技术
- 网络安全和隐私 - 安全合规
- 网络与连接 - 网关
适用行业
- 国家安全与国防
适用功能
- 采购
- 质量保证
用例
- 租赁金融自动化
- 篡改检测
服务
- 网络安全服务
关于客户
Edenred 是预付费企业服务领域的全球领导者,将 4300 万用户与 140 万商户连接起来,并为 750,000 家公司管理可信交易。该公司于 1962 年向法国市场推出 Ticket Restaurant 餐券,这是法国各地组织采用的首批员工福利之一。如今,Edenred 提供数字解决方案,使公司和员工能够在全球范围内执行各种日常交易。公司员工使用 Edenred 支付卡或手机购买午餐或杂货。车队司机使用 Edenred 卡加油、支付停车费并为卡车提供服务。商家使用 Edenred 来加速客户结帐和报销。公司使用 Edenred 服务来改善费用管理、降低运营成本并最大限度地降低复杂交易中涉及的风险。 Edenred 每年管理超过 20 亿笔交易,必须满足最高的安全性和合规性标准,以保护客户的隐私和数据。
挑战
Edenred 是预付费企业服务领域的全球领导者,在维护运营安全方面面临着多项挑战。该公司需要阻止电子邮件附加的恶意文件进入其网络或用户的收件箱。他们还必须管理四大洲一致的端到端安全性,确保遵守多项安全法规。作为一家金融组织,Edenred 须遵守支付卡行业数据安全标准 (PCI DSS)、银行法规、交易授权要求和通用数据保护条例 (GDPR) 法律。该公司需要制定涵盖其在北美、欧洲、巴西和新加坡运营的安全和合规标准。我们面临的挑战是找到一种解决方案,不仅能提供最佳保护,还能满足最严格的合规标准。
解决方案
为了应对这些挑战,Edenred 求助于 Check Point SandBlast 零日防护。该公司发现越来越多的恶意软件随电子邮件一起传入,而其反垃圾邮件解决方案不足以防范高级威胁。 SandBlast 的威胁仿真技术具有 CPU 级检查功能,可以阻止最复杂的威胁。使用抗逃避恶意软件检测技术,SandBlast 可以调查试图绕过操作系统安全控制的漏洞,甚至在攻击试图发起和逃避检测之前就阻止攻击。除此之外,SandBlast 的威胁提取组件还可删除恶意活动内容和嵌入对象,并向最终用户提供干净的文件。该解决方案使 Edenred 能够快速轻松地在任何需要的地方(本地或云端)扩展 Check Point 保护。
运营影响
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.
Case Study
LoRaWAN - Helping citizens and organizations to reduce environmental impact
More and more, our world is becoming aware about the environmental print that comes with population growth, limitation of resources, climate change and the need for sustainability. The biggest challange here was to raise awareness among citizens and organizations about their environmental impact, and to help themto reduce it in a sustainable way with the help of Real time data.
Case Study
Enhancing City Security through IoT: A Case Study of Atlanta
The city of Atlanta, with a resident population of over 420,000 and a metropolitan area of more than five million people, faced the challenge of ensuring the safety and security of its citizens and visitors. As a leading tourist destination and a multicultural city attracting global investment, Atlanta had to deal with the complexities of managing safety and security incidents. Over the years, the city had invested in various surveillance systems, providing visual intelligence to law enforcement and security professionals. However, these systems operated independently and were spread across a wide geography. The city aimed to increase collaboration among government agencies and create a shared Video Integration Center (VIC). The challenge was the disparate nature of the video systems, which were based on proprietary technologies and were both analog and IP based. The city also wanted to leverage the numerous private cameras located across the city, further complicating the integration of all these systems into one common platform.