Case Studies
    ANDOR
  • (5,794)
    • (2,602)
    • (1,765)
    • (764)
    • (622)
    • (301)
    • (236)
    • (163)
    • (155)
    • (101)
    • (94)
    • (86)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,073)
    • (2,519)
    • (1,260)
    • (761)
    • (490)
    • (436)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,407)
    • (1,774)
    • (1,292)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,157)
    • (2,048)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,488)
    • (1,262)
    • (472)
    • (342)
    • (225)
    • (181)
    • (150)
    • (142)
    • (140)
    • (127)
    • (97)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,732)
  • (1,626)
  • (1,605)
  • (1,460)
  • (1,423)
  • (1,411)
  • (1,313)
  • (1,178)
  • (1,059)
  • (1,017)
  • (832)
  • (811)
  • (794)
  • (707)
  • (631)
  • (604)
  • (595)
  • (552)
  • (500)
  • (441)
  • (382)
  • (348)
  • (316)
  • (302)
  • (295)
  • (265)
  • (233)
  • (192)
  • (191)
  • (184)
  • (168)
  • (165)
  • (127)
  • (116)
  • (115)
  • (81)
  • (80)
  • (63)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,781)
  • (4,113)
  • (3,091)
  • (2,780)
  • (2,671)
  • (1,596)
  • (1,471)
  • (1,291)
  • (1,013)
  • (969)
  • (782)
  • (246)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,568)
  • (2,482)
  • (1,866)
  • (1,561)
  • (1,537)
  • (1,529)
  • (1,126)
  • (1,027)
  • (907)
  • (695)
  • (647)
  • (604)
  • (600)
  • (521)
  • (514)
  • (514)
  • (491)
  • (423)
  • (392)
  • (363)
  • (351)
  • (348)
  • (341)
  • (312)
  • (312)
  • (293)
  • (272)
  • (243)
  • (238)
  • (237)
  • (230)
  • (217)
  • (214)
  • (208)
  • (207)
  • (204)
  • (198)
  • (191)
  • (188)
  • (181)
  • (181)
  • (175)
  • (160)
  • (155)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (113)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (80)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (60)
  • (59)
  • (58)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (26)
  • (26)
  • (25)
  • (25)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,333)
  • (3,499)
  • (3,391)
  • (2,981)
  • (2,593)
  • (1,261)
  • (932)
  • (344)
  • (10)
  • View all 9 Services
    ANDOR
  • (503)
  • (432)
  • (382)
  • (301)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (50)
  • (50)
  • (49)
  • (48)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (23)
  • (23)
  • (23)
  • (22)
  • (21)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
18,926 case studies
Case Study missing? Just let us know via Add New Case Study.
18,926 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
Lohmiller & Company/Carrier West Improves Workflow with DocuWare
Lohmiller & Company/Carrier West, a Denver-based HVAC solutions provider, was heavily reliant on paper documents and email communications for its operations. The company had large amounts of paper documents stored in file cabinets, taking up office space and making document retrieval time-consuming. The company also faced challenges with task-oriented requests being overlooked in the sea of electronic information. The company had previously lost an internal electronic storage system due to a virus infection, which made them reluctant to let go of paper files.
Download PDF
NCP Case Study: Forcepoint Email Security
NCP, the U.K.’s market leader in the provision of parking services, was struggling with managing increasing amounts of spam. Despite having an on-network email security solution in place, the company was still dealing with spam, false positives, and system latency, which resulted in legitimate emails being delayed. With only three IT staff supporting NCP’s 550 IT users, the management of the situation was becoming a burden. The limited resources prompted NCP to consider switching to a hosted service.
Download PDF
Adventist Health Case Study
Adventist Health, a not-for-profit health care organization, was facing a major challenge in safely embracing new technology without putting the hospital chain’s patient database at risk. The healthcare sector faces some very specific regulatory and legal requirements, as well as medical technology obstacles to maintaining its data integrity. The more powerful and sophisticated digital technology becomes, the easier it is to use and save lives. Unfortunately, technological advances also make it easier for cybercriminals to access and exploit critical data. This mixed blessing of technological advancement and more sophisticated cybercrime is the new reality going forward. The growth curve of the cyber threat landscape is both steep and evolutionary; thus the growth curve of cyber defense solutions that effectively address those threats must be so as well. Adventist Health faces threats as they adopt new technology safely and effectively.
