Case Studies
    ANDOR
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
    ANDOR
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
19,090 case studies
Case Study missing? Just let us know via Add New Case Study.
19,090 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
Veramed Case Study
Veramed, a contract research organisation in the pharmaceutical industry, faced a challenge in monitoring and protecting its staff in a cloud-only business environment. The company had never had on-premise servers or traditional perimeter security, making it difficult to keep staff safe from malware and inappropriate sites. As the company continued to grow, it needed to formalise its security to reassure customers that it was operating in line with stringent standards, such as ISO 271001. Veramed needed to improve its monitoring capabilities by strengthening its awareness of staff behaviour, enabling it to address any issues and provide users with education on safe, secure IT usage.
Download PDF
Alternative Solutions partners with Censornet to help protect customers’ data privacy and meet their stringent regulatory requirements
Alternative Solutions, a leading IT services company, was looking to streamline their product portfolio and displace legacy solutions with one cyber security platform that could deliver full-service cyber security across all core threat vectors for its customers and help them meet their regulatory requirements. The company also wanted to find a security vendor who could help them move away from perpetual license-based products due to demand from customers for consumption-based billing. The company had previously resold separate security products for email, web and cloud security from multiple vendors. The ideal scenario for them was a cloud product that provided integrated security across these channels for their customers.
Download PDF
National Portrait Gallery gets all of its security tools on one palette
The National Portrait Gallery, one of Britain’s best-loved museums, was seeking to improve its security posture and achieve the government’s Cyber Essentials security standard. The Gallery has a high public profile and receives funding from the government, public donations, and receipts from ticketed exhibitions, gift shop sales, and events. As the Gallery’s existing security contracts came to an end, Nicky Dowland, Head of Information Technology, sought a more advanced solution that would provide additional layers of security on a platform that was easy for a small IT team to manage, and that could help it achieve the Cyber Essentials security standard.
Download PDF
St Anne’s Community Services protects sensitive data with Censornet
St Anne’s Community Services, a not-for-profit organization that provides support to those in need across the North of England, faced the challenge of protecting highly sensitive data. The challenge of protecting confidential information has increased in recent years due to more stringent data privacy regulation through the GDPR, while digital transformation increases the volume and vulnerability of data. Visibility of where data is stored, and control over who has access to it and has the ability to share it is vital in this day and age. With St Anne’s already well on the way in its cloud transformation journey, having migrated to Microsoft Azure and Office 365, the charity needed an additional layer of security on top of what was provided as standard by its cloud services.
Download PDF
Tangerine Refreshers web security
Tangerine Confectionery, the UK’s largest own-label sweet manufacturer, was looking to move away from its legacy web security solution. The company has five sites across the country and employs 1,100 people. The priority for Tangerine was to ensure its employees were protected when browsing the web, both on and off-premise. The company trialled other solutions available in the market but found that they did not have the advanced functionality it was looking for, including the ability to protect employees offsite, and the flexibility to work with their existing IT architecture.
Download PDF
Thumbs down for malicious email viruses
Thumbs Up (Bury) Ltd, a manufacturer and supplier of plastic housewares and storage products, faced a major disruption to their business due to the infection of their computers with the Zeus Trojan. This disruption included downtime of their email system. The infection occurred while the company was in the process of swapping their email system from BTpop to Microsoft Exchange to improve productivity. However, even after the implementation of Microsoft Exchange, email-borne viruses continued to disrupt the business. In addition, about a week after the infection the company’s telephone lines were temporarily hijacked by hackers posing as BT engineers, so that if the bank phoned to verify any transactions the calls could be intercepted by the hackers and it would appear that they were speaking to the company.
Download PDF
Securing Remote Working for a Busy Law Firm
Capsticks, a leading national healthcare law firm, had a remote access system in place for its lawyers to log on from home or other remote locations. However, the remote access was only secured with a password. With over two-thirds of security breaches being down to weak or stolen passwords, Capsticks’ IT team were hyper aware of the vulnerability of the firm’s systems. As a law firm, many of the cases they deal with are very sensitive, so the data they store is confidential. They were conscious that where their remote working environment was concerned, their security was only as good as the weakest password used by their employees. They needed to find a solution and quickly. In addition to increased security, it was vital for Capsticks and its team of busy lawyers that the solution was a user-friendly one.
Download PDF
Pandora Implements CloudLock to Protect its IP and Ensure Confidential Information Like PII is Secured
Pandora, a leading internet radio company, has a highly mobile workforce that relies heavily on SaaS (Google Apps) and PaaS (Salesforce) for their daily operations. Google Drive is a crucial tool for Pandora's employees as it allows them to create, distribute, and update dynamic documents on active projects, and to share and collaborate both internally and externally. However, the security of Pandora’s shared documentation is a major concern. The company is keen on protecting its intellectual property and is concerned about data loss prevention. While employees rely on sharing documents to perform their jobs, the IT department is tasked with ensuring that sharing with external partners and vendors adheres to the company’s acceptable use policies and is done securely.
