CheckPoint Software Case Studies Top Telecom Provider Bolsters Security with Check Point Next Generation Firewalls
Edit This Case Study Record
CheckPoint Software Logo

Top Telecom Provider Bolsters Security with Check Point Next Generation Firewalls

CheckPoint Software
Cybersecurity & Privacy - Network Security
Networks & Connectivity - Cellular
National Security & Defense
Telecommunications
Traffic Monitoring
Transportation Simulation
Cybersecurity Services
Hardware Design & Engineering Services
The telecom provider, operating one of the largest LTE networks in the US and serving over 80 million customers, faced the challenge of protecting a vast and diverse network environment. The network supports a wide range of traffic, from voice calls to streaming video, with the traffic mix and bandwidth requirements changing daily. The provider needed to secure an expanding attack surface with traffic entering the network from various sources, including handsets, the Internet, and point-to-point vendor connections. Concurrently, the provider was grappling with an increase in the volume, diversity, and sophistication of cyber attacks. In recent years, service providers have fallen victim to highly visible DDoS attacks that disrupted networks and services. Attackers also frequently stole credentials and attempted to gain access via brute force attacks. The telecom provider required network security defenses that could accommodate the rapid growth of its customer base, traffic volumes, and the global cyber attack landscape.
Read More
The customer in this case study is a leading telecom provider that operates one of the largest LTE networks in the United States. The provider serves more than 80 million customers and supports a diverse range of network traffic, from simple voice calls to text, email, and streaming video. The traffic mix and bandwidth requirements of the provider change daily, and it faces an expanding attack surface with traffic entering the network from various sources. The telecom provider has experienced rapid growth in its customer base, traffic volumes, and the global cyber attack landscape. It has been a victim of highly visible DDoS attacks and credential thefts, prompting the need for robust network security defenses.
Read More
To address its diverse traffic requirements and security challenges, the telecom provider deployed Check Point Next Generation Firewalls. The company uses numerous firewalls to defend network perimeters and segments against malicious actors. It has deployed Check Point 23000 and the 26000 Series data center and high-end enterprise firewalls with data center-grade hardware to maximize uptime and performance. Check Point 44000 firewalls provide multi-blade, chassis-based solutions that scale up to 66,000 SPU to handle the company’s continuous growth. The firewalls also offer IDS and IPS capabilities used as additional preventive measures. The IT manager’s team also relies on Check Point to help them develop defenses along with the evolving threat landscape. From the firewall hardware to new capabilities, incident response features, and support, the Check Point team is committed to the telecom provider’s success.
Read More
The deployment of Check Point Next Generation Firewalls has significantly enhanced the telecom provider's network security. The firewalls have effectively protected the provider against DDoS attacks and other types of cyber threats. When attacks were detected, the firewalls immediately notified the IT team, enabling swift action. The provider has also been able to adapt its defenses on the fly, thanks to the flexibility offered by the Check Point firewalls. The IT manager’s team relies on Check Point to help them develop defenses in line with the evolving threat landscape. The provider has found the firewall hardware, new capabilities, incident response features, and support offered by Check Point to be critical to its infrastructure and success.
Gained exceptional protection against DDoS attacks
Achieved high-performance, high scalable defenses
Leveraged flexibility to adapt defenses on the fly
Download PDF Version
test test