Case Studies
    ANDOR
  • (5,794)
    • (2,602)
    • (1,765)
    • (764)
    • (622)
    • (301)
    • (236)
    • (163)
    • (155)
    • (101)
    • (94)
    • (86)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,073)
    • (2,519)
    • (1,260)
    • (761)
    • (490)
    • (436)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,407)
    • (1,774)
    • (1,292)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,157)
    • (2,048)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,488)
    • (1,262)
    • (472)
    • (342)
    • (225)
    • (181)
    • (150)
    • (142)
    • (140)
    • (127)
    • (97)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,732)
  • (1,626)
  • (1,605)
  • (1,460)
  • (1,423)
  • (1,411)
  • (1,313)
  • (1,178)
  • (1,059)
  • (1,017)
  • (832)
  • (811)
  • (794)
  • (707)
  • (631)
  • (604)
  • (595)
  • (552)
  • (500)
  • (441)
  • (382)
  • (348)
  • (316)
  • (302)
  • (295)
  • (265)
  • (233)
  • (192)
  • (191)
  • (184)
  • (168)
  • (165)
  • (127)
  • (116)
  • (115)
  • (81)
  • (80)
  • (63)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,781)
  • (4,113)
  • (3,091)
  • (2,780)
  • (2,671)
  • (1,596)
  • (1,471)
  • (1,291)
  • (1,013)
  • (969)
  • (782)
  • (246)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,568)
  • (2,482)
  • (1,866)
  • (1,561)
  • (1,537)
  • (1,529)
  • (1,126)
  • (1,027)
  • (907)
  • (695)
  • (647)
  • (604)
  • (600)
  • (521)
  • (514)
  • (514)
  • (491)
  • (423)
  • (392)
  • (363)
  • (351)
  • (348)
  • (341)
  • (312)
  • (312)
  • (293)
  • (272)
  • (243)
  • (238)
  • (237)
  • (230)
  • (217)
  • (214)
  • (208)
  • (207)
  • (204)
  • (198)
  • (191)
  • (188)
  • (181)
  • (181)
  • (175)
  • (160)
  • (155)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (113)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (80)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (60)
  • (59)
  • (58)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (26)
  • (26)
  • (25)
  • (25)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,333)
  • (3,499)
  • (3,391)
  • (2,981)
  • (2,593)
  • (1,261)
  • (932)
  • (344)
  • (10)
  • View all 9 Services
    ANDOR
  • (503)
  • (432)
  • (382)
  • (301)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (50)
  • (50)
  • (49)
  • (48)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (23)
  • (23)
  • (23)
  • (22)
  • (21)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
18,926 case studies
Case Study missing? Just let us know via Add New Case Study.
18,926 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
Bridgford Foods Extends Access Control Capabilities with Simple Wireless Upgrade
Bridgford Foods, a food processing company, needed to enhance its security measures at its Statesville, NC facility. The company wanted to control the access of everyone who enters the building, including visitors, suppliers, employees, and service personnel, as part of its food defense strategy. The company had installed standalone, Kaba E-Plex 5700 Locks on two perimeter doors to enable access into the main building. However, the company wanted to extend its access control capabilities to ensure tighter control of who enters the building and protect against potential threats to its food supply.
Download PDF
EdR and Kaba: Team Players for Many Years
EdR, a leading developer, owner, and manager of high-quality collegiate housing communities, was facing the challenge of outdated housing that could not meet the needs of a 'wired' generation. With enrollments increasing at a greater pace, university leaders realized the need for new construction of privatized developments and repurposing of school-owned facilities. EdR was aware of the benefits that electronic locks would provide when dealing with key control, and saw them as a perfect fit for student housing projects. However, locks using mechanical keys needed to be physically changed at each semester turn, which was a significant operational challenge.
