Case Studies
    ANDOR
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
    ANDOR
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
19,090 case studies
Case Study missing? Just let us know via Add New Case Study.
19,090 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
This UK Bank Partners with Forcepoint to Outsmart Relentless Fraudsters Without Affecting the Online Customer Experience
The bank was facing a significant challenge in safeguarding its customers and itself against constantly changing, costly attacks on their online banking application. Fraudsters were always changing their tactics, and the bank's application, which required constant stability, couldn't react quickly enough to these changes. This left the bank vulnerable to the latest methods of fraud. The bank needed a solution that could provide an extra layer of security without affecting the stability of its banking application.
Download PDF
Compartamos Banco Safeguards Data in Order to Better Serve its Customers
Compartamos Banco, the largest microfinance bank in Latin America, faced the challenge of protecting a complex organization that includes 16,000 employees, more than 500 offices, and 2.5 million customers. The bank needed to comply with regulations including National Banking and Securities Commission (CNBV), Federal Law of Protection of Data in Possession of Individuals (LFDPPP), and international standards. The bank's objective was to eradicate financial exclusion by offering basic financial services to the low-income population, and to do so, it needed to ensure the security and protection of its data.
Download PDF
US Foods Recoups 1.1 Million Staff Hours & $800K Annually with NetMotion Mobility®
US Foods, one of the largest food distributors in the United States, was facing a significant challenge with its field team of 5,000. These employees, who meet with and serve customers in person, were struggling with unreliable connections when trying to submit purchase orders on their laptops at customer sites. This often resulted in lost work and wasted time as they had to log back into the VPN connection and restart the application. The poor connectivity also negatively impacted inventory management, as reps wouldn't know until the end of the day if a product was out of stock. This led to a loss of 1.1 million hours of potential sales time with clients and an annual cost of $800,000 on pre-printed materials.
Download PDF
NetMotion Mobility® Helps Bloodworks Northwest Keep Precious Blood Donations Flowing
Bloodworks Northwest, a not-for-profit organization, provides transfusion medicine services to over 90 hospitals across Washington, Oregon, and Alaska. The organization operates 14 mobile blood drive units that collect blood components from donors in the greater Seattle area. Employees of Bloodworks rely on secure and reliable mobile connectivity to verify the eligibility of potential blood donors. However, they faced challenges with their existing connectivity solutions from NetMotion Mobility and Citrix. The organization decided to evaluate the performance of both solutions and standardize on one across the organization.
Download PDF
NetMotion Mobility® Keeps Travelers & Cargo Departing On Time at Frankfurt Airport
Fraport, the company that manages Frankfurt Airport, one of the world's busiest transportation hubs, was facing a significant challenge. The airport's workers were unable to move seamlessly between networks, which was causing difficulties in their jobs and affecting the turnaround time of aircraft. The airport, known for its efficiency, had a strict 45-minute aircraft turnaround policy. However, mobile application and data access issues were hindering this initiative. With hundreds of workers switching between WiFi and cellular networks, connections were often unstable. This issue became particularly concerning when workers were observed trying to fix their connections while driving, putting themselves at risk.
Download PDF
NetMotion Mobility® Helps Allina Healthcare Improve Quality of Patient Care
Allina Hospitals and Clinics were among the first in the nation to use Electronic Medical Records to deliver seamless, coordinated care. However, the group’s home nurses were regularly losing connectivity in the field. Logged out of applications without warning, the nurses were forced to log in again and re-enter the data lost from their previous session. When the IT group tied 90 helpdesk tickets to this issue, management stepped in to find a better solution. The EMR application requires field devices to sync with the central database. But as the scale of data transfer grew, nurses could no longer wait until the end of their shifts to sync from an office or at home – synchronization sessions were taking as long as a half-hour. The problem was so bad that several nurses quit in frustration.
Download PDF
NetMotion Mobility® Slashes AT&T’s Expenses, Cuts Workforce Overtime by 50%
AT&T, a global telecommunications giant, was facing a significant challenge with its field engineers. The company's traditional Virtual Private Network (VPN) was frequently dropping connections, causing engineers to repeatedly log in multiple times a day. This issue was leading to a surge in helpdesk calls and overtime requirements. The inability to maintain a stable connection to the corporate network was hindering the productivity of the field engineers and delaying the completion of work orders. The company needed a solution that would ensure continuous and reliable network connectivity for its field personnel.
