Suppliers
United States
Forcepoint
Overview
This profile is not managed yet, if you would like to manage
this profile, please contact us at team@asiagrowthpartners.com
this profile, please contact us at team@asiagrowthpartners.com
Forcepoint |
|
United States | |
Austin | |
1994 | |
Private | |
$100m-1b | |
1,001 - 10,000 | |
Open website |
IoT Snapshot
Technology Stack
Case Studies
Number of Case Studies100
Online Gaming Company Betsson Makes a Sure Bet on Data Security with Forcepoint
Betsson, an online gaming company, was facing a significant challenge in protecting its customer data. The company operates in an industry that generates massive international flows of customer and financial data 24 hours a day. Any public leaks of this information would be disastrous for the company's reputation. Furthermore, Betsson's competitors target the same group of customers, making customer email addresses highly valued data. However, the company lacked visibility into data movements surrounding that database. The main threat did not arise from hackers or financial cybercriminals but from the company’s own staff. Some employees were targeted by competitors but others operated alone. |
|
Swire Oilfield Services Case Study
Swire Oilfield Services, a global supplier of offshore containers to the energy industry, faced the challenge of protecting its business operations in some of the world's most remote locations. The company's global presence, coupled with recent acquisitions, resulted in a complex security portfolio with five different security solutions in place for email. This setup became increasingly problematic as the number of malware and phishing attempts targeting the company's cloud app services reached an all-time high. The company needed a solution to standardize its security across all locations, despite varying connection issues. |
|
Reliance Capital Case Study
Reliance Capital, a rapidly growing financial services company in India, was facing a significant challenge in protecting the transfer of confidential customer data. With five operating businesses and a heavy flow of information, the organization realized it needed control over data moving across systems, geographies, and group companies. The potential for loss was high and it was critical that its data was secured from accidental or intentional leaks. The use of essential business tools, such as Web and email, presented a challenge to its current systems and the organization was increasingly concerned about the repercussions — both financially and in reputation — if sensitive data was leaked. |