Download PDF
Electronic Locking System Enhances Security and Provides New Amenity
Galloway Ridge, a senior living community in North Carolina, was looking to enhance the security of its housing units during the construction of Phase II of its facilities. The management wanted an access control system with advanced technology to resolve key control and security issues. They were particularly interested in a system that could provide an audit trail capability, potential maintenance cost reductions, and credential options, as well as convenience for the residents. However, a significant challenge was that the new system needed to interface with Galloway Ridge’s existing perimeter door system.
Download PDF
Integrating a Flexible Wireless Access Control System Eliminates Break-Ins
Desmeules Chrysler Dodge Jeep, a large automobile dealership in Quebec, was struggling with after-hours theft. The dealership spans across several buildings including a main two-story showroom with administrative offices, a parts and service center, and a second showroom for the Fiat models. Despite its impressive facilities, the dealership was unable to prevent break-ins, which disrupted business operations and made employees feel unsafe.
Download PDF
Starbucks Coffee Shop
Starbucks had been facing issues with securing their restrooms for use by employees and customers. In many locations, the restrooms were being used by non-customers and the homeless for inappropriate activities. The keys for the mechanical keyed restroom locks were often lost or stolen, which required the cylinders to be rekeyed or the locks replaced, as well as any repairs that may have been required for the bathrooms. This made providing a safe and secure restroom facility an expensive and inconvenient proposition for Starbucks in many locations. A couple of years ago, Alarm Locks DL4100 privacy cylindrical lockset was introduced as a solution. However, it did not resolve the issues or provide cost savings to Starbucks due to installation time, visibility issues with the privacy button, and product failure and operator error.
Download PDF
Saflok: setting standards in the hospitality market
The Detroit Marriott, a 73-story luxury hotel with 1,300 rooms and suites, required an upgrade to its electronic access system from 1992 to meet the demanding security requirements of a luxury hotel in an international metropolis. The management was looking for the newest version of electronic locks with automatic deadbolt that provided a high level of security and were easy to use for guests and staff. The system needed to include central retrieval of access rights and lock data, multiple-keying plans, and all the Windows-based system applications. The hotel also wanted to optimize its energy use on a lasting basis by controlling the temperature in the individual rooms on a centralized basis.
Download PDF
dormakaba secure three year service contract with the University of Southampton
The University of Southampton, one of the largest campuses in the UK, was looking to consolidate all access solutions, new installations, and service maintenance programs with one company. The high-traffic campus required systems and access solutions that work efficiently, safely, and remain compliant with building regulations. Faulty access solutions could affect the entire operation of a building and its overall security. The university's complex campus is spread across the city, making it crucial to have a single supplier familiar with the site requirements.
Download PDF
dormakaba Marriott Hotel Belfast
The new AC Hotel Belfast by Marriott, a £25 million-pound investment by owners Belfast Harbour, required high-quality access solutions for its 188 guest bedrooms. The hotel, which is among the city’s largest, needed locks that could provide enhanced security and superior guest experience. The hotel also required a pitch-free pivoting system for its toughened glass doors to ensure optimum safety by preventing the risk of trapped fingers.
Download PDF
dormakaba, hetras and Village Hotels innovative collaboration for mobile access
The rise of smartphones has led to a shift in consumer behavior, with users increasingly expecting to be able to perform a wide range of tasks on their mobile devices. This includes checking into hotels, a process that traditionally requires physical interaction with hotel staff. Village Hotels, a UK-based hotel chain with 28 locations, recognized the need to adapt to this changing landscape and sought a solution that would allow guests to check in using their smartphones. The challenge was to implement a system that was secure, reliable, and user-friendly, enhancing the guest experience while also streamlining operations for the hotel.
Download PDF
dormakaba high security locking solution for new electric and bi-mode Hitachi trains
Hitachi Rail Europe was in the process of supplying new Class 800/801 trains as part of the Intercity Express Programme. These trains, which can travel at up to 125 mph in various formations from five to ten cars, were designed to provide an efficient means for passengers to travel on electrified and non-electrified routes. They were also intended to enhance the customer experience with more modern trains, better interiors and seating arrangements, and faster journey times. However, these trains required a high-security locking solution that could meet the client's exacting specifications. The solution needed to be reliable in extreme operating conditions and secure enough to protect the trains' valuable assets.
