CheckPoint Software Case Studies D.C. Law Firm Enhances Security Across Network, Cloud, and Mobile with Check Point Infinity Architecture
Edit This Case Study Record
CheckPoint Software Logo

D.C. Law Firm Enhances Security Across Network, Cloud, and Mobile with Check Point Infinity Architecture

CheckPoint Software
Application Infrastructure & Middleware - Event-Driven Application
Robots - Wheeled Robots
Buildings
National Security & Defense
Cybersecurity
Tamper Detection
Cloud Planning, Design & Implementation Services
Cybersecurity Services
The D.C. Law Firm, representing clients in complex, high-stakes regulatory, litigation, and transactional matters, faced significant security challenges. The firm's clients ranged from Fortune 500 corporations to trade associations and individuals, making the protection of sensitive data a top priority. The firm needed to meet clients' security requirements across all threat vectors and prevent SaaS application account takeovers. The international scope and high visibility of clients made security business-critical. The firm also had to ensure the productivity and availability of its attorneys, who often traveled internationally and used their own mobile devices. The firm's Mobile Device Management (MDM) platform provided some cybersecurity protection, but the security team needed better visibility into the device posture. They also wanted features that could alert users to malicious websites and block installation of rogue apps.
Read More
The customer in this case study is a D.C. Law Firm that represents clients in complex, high-stakes regulatory, litigation, and transactional matters. Its clients range from Fortune 500 corporations to trade associations and individuals. The firm's attorneys often travel internationally and use their own mobile devices for work. The firm's clients trust it with data that is essential to their businesses, including intellectual property, trade secrets, and data related to potential mergers and acquisitions. The firm also uses Office 365 for client collaboration, and its security team needed to secure sensitive, work-related data and email content while preserving user privacy.
Read More
The law firm adopted the Check Point Infinity architecture to secure its expanding environment. The Check Point Infinity architecture is a fully consolidated cybersecurity architecture that provides unprecedented protection against mega attacks across all vectors—network, endpoint, mobile, and cloud. The firm purchased its Check Point solution through the Check Point Infinity Total Protection subscription model, an all-inclusive, per-user, per-year consumption model. This model provided comprehensive security architecture through one simple subscription payment plan. The Check Point Infinity architecture extended the same protections to endpoints with SandBlast Agent and to mobile devices with SandBlast Mobile. To protect the firm’s sensitive data on SaaS applications, Check Point CloudGuard SaaS was used to prevent attacks on Microsoft Office 365 email. The Check Point R80 Security Management provided centralized management control across the network and cloud environments, enabling the security team to manage security globally with threat prevention and full threat visibility in a single pane of glass.
Read More
The implementation of the Check Point Infinity architecture has significantly improved the law firm's security posture. With Check Point preventing malicious actors from infecting devices, attorneys’ mobiles stay clean and safe, ensuring their productivity and the security of clients' data. The firm now has more visibility and better governance into its security posture. The security team is working to ensure that they have the right level of access controls to specific types of data, and once those are in place, they plan to automate processes as much as possible. The Check Point Infinity Total Protection model also simplified security budgeting and spending, providing the firm with the flexibility to protect its assets against advanced threats and adapt defenses as threats evolve.
The law firm has not had a data security event since implementing the Check Point Infinity architecture.
With Check Point SmartLog, engineers can access log records across the infrastructure from a single console, saving valuable time.
The Check Point Infinity Total Protection model simplified security budgeting and spending, making the security budget predictable and easier to manage.
Download PDF Version
test test