Download PDF
Hospital System Achieves HIPAA Compliance with Bitglass
The hospital system, located in the Southeastern United States, was in need of a solution for HIPAA compliance on mobile devices. The Department of Health and Human Services reports that 70% of data breaches in healthcare are the result of lost or stolen devices. The hospital's incumbent mobile security solution, AT&T Toggle, was made obsolete after Google acquired the source company Divide. The hospital's compliance team wanted a replacement that was secure, easy to use, and transparent to users. They were particularly wary of solutions that required software on BYOD. A second criterion for the solution was the ability to support migration to Office 365, which was looming in the near term.
Download PDF
Business Data Giant deploys Bitglass Next-Gen CASB
The global business data giant, handling business and financial data for much of the Global 2000, faced a challenge when it chose Google's G Suite for SaaS productivity. The firm's existing network-centric security hardware was not capable of understanding the semantics of G Suite to enforce corporate data security policies. Furthermore, users expected access from any device, anywhere, rendering the firm's existing security hardware ineffective. The enterprise decided to use a Cloud Access Security Broker (CASB) to secure G Suite. However, three of the four vendors they considered could only support API-based visibility and control of corporate data, which was not sufficient for the firm's legal team.
Download PDF
Healthcare Leader Secures BYOD with Next-Gen CASB
The regional health insurance leader wanted to provide mobile email access to their employees while complying with HIPAA regulations. The challenge was to ensure that Protected Health Information (PHI) remained under the company's control at all times, as 75% of breaches in the healthcare sector are attributed to lost and stolen devices. The company's first attempt at solving the BYOD challenge involved device management software from Good Technology, which was quickly rejected by employees due to usability and privacy concerns.
Download PDF
Global Telecom Giant deploys Next-Gen CASB
The international telecom conglomerate was facing a pressing concern of data breaches despite having all the latest security gear. Their customers were finding breaches impossible to prevent and were looking to the telecom giant for help. The CTO and his team set out to evaluate the spectrum of early breach detection products on the marketplace. They first considered APT appliances, but quickly ruled them out as they could not scale to the high levels of traffic experienced by the firm’s clients. Next, the team considered various SIEM apps, but those required a huge amount of manual oversight from trained professionals to monitor the overwhelming number of alerts generated.
Download PDF
S&P 500 Beverage Maker Secures BYOD
The S&P 500 beverage manufacturer was struggling to implement a secure Bring Your Own Device (BYOD) program for its globally distributed workforce. The company's IT team was concerned about the risk of corporate data being present on deprovisioned devices. Initial deployments of MobileIron and SAP Afaria, two mobile device management (MDM) solutions, proved challenging and were adopted by fewer than ten users. Employees were concerned about potential privacy violations with the installation of corporate security software on their personal mobile devices. The firm’s IT team found it impossible to install and configure MDM agents on thousands of devices, given the numerous variations of operating systems and device types that come with BYOD.
Download PDF
Drug Giant Discovers Data Breach
The global pharmaceutical giant, with over 20,000 employees, was facing a significant challenge in terms of its security posture. The newly appointed CISO wanted to evaluate the existing security infrastructure. Despite having a high-end firewall from a leading vendor, the company was still at risk. The Bitglass Breach Discovery Engine identified several high-risk Shadow IT cloud apps on the network. One unsanctioned cloud app was particularly concerning as it was used by employees to sync their contact lists and calendars. However, the most alarming discovery was the identification of three major risks: an internal IP in contact with a TOR node, twelve internal nodes in contact with a fake DNS server hosting phishing sites, and over thirty internal IPs contacting confirmed Malware hosts outside the firewall.
Download PDF
Freight Giant Uncovers Breach with Next-Gen CASB
The multi-national transportation company was undergoing their annual audit when they decided to use Bitglass to catalog Shadow IT cloud apps on their network for their annual compliance report. The auditors uploaded two weeks of firewall logs, approximately 2M log lines per day, for Bitglass to analyze. The Bitglass Breach Discovery Engine identified four high-risk cloud apps widely used on the network: YouTube, MSN, Facebook, Dropbox, and Evernote. The company had previously blocked Gmail and Yahoo due to security concerns. These cloud apps were a compliance risk and merited mention in the annual audit. However, the Bitglass Breach Discovery Engine also uncovered a TOR (The Onion Router) node operating within the corporate network, which was a significant security concern.
Download PDF
Wall Street Firm Discovers Zero-day Threat
The mid-sized technology company, which provides services to high-value targets on Wall Street, was facing a significant cybersecurity threat. Despite having a high-end 'Next-Gen-Firewall' installed, the firm discovered that ten internal IPs were contacting Malware Command and Control destinations outside the firewall. Some of the internal IPs had multiple malware infections. The firm was an ideal back door for hackers who could inject malware into the service provider, gain access credentials to their customers, and exfiltrate high-value data without being detected. The average breach lasts almost eight months, posing a significant risk to the firm and its clients.