Download PDF
Great Western on track with dormakaba
First Great Western operates high speed, commuter, regional and branch line train services across the former Wessex Trains, First Great Western Link and First Great Western routes. Their vision is to provide their customers and communities with travel that is safe, reliable and enjoyable. However, they faced a challenge in ensuring passenger safety when alighting the train at shorter platforms. They needed a selective opening device for their high-speed trains that would allow the Train Manager to control the automatic locking and unlocking device for the train doors.
Download PDF
Embassy Gardens
Embassy Gardens is the residential and commercial centrepiece of the Nine Elms area regeneration, consisting of luxury apartments on a site that will offer residents a host of one-off leisure facilities such as the Sky Pool, a transparent 25m swimming pool which will bridge two of the residential buildings, an exclusive cinema and other exclusive leisure, fitness and business facilities. The challenge was to install a system within the residential units that have their own internal winter garden, allowing residents to enjoy their outdoor space whatever the weather.
Download PDF
dormakaba standing the test of time
The Nexus owned Tyne and Wear Metro, one of only two underground metro-type systems in the UK outside London, has been providing public transport to the people of Tyne and Wear for several decades. The Metro, which covers 60km and carries over forty million passenger journeys per year, opened in 1980 and opted for a Kaba 20 mechanical master key system for its security needs. The Metro has a varied range of locking solutions in Kaba 20 including, entrance and exit doors, perimeter fencing and track side pedestrian gates, signal points, office and high voltage access, and the train controls on the metro cars.
Download PDF
Increasing Rail Passenger Safety and Security
The rail sector demands high-quality security and surveillance equipment to increase passenger safety and improve passenger satisfaction. The challenge was to find a solution that could meet the legislated environmental and power requirements, while also being enclosed in a custom thermomechanical vandal-resistant rack-mounted casing. The solution also needed to have the ability to react to alarms and triggers to increase the recorded frame rate during incidents and securely protect the recording to allow later retrieval.
Download PDF
dormakaba builds on long-term collaboration with UWE
The University of the West of England (UWE) needed a high-security mechanical locking system for its new Faculty of Business and Law building. The new building includes two showcase law courts, a city trading room, a 300-seat lecture theatre, two Harvard lecture theatres, and technology-enhanced active learning classrooms. The university required a system that would allow quick access to all rooms to aid fast evacuation and ensure a lower number of keys in circulation. The system also needed to be flexible enough to evolve with UWE, helping to future-proof the installation.
Download PDF
dormakaba delivers a door closing solution to CBeebies Land Hotel At Alton Towers Resort
The newly built CBeebies Land Hotel at the Alton Towers resort in Staffordshire required door closers that would not spoil intricate vinyl leaf designs on the bedroom doors, while also ensuring compliance with both access and fire regulations. The hotel, designed by The Manser Practice, is the first hotel designed exclusively for children and young families. Each room features its own individual kids zone. The architect initially stipulated that overhead door closers were to be installed. However, due to the nature of the fully screen-printed doors, complete with images of CBeebies characters, it was decided that more discreet door closers were needed to ensure the design was not obstructed.
Download PDF
Technology Helps Albuquerque Sunport Improve Passenger Flow and Security
Albuquerque International Sunport (ABQ) was facing issues with its aging, obsolete revolving exit doors which had become a security and maintenance headache. The growing needs for passenger flow required that these doors be manned 24/7. The challenge was to elevate the passenger experience by focusing on all touch points along the passenger journey, transforming the airport experience with efficient processes.
Download PDF
The Home of Stephen Winthrop & Jane Williamson
Stephen Winthrop, diagnosed with ALS in November 2013, and his wife, Jane Williamson, had a new home built with technology that would maximize their home’s utility for someone with his specific form of ALS. The ALS has been advancing slowly, initially affecting his arms. It will likely spread to his legs and other parts of his body. Their house has been equipped to enable Winthrop to control certain features and appliances (e.g., thermostats, doors, lights, TV, etc.) through a computer interface. It’s also built to readily undergo modifications as Winthrop’s ALS progresses. In the future, he will be able to use his voice or eye movement alone to control features through a server that electronically connects a tablet computer with myriad electrical features throughout the home.