Download PDF
How a leading research university uses cloud security to protect its users, data and open culture
The University of Oklahoma (OU) is a world-renowned research institute with nearly 1 million square feet dedicated to public and private sector collaborations on its Research Campus. When the university moved to Office 365, OU grew concerned about the possibility of account compromises. OU recognized a need for more visibility into its cloud environment in order to protect its highly sensitive research data, as well as HIPAA and PHI data. The loss of this data would not only pose a risk to the university's reputation but could cost the university thousands of dollars and lead to loss of contracts or future research opportunities.
Download PDF
United States Holocaust Memorial Museum Selects CloudLock to Secure and Monitor Google Docs
The United States Holocaust Memorial Museum (USHMM) decided to migrate to Google Apps and included CloudLock in the project scope from the outset. The goal was to use CloudLock post-rollout as a means to ensure security and enable ongoing monitoring of sharing patterns as well as internal and external exposures. During the early rollout stages, USHMM also found CloudLock to be instrumental in the deployment process and implementing change management in the organization.
Download PDF
Guardian News and Media Selects CloudLock to Audit and Control Google Docs Sharing and Prevent Potential Data Loss
Guardian News and Media (GNM) implemented G Suite and Google Docs to provide the organization with a suite of collaboration tools that realize the cost savings of storing documents in the cloud. However, the nature of the business requires that documents can be shared outside the organization’s domain with 3rd party writers, vendors and others. This posed a risk of sharing sensitive information outside the domain, which needed to be mitigated.
Download PDF
The IT Team at AMAG Pharmaceuticals Implements Cisco Cloudlock for Access Management for Google Doc
AMAG Pharmaceuticals, a publicly traded biopharmaceutical company, was one of the first in its industry to adopt cloud services and migrate to Google Apps. However, this move presented a new set of challenges. As a publicly traded pharmaceutical company, AMAG had to comply with SOX and FDA regulations while also protecting the company’s intellectual property. With the adoption of Google Apps and the creation and storage of documents in Google Docs, the IT team at AMAG recognized a need for a solution that would provide visibility into user adoption, document growth, document classification, and control and visibility of document exposure to address compliance and governance requirements.
Download PDF
Teach For America Uses CloudLock to Increase Operational Efficiency
Teach For America, a national corps of top college graduates and professionals who commit to teach for two years in urban and rural public schools, faced a challenge during their intensive summer training program. The program, which involves approximately 5,800 first-year teachers, required a solution that allowed for collaboration, homework completion, and document access anywhere and anytime. The challenge was particularly pronounced when it came to sharing documents externally during this training time. Although Teach For America has a limited number of laptops and workstations, most teachers choose to bring their own device to the summer training program, thus requiring the team to find a solution that is secure, externally shareable, and accessible. Additionally, after the summer training institute and every year when staff transition, Teach For America needs to audit hundreds of accounts to ensure that documents and sites remain secure.
Download PDF
Bay Cove Human Services Selects CloudLock to Secure All 3rd Party Apps With Access to Their Google Apps Domain
Bay Cove Human Services, a not-for-profit organization, was facing challenges with the Google Apps ecosystem. While the online productivity suite was beneficial for messaging and collaboration among employees and external contractors, the freedom for end users to install and use 3rd party applications posed IT challenges. These included having complete visibility into all applications that are granted access to the domain, ensuring that 3rd party apps comply with the organization’s Approved Applications Policy, and classifying apps based on their risk profile. Many 3rd party applications ask for Google Apps domain permissions to be granted as part of their installation. This created exposure for end users and for the entire company’s domain, and created the potential for being taken advantage of by these applications, as well as by privileged users of the vendors behind them.
Download PDF
How cloud security keeps patient data safe
OSDE, one of Argentina’s leading healthcare providers, delivers high-quality healthcare to 2.2 million members across the country’s 23 provinces. In support of its mission to deliver top-quality healthcare to patients at its 400+ facilities, OSDE began in 2012 a system-wide migration to cloud-based G Suite (formerly Google Apps). While the move enabled better collaboration, it also meant increased sharing of highly sensitive personal data. Against the backdrop of healthcare’s intensifying ransomware crisis, OSDE sought a solution to offset the risk represented by a proliferation of mobile apps designed to interact with corporate accounts. The need to visualize the organization’s information flow—mapping what data is being shared with whom—led OSDE to consider a cloud access security broker (CASB).