Download PDF
Raytheon Company Case Study
Raytheon Company, a global 500 company in the Aerospace & Defense industry, was facing several challenges. They had a lack of or inefficient one-to-many device provisioning and were exposed to advanced network threats. They had evaluated Cisco before choosing Forcepoint. After using Forcepoint Next Generation Firewall, they had to address new challenges such as new firewall deployment, maintaining policy consistency across firewalls, deploying software updates, and having a unified view of all firewalls.
Download PDF
Empowering a Safe, Productive Educational Environment with Forcepoint
St. Benedict Preparatory School faced a challenge in maintaining a safe and productive educational environment. The school needed to prevent students from accessing inappropriate or distracting web content through classroom technology. However, stringent policies could hinder faculty and staff from performing their duties effectively. The existing firewall/router combo solution was unable to filter web addresses on a per-user basis, which was necessary for the school's unique needs. Additionally, the school needed a solution that could protect students and staff even when they were off-premises.
Download PDF
Chelsea and Westminster Hospital Case Study
Chelsea and Westminster Hospital (C&W) in southwest London is a 550-bed facility with a range of specialisms from pediatrics to dementia, serving 120,000 outpatients per year and a further 120,000 through the Accident and Emergency Department. Over 60 staff members help Acting Director of IMT, Bill Gordon, to manage the IT infrastructure and all matters relating to patient records, clinical systems, networks, and desktop hardware. Data security has always been a priority, the hospital is currently the highest rated in the UK for IG (Information Governance), which covers the implementation of data safety and management procedures. C&W was already a Forcepoint customer for web and email security as part of a comprehensive infrastructure that includes firewalls, encryption, and intrusion and hacking detection systems. An annual penetration test is run by NCC, a CESG-approved third party. Gordon says that C&W generally performs very well, encouraging confidence in the technology to steer behavior in the right direction. Nevertheless, the impetus for change was a security breach – the loss of a USB key – which had to be reported to the ICO (Information Commissioner’s Office). The incident had board-level visibility within the hospital that required an immediate response.
Download PDF
Indian Power Distributor Stays Ahead of Evolving Privacy Regulations
The power distributor provides energy to five power companies across an Indian state with a population of more than 25 million people. Managing the state’s power also means securing the personal and financial data of individuals and business customers. The company manages customer bill pay, consumer feedback, and more—which means that it acquires a sizeable amount of data, from customer names and contact information to invoicing details and power usage trends. In the wrong hands, this data can potentially be used to commit fraud or theft. While the company’s data stores increase, India’s attitude toward data protection is evolving. In August 2017, the country’s Supreme Court ruled privacy was a fundamental human right, spurring work on a nationwide personal data protection bill. While that bill has not yet been enacted, businesses see increased regulation of private data on the horizon and know they will likely need strong regulatory compliance processes very soon. The power company first engaged Forcepoint after reaching an impasse with a web security solution that wasn’t effective or flexible enough to meet its needs. The incumbent web security solution would bypass the URL filter, allowing users to access unauthorized sites. Separate URL filtering and web proxy point products caused a second challenge: the products were meant to work together but dependencies between them meant upgrades to one product would cause the other product to stop working—leading to support and management issues. In addition to these functionality and integration issues, the security product’s category database was less than comprehensive, with multiple categories missing. And a complex update process made it difficult to revise.
Download PDF
Customized Data Protection Keeps Up with This High-Speed Enterprise
The global telecommunications enterprise was in a race against time and competitors to secure a significant market share in the 5G technology. The company was under constant pressure to innovate, share information, and move quickly. However, the company was fined for a breach of customer data that its existing DLP product neither prevented nor detected. The security team was under pressure to secure data and intellectual property without slowing down the business operations. The high level of competition in the industry meant that the enterprise leaned towards freeing the business with fewer data controls over completely shutting down data loss, even if that meant taking some risks.
Download PDF
Forcepoint DLP Implementation in Microland
Microland, a medium-sized enterprise in the computer services industry, was facing challenges in controlling and managing data that were subject to regulation. The company needed a solution that could effectively discover, control, and limit the usage of regulated data or sensitive intellectual property (IP), even when the data wasn't on the network. The solution also needed to provide visibility into data movement within the business and help prevent potential data breaches.