Download PDF
Hillwood Adds Mobile Access to Tacara Village
Hillwood Development Company, based in Fort Worth, Texas, was looking to integrate modern, convenient amenities into their Tacara Village property. They wanted to provide their residents with a 'smart' living experience by automating technology for security, convenience, comfort, and entertainment. The company was particularly interested in offering their residents the convenience of using a smart device to simplify access throughout the property. They wanted to provide a solution that would allow residents to unlock their apartment doors for guests or dog walkers even when they were not at home.
Download PDF
Identify. Authenticate. Control. City of Madison Enhances Security with Networked Access Control
The City of Madison, Wisconsin, had a mix of new and older buildings, some of which were 50-60 years old and of complex construction. These buildings included engineering sites, streets buildings, five different police districts, 14 fire stations, and government facilities, among others. The IT Department services 36 different agencies in 20 sites across the city. The city's assets were protected by a team of security and technology experts whose responsibility included everything from assigning rights to software use to protecting taxpayer data to securing buildings and people, and more. However, when officials were unable to lock down a building during an emergency due to technical issues and the company who installed it said they could not provide on-site support for two days, Ken Ferguson, Information Specialist 3 and System Administrator for City of Madison, knew he needed to replace the system.
Download PDF
Historic Manufacturing Site Vaults into 21st Century by Implementing a Wireless Access Control System
Kaba Access Control, a North Carolina-based manufacturing facility, has been home to some diverse operations, including a cotton mill, foundry, and furniture hardware manufacturer. The company has utilized its prior assets to build a business that includes die-casting, plating, sanding, stamping, assembly, and shipping operations, as well as in-house research, engineering, and customer support services. The facility includes 150,000 square feet of manufacturing and office space and employs over 250 personnel. Coinciding with its changing businesses, the building’s original 1905 brick structure has undergone a series of renovations and additions, morphing the once basic space into a complex web of access points. The company had managed their access points with an online, wired system, but retired the system when it could not provide expanded coverage at a reasonable cost. With input from the safety committee, the company embarked on choosing and installing a new access control system that would provide a higher level of security and accommodate its numerous users and critical access points.
Download PDF
Williams Racing's Remote Working and Cybersecurity Solution
Williams Racing, a Formula 1 race team, employs over 650 people who contribute to the team’s performance. This includes engineers who analyze real-time data from video analytics of their own and competitors’ cars, weather data, and over 300 sensors on the car to inform pit crews on health and performance. Cybersecurity is critical to Williams’ success on and off the track. To race competitively, their engineers need unencumbered access to the real-time data from the track and ensure that the data is not tampered with. To compete in their commercial markets, they need to protect their intellectual property from external attacks and insider threats. The COVID-19 pandemic has further complicated this task, with over 60% of Williams’ employees working remotely from unsecure home networks or remote Wi-Fi networks with unknown configuration.
Download PDF
Protecting Trusted Insiders
The enterprise security threat landscape is more complex than ever, with new risks and attack methods emerging faster than we can keep up with them. One established attack vector that shows no signs of slowing down is phishing. As phishing attacks have become more sophisticated, they're increasingly focused on exploiting a key, but often overlooked, vulnerability: the users inside of your network. It is user behavior - the opening, the clicking, the downloading - that serves as the enabler, allowing malicious actors to gain entry to your network and find the valuable personal or company information they're seeking. Recently, a slew of invoice-themed malicious phishing emails was found to have penetrated a customer network - past a tried-and-true network defense system and straight into employee inboxes. A proxy service eventually detected and flagged that users had visited malicious URLs, but there was limited visibility into where and how the attackers entered the network, the number of users affected, and the extent of the potential damage.