Download PDF
MSC Secures Global Access with CensorNet MFA
Mediterranean Shipping Company (MSC), a global leader in container shipping, faced a challenge in securing access for its employees who required off-site use of Citrix published applications, regardless of their location in the world. The company was also transitioning its remote working environment from a VPN solution to Citrix, aiming to provide a more flexible and intuitive operating system for remote workers. However, securing access to this new system was crucial. With the rise in security threats, two in three network breaches involve lost or stolen passwords. MSC was aware of this and wanted to change the domain authentication they were using after a penetration test highlighted the need for maintaining the highest level of security for the business.
Download PDF
Royal Russell School: Safeguarding 1,500 users by going beyond web security
Royal Russell School, a coeducational independent day and boarding school based in South London, needed to safeguard its children online. It specifically needed to uphold their data rights in data protection law, as children are classified as vulnerable data subjects. This meant Royal Russell needed an enterprise-class threat detection system to protect its community as they browsed the web and accessed applications in the cloud. With end-of-life web security, it was clear they needed to engage a new solution to protect its large school community of 1,500 users including pupils and staff. They also needed to protect the number one attack surface: email, and effective email filtering was vital.
Download PDF
Forward Financial Bank Secures Sensitive Data with CensorNet’s Multi-Factor Authentication Solution
Forward Financial Bank, a community-focused financial institution, was faced with the challenge of providing their remote employees with secure access to highly sensitive financial data without overburdening their IT department. The bank had previously used a token-based solution, which proved to be expensive, required a lot of management, and was unintuitive for the users. The hardware tokens were difficult to manage and would expire, leading to constant reordering. The bank was in search of a more efficient and user-friendly solution.
Download PDF
Harrowells Solicitors Enhances Remote Working Security with CensorNet MFA
Harrowells Solicitors, a regional law firm based in the north of England, needed to develop a more secure environment for remote working. The firm wanted to improve the productivity of its workforce, enable more flexible working arrangements, and allow external partners to connect to its systems. Employees wanted to be able to work from home, or work when they were travelling. They were also using lots of different types of devices – tablets, laptops and smart phones. The nature of the Harrowells business also meant that employees handle very sensitive client information, so data security is of paramount importance. From a mobile working perspective, the requirement was to be able to provide an additional layer of security to the firm’s systems and applications, whilst at the same time enabling employees to work from any location using whatever device they needed to.
Download PDF
Borsen Secures Remote Working Environment with Censornet MFA
Borsen, Denmark’s leading business publisher, had a remote access system in place for its workforce of 230, allowing journalists to work from home and on the move. However, the remote access to systems and applications was only secured with user names and passwords. The IT department was concerned about the vulnerability of the system, knowing that almost two thirds of network breaches involve weak or stolen passwords. The security of the entire system was only as good as the weakest password, which was a significant risk.
Download PDF
Amey government contract customer case study
Amey, a leading public and regulated services provider in the UK, was working with a government contract customer to provide secure remote access for their staff. This remote access was vital for maintaining workforce productivity levels. However, the existing solution, which used traditional two-factor authentication with a combination of hardware and software tokens, was inconvenient, difficult to use, and expensive to maintain. This hindered user productivity and made their jobs more difficult. Furthermore, with security threats proliferating and almost two-thirds of network breaches involving weak or stolen passwords, there was a need to upgrade the user authentication solution to better protect the remote access environment.
Download PDF
Radius Payment Solutions looks to achieve the highest levels of cyber security
Radius Payment Solutions is a global business-to-business services company providing fuel cards, electric vehicle charge points, vehicle tracking, telecoms and insurance. The company operates worldwide and has a turnover of over £2.5 billion. As an ISO27001 accredited and Cyber Essentials Plus certified business, the highest levels of security are vital to protect its customers’ information – as much of it is financial and therefore sensitive. With content being shared across the globe, it’s essential that the company’s IT teams have visibility and control over where data is stored and what information leaves the business. Radius was looking for a platform that would provide the protection and control they needed and with additional functionality. However, more importantly, they were looking for a solution that met both the technical requirements of the business and was provided by a partner with whom Radius had confidence in building a long-term strategic relationship.
