, including unauthorized access to corporate resources and threats posed by ransomware. While the IT team was able to prevent these issues as they arose, the management realized the need for proactive threat prevention to avoid potential damage to the business.
The Solution
STLC chose Check Point's Next-Generation Threat Prevention Solutions to address its security challenges. The company implemented Check Point SandBlast Zero-Day Protection, Check Point Security Management R77.30, and Next-Generation SmartEvent. The Check Point Next Generation Threat Prevention solution protects the corporate network perimeter from external threats and prevents user access to potentially malicious websites and services while preserving access privileges essential for performing user duties. The SandBlast solution is used to protect endpoints on the STLC corporate network, providing quality endpoint protection against any type of malware and other security threats. The Check Point SandBlast Endpoint Security enables administrators to flexibly configure access privileges, prohibit downloads and transmission of specific file types, and protect users against both common threats and zero-day attacks such as ransomware. The intuitive interface and ease of administration enable the company to respond to changing conditions and requirements promptly while maintaining a high level of security.
Operational Impact
  • The implementation of Check Point's solutions resulted in a consolidated security architecture with real-time prevention. The company now has centralized and optimized security management via a single, customizable console. The enhanced visibility with SmartEvent, including detailed logs, customized reports, and forensic analysis, simplifies incident investigations. Check Point R77.30 security policy stands out for its high flexibility. Permission to access applications, services, and external resources can be granted easily on a user basis, ensuring the optimal level of security while allowing all the features that users truly need, without interrupting the business flow. Flexible yet efficient rules encourage employees to adopt a more responsible attitude toward good information security practices.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.