Download PDF
Securing OUSD’s Cloud Mission: Enabling Digital Citizenship and Compliance
The Oakland Unified School District (OUSD) aspires to “focus on high academic achievement while serving the whole child, eliminating inequity.” They recognized cloud technologies as the means to make their vision a reality. However, when looking to adopt cloud applications, OUSD faced four primary cloud cybersecurity challenges: Compliance and Student Privacy Protection, Inappropriate Behavior and Cyberbullying, Suspicious User Behavior and Security Breaches, and Cloud Malware. They needed to protect a high volume of sensitive data, as dictated by a range of compliance regulations, and ensure students are not using digital platforms to engage in inappropriate activities. They also wanted to ensure any potentially anomalous behavior was rapidly identified and addressed.
Download PDF
Versatile Access Management Solutions Combine Convenience and Aesthetics with Enhanced Security
Rhapsody Property Management Services, a premier multifamily property management firm in Canada, was looking for an integrated access control system that was easy to use, reliable, and secure for their Central Parc property. The property, located in Laval, Quebec, is comprised of six buildings and a community center, offering residents an array of amenities and a beautiful one-acre park with an off-leash dog area. The challenge was to provide one-key access for residents that was easily maintained and reliable. The system needed to be scalable for future growth and versatile enough to complement any decor.
Download PDF
California Vacation Villas Improves Guest Safety and Convenience with Oracode Electronic Locks and Smart Controller for a Connected Experience
California Vacation Villas (CVV) is a full-service leasing and property management company that specializes in short-term vacation rentals. It manages a 70-unit inventory in Southern California’s beach and low desert resort areas. The company’s desert properties are subject to high temperatures. Therefore, these units often have high utility costs from frequent air conditioner use. CVV’s beach properties are exposed to salt air and beachfront weather conditions, which may lead to corrosion. Further, company President Quinn Tamm, knew that operators who use metal keys in lock boxes for guest and vendor access had concerns about lost keys and unauthorized duplication. He became interested in the growing “connected home” technology movement and its benefits for temperature control, security monitoring, and overall guest convenience. Tamm wanted to work with his owners to implement a technology solution that would make its units more secure with flexible, convenient guest access, and guarantee a long-lasting product life. He also wanted to install networked energy management controls that would monitor and reduce unnecessary power use.
Download PDF
Brindley Beach Vacations & Sales Relies on Oracode Keyless Locks and Smart Controller for Secure, Connected Units
Brindley Beach Vacations and Sales manages over 600 properties, many of which are located in remote areas near the Atlantic Ocean. These properties are exposed to the corrosive effects of salt spray and blowing sand, which can cause issues with the vacation rental locks. The company needed to ensure that their locks were in reliable operating condition to reduce the time their maintenance team spent responding to guest access issues. Additionally, several property owners wanted to lower their energy costs with smart thermostats, prompting Brindley to offer a 'connected home' environment to monitor and control energy usage. The company evaluated vacation rental access locks from leading providers to upgrade their existing units. They wanted secure, flexible keyless locks that could communicate wirelessly and were compatible with a remote monitoring system.
Download PDF
Greenville Technical College Northwest Campus Project Profile
Greenville Technical College (GTC) is a part of the South Carolina Technical Education System, providing affordable, quality education to residents throughout the state. As part of its commitment to provide up-to-date educational opportunities for area residents, GTC opened its Northwest Campus, a 110,000 sq ft, state-of-the-art high-tech facility. The challenge was to ensure safety, security, accessibility, and durability for the doorways of the Northwest Campus while maintaining aesthetic compatibility with the facility’s design.
Download PDF
Project Profile: East Middle School — Oak Creek, WI
The rapidly growing community of Oak Creek, south of Milwaukee, Wisconsin, faced the challenge of meeting the educational needs of its increasing number of K-12 students. The population had increased nearly 70% in twenty years, necessitating the construction of a new school. The $24 million, 180,000 sq ft East Middle School was designed to accommodate 1,000 students. However, the constant movement of energetic preteens put a heavy demand on both internal and external doorways throughout the school, requiring a robust and reliable solution.
Download PDF
City Hall & Court House — Greer, SC
Before the construction of Greer’s new city hall, municipal departments were scattered across 14 separate buildings, none of which were originally intended for civic purposes. The city had never had a dedicated town hall since its establishment in 1876, always resorting to repurposing other properties. The last property acquired was a post office built during the Great Depression of the 1930s. The architectural hardware in the new city hall and courthouse needed to meet the demands of reliability, durability, and accessibility.
Download PDF
NetMotion Mobility® Connectivity Software Keeps the Internet On for Utility Workers
4-County Cooperative includes a main office and five district offices spread out across 9 counties in Mississippi. Field teams rely on Internet connections to access the utility’s core work order system that creates efficient work scheduling around events such as storm repair. Workers are armed with Windows 7 laptops and Windows software. Relying on a cellular connection to access work applications, the laptops would often be unable to connect due to poor network coverage, bringing work order progress to a halt. Some linemen grew so frustrated that they abandoned their crippled laptops, resorting to pen and paper until they had time to open an IT ticket. Faced with unhappy employees and a system that often could not serve its intended purpose, Critcher and his team realized they needed a more reliable approach to keeping teams connected to the Internet while in the field.