Download PDF
Intility Implements Censornet’s Self-Service Password Reset Solution
Intility, a managed cloud provider, was facing a challenge with its password policy. The policy required users to frequently change their passwords, which led to users often forgetting their passwords and needing to contact the help desk for assistance. This resulted in a strain on Intility’s helpdesk function, which had to handle a growing number of password-related calls. Additionally, security was a concern as it was difficult to verify the identity of the person requesting the password reset.
Download PDF
Samuel Simmonds Memorial Hospital Implements CensorNet’s Secure Web Gateway
Samuel Simmonds Memorial Hospital (SSMH) is located in a remote location in Barrow, on Alaska’s North Slope, 360 miles north of the Arctic Circle. The hospital was constructed in 1963 to provide a critical access facility to residents of an area larger than the state of Washington. The hospital's prime objective has been to provide culturally sensitive quality healthcare for the communities of the Arctic Slope. The rebuilding of the hospital provided the perfect opportunity to update technical equipment. The challenge was to provide effective web filtering in this remote location to ensure that the hospital complies with the Health Insurance Portability and Accountability Act (HIPAA). This protects the privacy and security of health information, in order to guarantee patient and staff confidentiality. The remote location of the hospital had placed a greater than normal temptation to use the internet for non work-related activities.
Download PDF
Cloetta Secures Cloud Environment with USS Web Security
Cloetta, a successful confectionery business in Europe, has been utilizing commodity services and applications to reduce its infrastructure footprint and smart-source some business-critical processes. Remote working and cloud services are integral parts of the company's strategy to increase productivity and grow the business. However, the openness of its IT architecture posed a threat to the security of its confidential information. The use of cloud applications and the increase in remote working meant that more employees were using the internet to access services and gather information, which in turn increased the chance of getting infected by malicious applications. Cloetta was also the target for cyber threats that proliferate through the use of email, such as phishing, spam, viruses, and other malware.
Download PDF
The Disabilities Trust: Neutralising insider threats and protecting patient data
The Disabilities Trust, a UK-based charity, was facing significant insider threats and the growing risk of ransomware attacks. It needed a total overhaul of its web and cloud application security to protect staff and patients alike. The organization's user activity and privacy controls needed significant attention. The biggest threat was the insider threat – inside out, not outside in. Whether that’s leavers exfiltrating the organization's IP or confidential patient information being unwittingly shared on public forums, the impact could be critical – both reputationally, and for the people they support.
Download PDF
Censornet quenches security thirst at Thatchers cider
Thatchers, a cidermaker based in Somerset, has been growing significantly over the last ten years and had outgrown many of its systems and applications. As a result, it had become much more vulnerable to security breaches. With more and more sophisticated threats, Thatchers looked to reduce their risk of being attacked. Senior IT Engineer, Hamish Ross and his team were keen to prevent Thatchers falling victim. They urgently needed to lock down their systems and prevent an attack. First on Thatchers’ priority list was an email filtering system that was straightforward to manage, could scale easily as the business continues to grow and could protect the business from malicious emails that could have viruses attached or links to infected sites.
Download PDF
DTU (Technical University of Denmark) Case Study
DTU, one of the leading technical universities in Europe, faced the challenge of providing secure access to a wide range of systems and applications for its 1400 employees. The university's IT service function serves a wide range of departments, university entities, and affiliated companies who benefit from their modern IT setup and infrastructure. Employee remote access from across Europe is enabled through a number of login systems including Citrix, Cisco, and SSH. Initially, users accessing these systems were required to carry around hardware tokens for authentication when logging in. However, the token-based setup was becoming increasingly time-consuming to manage and was causing frustration for both users and the IT team managing the solution.
Download PDF
Onecom Case Study
Onecom, the UK’s largest independent business telecommunications provider, needed a centralised security platform that could protect its 400+ employees outside of the traditional workplace perimeter, while minimising demand for internal IT resources. The company was looking to grow rapidly in the next three to five years, so having a security solution that could scale alongside the company was very important. Onecom was particularly looking to protect employees from email attacks, such as phishing, and threats over the web, as well as save the IT team time and resources when it came to implementing security solutions alongside maintaining the highest levels of compliance.
Download PDF
Produce World takes fresh approach to security with CensorNet
Produce World, a major supplier of fresh vegetables in Europe, operates across multiple sites and relies heavily on remote working. With employees needing access to company systems from various locations, including farms, customer premises, and home, the company faced a significant challenge in ensuring secure and convenient access. The rise in security threats, particularly phishing, necessitated a robust solution. The company had been using a hardware token-based two-factor authentication system, but recognized the vulnerabilities associated with relying solely on usernames and passwords.
Download PDF
test test