Download PDF
Chhattisgarh State Power Companies (CSPC) Case Study
Chhattisgarh State Power Companies (CSPC) faced several challenges with their previous web security solution. The solution would bypass the URL filter, allowing encrypted traffic to run alongside non-encrypted traffic. This meant that if someone accessed an unauthorized site, it would open unchecked, as the platform was unable to filter out undesirable traffic. Additionally, the URL filtering solution didn’t have a proxy. A separate proxy was installed which was integrated with the URL filter. However, since both were separate solutions, there were dependency issues. If one of the solutions had to be upgraded, the other would stop working. This also led to support and management issues. Furthermore, the category database was weak and not very comprehensive, with multiple categories missing. The process of updating the database with a new category was quite complicated.
Download PDF
Online Gaming Company Betsson Makes a Sure Bet on Data Security with Forcepoint
Betsson, an online gaming company, was facing a significant challenge in protecting its customer data. The company operates in an industry that generates massive international flows of customer and financial data 24 hours a day. Any public leaks of this information would be disastrous for the company's reputation. Furthermore, Betsson's competitors target the same group of customers, making customer email addresses highly valued data. However, the company lacked visibility into data movements surrounding that database. The main threat did not arise from hackers or financial cybercriminals but from the company’s own staff. Some employees were targeted by competitors but others operated alone.
Download PDF
This Energy Provider Keeps the Public’s Trust by Doing More Than Keeping the Lights On
The enterprise energy provider, serving tens of millions of customers, faced multiple external and internal vulnerabilities to both the power grid and their multi-pronged operations. The cyber threats faced by all companies—like data loss and fraud—come with the added complexity of protecting critical infrastructure. Breaches, downtime, and fraud can cause massive problems for both the enterprise and its customers, from loss of revenue and reputation to endangering human safety. Safeguarding sensitive customer information is always paramount; in this case, that includes a number of high-profile individuals whose home addresses or social security numbers make a tempting target for data thieves looking for a quick payday. Then, of course, there are the millions of dollars flowing through the company, including funds from the resale of renewable energy that could be fraudulently rerouted through altered direct deposit information. Finally, the company’s substations, not always managed by a human operator, run the risk of being taken over by an outside entity without the company knowing.
Download PDF
IFSP Upgrades Firewall Security with Forcepoint NGFW
The Instituto FederaI de Educacao, Ciencia e Tecnologia of Sao Paulo (IFSP) faced a major challenge in ensuring the protection of its IT network and communication resources. This required maintaining the integrity, confidentiality, and availability of information regardless of where it is located and, above all, ensuring compliance with applicable government regulations. After suffering a number of injection-type attacks and system interruptions due to hardware and other bugs, the IT team decided to look at several NGFW (Next-Generation Firewall) options available in the market. IFSP also found that its former security solutions were a contributing factor in employees leaving the organization. Furthermore, it was important to implement a solution with the best TCO (total cost of ownership) as IFSP had a limited budget and wanted technology that would not require additional licensing and whose functionalities would not stop at the end of the license.
Download PDF
Davies Turner Keeps Web Traffic Moving with Forcepoint
Davies Turner, a leading multimodal freight forwarding group in the UK, faced several challenges with its existing security solution. The nature of their business required employees to regularly use the web for work-related tasks, which posed a risk to the network. The company had different user requirements across several offices, necessitating a customizable solution. The HR team also needed increased insight and reporting on time spent online. The existing solution was not user-friendly and could not provide the depth of information needed as the company grew.
Download PDF
AUSL Modena Public Healthcare
AUSL Modena, a public healthcare organization in Italy, was facing challenges in detecting and preventing advanced threats that reach their target by web and email. The spread of viruses and ransomware like cryptolocker was a significant concern. The organization needed to change its web and email security strategy to better manage the appropriate channels and focus more on end-users and less on terminals. AUSL Modena also needed to integrate with the nearby Modena University Hospital and its 3,000 workstations.
