CheckPoint Software Case Studies Laurenty's Journey to Unify Security and Comply with GDPR using Check Point Infinity Architecture
Edit This Case Study Record
CheckPoint Software Logo

Laurenty's Journey to Unify Security and Comply with GDPR using Check Point Infinity Architecture

CheckPoint Software
Cybersecurity & Privacy - Endpoint Security
Cybersecurity & Privacy - Network Security
Glass
National Security & Defense
Quality Assurance
Inventory Management
Tamper Detection
Cybersecurity Services
System Integration
Laurenty, a family group specializing in cleaning, road sweeping, building, and green spaces, faced a significant challenge in unifying its security standards across networks and endpoints. The company needed to comply with the European General Data Protection Regulation (GDPR) laws, which were set to come into force in 2018. In 2015, Laurenty realized that its IT security infrastructure was technically outdated and fragmented. The company was using several point products to address specific security challenges, which resulted in multiple consoles, different approaches, and no global visibility. Furthermore, the impending GDPR regulations required all European companies to demonstrate that all personal data held by them is protected, particularly against theft. Non-compliance could result in severe penalties of up to 4% of the company's annual turnover. To protect its laptops against data breaches, Laurenty needed a strong encryption solution.
Read More
Laurenty is a family group based in Belgium, with a presence in the Grand Duchy of Luxembourg and France. The company specializes in cleaning, road sweeping, building, and green spaces. With an annual turnover of more than €120 million, Laurenty serves around 5,000 clients with the help of its 4,300 employees. The company was facing challenges in unifying its security standards across networks and endpoints and needed to comply with the European General Data Protection Regulation (GDPR) laws. The company's IT security infrastructure was technically outdated and fragmented, and it needed a strong encryption solution to protect its laptops against data breaches.
Read More
Laurenty turned to Check Point Infinity Architecture to unify its security infrastructure and achieve compliance with the highest security standards. With the help of Shinka, an IT security integrator and a recognized Check Point partner, a global solution was implemented, protecting both endpoints and network while incorporating the principles of Check Point Infinity architecture. The first priority was to protect the company’s endpoint devices against zero day and other advanced threats. Check Point SandBlast Agent was used to protect Laurenty against all kinds of unknown malware, bots, phishing, and ransomware attacks. The company also used full disk and media encryption and port protection to meet all endpoint security requirements and achieve GDPR compliance. Laurenty chose Check Point’s Complete Endpoint Protection Suite as it provided data security, network security, advanced threat prevention, forensics, and remote access VPN for complete endpoint protection in one package. The company also replaced the old gateways with the new Check Point 5600 appliances with SandBlast Next Generation Threat Prevention (NGTX) to defend the company’s network against zero-day threats.
Read More
By choosing Check Point to protect both the endpoints and the network, Laurenty has seen the advantages of Check Point Infinity architecture, which focuses on delivering the most advanced threat prevention. The Infinity architecture breaks down security silos by ensuring comprehensive and timely intelligence across the entire infrastructure. Check Point ThreatCloud houses all threat intelligence, which is derived from a broad array of sources. The main reason Laurenty chose Check Point endpoint solution, besides the advanced threat prevention capabilities, is the fact that all the endpoint suite products can be managed by one single console. This has made the task of managing the complete endpoint suite much easier. The integration of endpoint and network security management is an additional benefit as it allows for security forensics, security analysis, and search security events from one management appliance.
Download PDF Version
test test