Download PDF
Financial Services Organization Stops Attack Targeting a Senior Executive
A large financial services company with over 10,000 employees was the target of a java backdoor attack aimed at a senior executive. Despite having several antivirus, endpoint detection and response (EDR), and email security tools in place, the attack managed to bypass these defenses and land on the executive's computer. The malware used common administrative commands, which did not trigger alerts from the other security solutions. Without the visibility provided by DTEX, the attack would have gone undetected, potentially leading to data theft, sabotage, lateral movement within the organization, or worse. The malware was delivered via a phishing email that appeared to be shipping-related, which the executive was expecting. The email contained a malicious link that pointed to a compromised Turkish website that downloaded the malware. The malware then hid itself by creating a new temporary folder on the desktop and moving all associated files to this location. It also created a new path in the registry directory, setting up a persistent foothold on the machine, and took several actions to enumerate the environment.
Download PDF
Detecting a Java Backdoor with Dtex
A large financial services company with over 10,000 employees was the victim of a java backdoor attack that targeted a senior member of the company. Despite having several AV, EDR, and email security tools deployed, the attack managed to slip through and land on the computer of a high-ranking employee. The malware utilized commonplace admin commands, which other solutions did not alert on. Without Dtex's visibility and alerting, the attack would have gone undetected, potentially leading to data theft, sabotage, lateral movement within the organization, or worse.
Download PDF
FERCAM Updates Web Security Quickly with Forcepoint
FERCAM, a logistics company, was experiencing growth that necessitated the modernization of its technology resources. Internet access had become a crucial part of daily operations, and the company needed a more effective monitoring solution. The previous solution was plagued with issues such as weak performance, ineffective blacklist updating, and inadequate web traffic monitoring and analysis for 800 users. These inefficiencies led to a high number of IT tickets related to service issues or false positives.
Download PDF
Forcepoint Enables AZ Sint-Lucas Hospital to Safeguard Patient Care
Healthcare professionals at AZ Sint-Lucas Hospital required unfiltered access to websites to provide patients with the best possible outcome. This resulted in a substantial amount of unprotected data being sent and received via smartphones, tablets, or other devices. A study of user behavior discovered that staff visited more non-work-related websites than job-related sites, posing a serious risk for data loss or theft. The increasing number of spam complaints also required too much time from the IT team to handle.
Download PDF
Swire Oilfield Services Case Study
Swire Oilfield Services, a global supplier of offshore containers to the energy industry, faced the challenge of protecting its business operations in some of the world's most remote locations. The company's global presence, coupled with recent acquisitions, resulted in a complex security portfolio with five different security solutions in place for email. This setup became increasingly problematic as the number of malware and phishing attempts targeting the company's cloud app services reached an all-time high. The company needed a solution to standardize its security across all locations, despite varying connection issues.
Download PDF
Sauer Corporate Services, LLC Case Study
Sauer Corporate Services, LLC faced several challenges that led them to evaluate and ultimately select Forcepoint Secure Web Gateway. These challenges included the difficult and costly maintenance of appliances and the need for better protection for roaming users and/or distributed offices. They chose Forcepoint’s hybrid deployment option for Secure Web Gateway because of its dedicated filtering in the cloud, the full-featured policy set, and the need to prevent loss of DLP functionality in a cloud deployment. Before choosing Forcepoint Secure Web Gateway, they evaluated or previously used vendors including Cisco, Symantec, and McAfee.
Download PDF
Swiss Life Case Study
In 2009, Swiss Life France recognized a key challenge which had been impacting the company as well as several of its peers. Zero-day malware and advanced persistent threats, such as ransomware and rootkits, were infiltrating its network undetected. As a result, Swiss Life recognized that it needed to optimize and better secure the infiltration and exfiltration of its data. In addition, Swiss Life’s sales representatives working remotely (approximately 1,400 in total) are equipped with laptops and Windows tablets. These devices are frequently connected to unsecured external networks and must be equipped with the same level of protection as if connected to the corporate network.
Download PDF
test test