Download PDF
Secure Cross Domain Access and Transfer Accomplished with One Wire to the Desk
The Center for Army Analysis (CAA) was working with an infrastructure in which access to all Command, Control, Communications, Computers and Information Management (C4I) networks required each user to have four separate workstations and a Black Box KVM switch at their workspace. This resulted in duplication of hardware and massive power consumption. Another problem that CAA faced was a severe time degradation in moving classified information across multiple networks. This prevented the execution of critical Global War on Terror and warfighting analyses.
Download PDF
Increasing Security and Reducing Costs through the Single Information Environment (SIE) and the Next Generation Desktop (NGD)
The Department of Defence in Australia was faced with the challenge of modernising its heavily distributed ICT networks, which were providing declining IT service and flexibility. This required a full-scale consolidation across the department's data centres, computer rooms, and desktops. The goal was to create a Single Information Environment (SIE) to improve and strengthen infrastructure and maintenance services, while reducing operational costs. The desktop portion of this project, referred to as the Next Generation Desktop (NGD), aimed to provide streamlined desktop and application access to approximately 100,000 users, with 15% of those users requiring simultaneous access to multiple networks.
Download PDF
KPIT Case Study: Proactive Web Security
KPIT, a technology company focused on creating domain-intensive products and solutions, needed a web security solution that could manage the web and protect its network. Previously, the company used squid-based proxy servers and manually updated policies. However, the effectiveness of these policies was largely dependent on the knowledge and skill-base of the security administrators. With the dynamic nature of web content, KPIT realized that reactive web filtering measures were insufficient. The company needed a solution that could offer real-time protection and automatically block web threats and malicious sites as they are identified.
Download PDF
Copa Airlines Case Study
Copa Airlines was facing a challenge in providing better protection for its roaming users and distributed offices. The company was in need of a solution that could offer a full-featured policy set. Prior to choosing Forcepoint Secure Web Gateway, Copa Airlines evaluated other vendors including Zscaler and McAfee. The company was looking for a solution that offered efficacy, deployment flexibility, and ease of management.
Download PDF
Chilean Bank Gets Proactive on Data Security After Cyberattacks Rock Latin America
The Chilean bank, which primarily caters to high net worth individuals and corporations, decided to get proactive about bolstering its cybersecurity and data loss prevention posture in the wake of 2018’s high-profile cyberattacks targeting Latin American banks. The bank was not affected by these attacks, but the incidents spurred the Chilean government to begin drafting legislation that will require Chile’s banks to comply with certain cybersecurity measures, including data loss prevention. The bank decided to get ahead of the curve to better protect clients and itself, instead of waiting for government regulations to take effect. The bank has been transitioning to the cloud to support remote bank employees and account managers who meet premier clients in their own environments. The bank needs its security solutions to both adhere to coming government data protection legislation and to safeguard the usage of cloud applications and service providers.
Download PDF
Global Logistics Provider Enhances Network Security and Efficiency with Forcepoint
A global logistics provider was seeking an alternative to their multi-protocol label switching (MPLS) service. The customer wanted to boost the productivity of their workforce and lower costs by migrating applications to the cloud; however, doing so would create a large amount of additional traffic that would have to be backhauled to the data centers. This would inevitably cause latency and a subpar user experience. Adding additional MPLS lines would take months to implement and would be a costly solution, especially when considering the vast number of locations. At the same time, the customer’s aging network security devices were unable to provide substantial visibility into their highly distributed network. With warehouses and data centers spanning the globe—most of them without an on-site technical team—any new network security deployments would have to support centralized management, provide detailed insights into what was happening on their networks, and offer robust reporting capabilities. As one of the world’s largest logistics companies, the customer required the very best in security efficacy to maintain business continuity and to continue honoring commitments they had made to their clients.
Download PDF
Pegasus Airlines Enhances Productivity and Data Protection with Forcepoint Cloud Security
Pegasus Airlines, a leading low-cost airline in Turkey, faced challenges in maintaining regulatory compliance due to the vast amount of customer data it collects and stores. The company also supports workforce productivity by allowing their employees to work from anywhere using personal devices to access email and browse the web. This created a challenge in upholding the mandates of the General Data Protection Regulation (GDPR), which has strict penalties for companies that cannot quickly identify, report, and respond to data loss incidents.