Download PDF
Cox Communications Increases Field Technician Productivity with Reliable Connectivity from NetMotion Software
Cox Communications, a major cable provider in the U.S., was facing challenges with its field service communications. The company's 3,500 field-service technicians handle over six million work orders annually. However, these technicians were having difficulty connecting remotely to their work order management system, leading to delays in service. The company noticed that a significant amount of time was being spent on establishing a connection relative to work orders. Field staff were also frequently contacting the back office to gather customer information when a connection could not be made.
Download PDF
Mobile Performance Management Keeps Maritime Workers Connected
Heinen & Hopman, a maritime-industry specialist, was facing a challenge with their fitters who were struggling with connection problems at the work sites. The fitters use mobile phones, laptops, and tablets every day to do their jobs. They need a stable, reliable, and secure internet connection to be able to use applications, such as 3D visualisations of the ships that they are working on. Since the fitters mainly do their work in shipyards and other remote sites, they often had to deal with poor internet connections and regularly experienced connection drops. Reestablishing a connection is easy for an IT consultant to do, but it is a time-consuming chore for a project manager or fitter. Having to repeatedly re-establish VPN connections meant that they lost a lot of time and meanwhile, they couldn’t access the up-to-date, essential information they needed. For a time, workers tried carrying static versions of the drawings on their laptops for use on-site, but without a reliable connection and synchronisation the drawings were obsolete.
Download PDF
NetMotion Mobility® Helps Rental-Car Company Hertz Get Customers Back on the Road
Hertz operates more than 1,600 “off-airport” locations in urban centers and neighborhoods. These “Local Edition” sites lease cars, trucks and vans, often to nearby residents who are having their vehicles serviced or repaired. Agents use portable POS devices to help get customers quickly into their leased vehicles. However, these POS systems would regularly stall during transactions, causing long delays that frustrated customers. The tablets run Windows XP and use a variety of network connections: wired connections through the dock, Wi-Fi and AT&T cellular data service. When switching between networks, devices would often lose connectivity, requiring agents to re-start applications and the devices to attempt to get online again. But these extra steps frustrated staff and customers alike.
Download PDF
Amica Claims Adjusters Increase Productivity with NetMotion Mobility®
Amica Mutual Insurance, a well-established insurer, faced a significant challenge with its field team of 3,200 operating from 40 offices across the U.S. The claims adjusters, who often travel hundreds of miles to meet with customers, reported difficulty getting and staying connected to key applications while on the road. This was a significant issue as adjusters use multiple applications on their Panasonic laptops to collect and share information during the claims process. Therefore, reliable cellular network access was imperative to keep the process running smoothly and ensure they meet their next customer at the scheduled visit time.
Download PDF
NetMotion Mobility® Has Deputies’ Back Through Confidence in Connectivity
The Sheriff’s Office in Coweta County, Georgia, was struggling with a mobile VPN that triggered connectivity issues and cut off front-line personnel from receiving vital alerts. This left them extremely vulnerable. The VPN’s “traffic light” indicator in the system tray was supposed to show green when connected, yellow for connectivity issues, and red for not connected at all. However, the VPN was freezing, also leaving the status indicator frozen in the connected state. This was a major problem as it could potentially put the deputies in danger if they were not receiving alerts about dangerous situations.
Download PDF
Genomic Health Case Study
Genomic Health, Inc. is a leading provider of genomic-based diagnostic tests that address both the overtreatment and optimal treatment of early-stage cancer. The company's flagship line of gene expression tests for breast, prostate, and colon cancer have been used to guide treatment decisions for more than 600,000 cancer patients worldwide. The company processes a large volume of data, which made using the cloud an obvious decision. However, enabling cloud in a secure manner was a challenge. The company needed to discover all cloud apps, keep Protected Health Information (PHI) on premises or protect it in the cloud, and monitor usage and enforce policies in Box and across other unsanctioned apps.
Download PDF
Nuna Case Study
Nuna, a healthcare technology company, was facing challenges in understanding cloud usage and comparing services side-by-side. They had little ability to find and protect electronic protected health information (ePHI) and other sensitive data. They also needed improved visibility and control over sanctioned services including Google G Suite, Slack, and Box. As a rapidly-growing company that’s moving large numbers of healthcare records from Medicare and related organizations into its own systems for analysis, Nuna needed to treat the ePHI in its environment with extreme caution. They needed to have full visibility and ways to protect and control the ePHI that comes into its possession, irrespective of delivery.
Download PDF
test test