Forcepoint Case Studies Freight Giant Uncovers Breach with Next-Gen CASB
Edit This Case Study Record
Forcepoint Logo

Freight Giant Uncovers Breach with Next-Gen CASB

Forcepoint
Cybersecurity & Privacy - Network Security
Transportation
Logistics & Transportation
Cybersecurity
Cybersecurity Services
The multi-national transportation company was undergoing their annual audit when they decided to use Bitglass to catalog Shadow IT cloud apps on their network for their annual compliance report. The auditors uploaded two weeks of firewall logs, approximately 2M log lines per day, for Bitglass to analyze. The Bitglass Breach Discovery Engine identified four high-risk cloud apps widely used on the network: YouTube, MSN, Facebook, Dropbox, and Evernote. The company had previously blocked Gmail and Yahoo due to security concerns. These cloud apps were a compliance risk and merited mention in the annual audit. However, the Bitglass Breach Discovery Engine also uncovered a TOR (The Onion Router) node operating within the corporate network, which was a significant security concern.
Read More
The customer is a multi-national transportation company. They are a large enterprise with a significant network that handles millions of log lines per day. The company has a robust security system in place, including firewalls and blocked access to certain high-risk apps like Gmail and Yahoo. However, they were unaware of the presence of other high-risk apps on their network, including YouTube, MSN, Facebook, Dropbox, and Evernote. Furthermore, they were unaware of a TOR node operating within their network, which posed a significant security risk. The company conducts annual audits to ensure compliance and identify potential security risks.
Read More
The solution provided by Bitglass was their Breach Discovery Engine. This tool was able to analyze the company's firewall logs and identify high-risk cloud apps being used on the network. These apps were a compliance risk and were included in the annual audit report. More importantly, the Breach Discovery Engine uncovered a TOR node operating within the corporate network. This was a significant security risk, as TOR is often used for criminal enterprise. Once the TOR node was identified, the company was able to take swift action to remediate the issue. They used the diagnostics from the Bitglass Breach Discovery report to track down the breached device. The company also upgraded to next-gen firewalls to improve visibility and security.
Read More
The company was able to identify and block high-risk cloud apps on their network.
The company discovered a TOR node operating within their network and was able to remove it.
The company upgraded to next-gen firewalls to improve network visibility and security.
The company was able to reduce their compliance risk by identifying and blocking high-risk cloud apps.
The company was able to improve their network security by identifying and removing a TOR node.
The company was able to improve their network visibility by upgrading to next-gen firewalls.
Download PDF Version
test test