Download PDF
Northern California Bank Case Study
This multi-billion dollar bank needed a vendor that could help protect corporate assets and customer information against internal threats in a unique technology environment. At the recommendation of an external audit, the bank sought a unified solution with embedded data loss prevention (DLP) within the web and email gateways to protect against risky employee behavior.
Download PDF
BSE Secures Sensitive Data with Forcepoint DLP
BSE, Asia’s first stock exchange, houses highly sensitive, critical corporate and trading data belonging to over 5,500 corporate houses listed on the exchange. It is one of India’s most critical infrastructures, and it is their responsibility to ensure the security and integrity of this sensitive data. They needed to maintain stringent, around-the-clock monitoring to secure the data from any possible internal or external threats. In an attempt to strengthen its security posture, BSE underwent a complete revamp of all its cybersecurity systems, opting to replace its existing security products with new, cutting-edge technology solutions, including for DLP, which is an integral part of BSE’s overall security strategy. BSE wanted a comprehensive solution that covered endpoint, network and e-mail.
Download PDF
Aosta Valley Region Balances Security and Productivity with Forcepoint Web Security
The Aosta Valley region, a Special Statute Region in Italy with a population of just under 130,000 people, faced a common problem for public and private companies, especially one as large as itself - securing web navigation. The region needed to define policies that supported a high level of security while preserving employee productivity. The spread of social networks, the e-commerce boom, and the concurrent availability of internet access on all workstations created a need for a cyber intervention. As a result, the region viewed web protection to be a priority, in order to manage and regulate web access based on content and source. The region decided to integrate its existing firewall with a web security component.
Download PDF
Global Packaging Company Increases Safety and Productivity on its Way to the Cloud
The company was dealing with underperforming and inflexible web and email security solutions, which were generating an average of 350 incidents each week, including false positives, that required staff time to investigate. This created a significant management burden for the company’s IT Infrastructure division. The company needed a new solution that could reduce the number of necessary investigations through better efficacy, thereby generating fewer false positives. In addition, centralized management and reporting capabilities would make investigations more efficient and reduce staffing needs. The company also needed a solution that could support their future challenges of moving to the cloud.
Download PDF
Nous Infosystems Case Study
Nous Infosystems, a Global 500 company in the banking industry, was facing several business challenges that led them to evaluate and ultimately select Forcepoint DLP. They had disparate DLP policies that left holes in their security posture, leading to data exfiltration that left their organization exposed. Additionally, they were struggling with their ability to control and manage data that’s subject to regulation.
Download PDF
Huisman Case Study
Huisman is a globally operating company with extensive experience in the engineering and manufacturing of heavy construction equipment. The company develops and manufactures cranes, pipelay systems, drilling equipment, winches, vessel designs and special products. In addition to oil and gas, Huisman focuses on renewables, leisure and civil industries. In view of its international presence, safe and secure communication between offices is key to Huisman’s success. That is why the company selected Forcepoint’s web and email security solutions to protect internal systems against malware and data leaks. Huisman is a high-tech company with a lot of intellectual property in the field of engineering. Therefore, it needs a high-quality security platform that offers ultimate protection, ease-of-use and ease-of-management.
Download PDF
Forcepoint Protects Financial Institution from Sophisticated Ransomware
The financial institution, being part of a global financial group and one of the world's largest banks, had to meet strict requirements for data security compliance. It was under intense scrutiny from customers, regulators, and shareholders. The institution needed a robust solution to protect its network from advanced, multi-stage threats. During the Proof of Concept (PoC), Forcepoint detected several of these threats in real time. The successful PoC was one of the deciding factors for the bank in choosing Forcepoint.
Download PDF
Enterprise Oil & Gas Company Secures Critical Data with Forcepoint Insider Threat
The company stores a variety of valuable data: internal patents, intellectual property (IP), merger and acquisition data, machine schematics, and geological data like potential drill sites. Many of those with access to this sensitive data are temporary contractors, employed for only a brief period of time. Understanding the higher risk that accompanies shorter-term employees, company leaders brought in third-party analysts to do an assessment of insider threat risk. Analysts found that data was indeed leaving the company, and that nearly half of the data loss incidents were directly related to the actions of negligent or malicious insiders. Upon hearing the results, company leaders authorized the creation of an internal insider threat task force.
Download PDF
test test