Case Studies
    ANDOR
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
    ANDOR
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
    ANDOR
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
    ANDOR
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
    ANDOR
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
    ANDOR
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 732 Suppliers
Connect?
Please feel encouraged to schedule a call with us:
Schedule a Call
Or directly send us an email:
19,090 case studies
Case Study missing? Just let us know via Add New Case Study.
19,090 Case Studies Selected
USD 0.00
Buy This List
Compare
Sort by:
Blaze Networks fires up endpoint security business
When it comes to managed IT services, cloud-enablement is essential to delivering premium-level offerings. Blaze Networks, a security-focused managed service provider (MSP) was unpleasantly surprised when its prior cybersecurity solution was struggling, resulting in delayed virus definitions and policy updates. Further, since the solution vendor offered sub-par technical support, Blaze was forced to solve the issues with extensive troubleshooting, which was a drain on internal resources. Seeking an alternative offering, Blaze Networks evaluated several cybersecurity solutions and selected Bitdefender GravityZone Cloud MSP Security as the basis of its endpoint security.
Download PDF
Creditsafe earns high scores for hybrid cybersecurity
Businesses want to verify that prospective partners are financially viable, with strong credit histories. Offering the industry’s most predictive scoring algorithms, Creditsafe helps businesses make sound, informed decisions about engaging with other firms. Creditsafe must ensure its information is secure from cyberattacks, while maintaining superior system performance for its employees and high virtualization density for optimal efficiency. The company’s prior security solution offered IT limited visibility and reporting about outbreaks. Its scanning of servers and laptops would also slow system performance and reduce productivity of users. To resolve these issues, Creditsafe conducted proofs of concept against a range of competitive solutions.
Download PDF
Clay County Schools District teaches cyberthreats a lesson
In today’s classroom, learning takes place online as much as it does with books. That means school systems must keep students and teachers safe online and comply with the Children’s Internet Protection Act (CIPA). With thousands of user devices and a myriad of operating systems and browsers, the School District of Clay County knows this is no easy feat. The district tried the Kaspersky solution, but virus scans slowed device performance. As a result, the information services (IS) team turned off many of the solution’s security features, leaving endpoints vulnerable to cyber threats. IS tried Microsoft System Center Endpoint Protection and had a similar problem. Then it deployed Avast, which crashed 90 percent of the computers.
Download PDF
Company takes out advanced security threats with precision
Security was once a regional affair at this company. As a global operation, they used separate installations of Sophos solutions for the Americas, Asia-Pacific, and Europe. The challenges were that security management was not centralized, policies were not always consistent, and security reporting and analytics were not easily shared. When IT wanted to consolidate the Sophos installations, it discovered the solution lacked the ability to centrally manage its far-flung global environments. In addition, Sophos was regularly missing infections, putting an increased burden on IT to manually resolve issues and restore data from affected systems. Sophos scanning also made workstations run more slowly. In response, IT evaluated and tested Symantec, Bitdefender, as well as a newer Sophos solution. Bitdefender GravityZone was the stand-out choice.
Download PDF
Caring for the disabled with elite, affordable security
Protecting the confidentiality of personal data is the highest priority for Lebenshilfe Heinsberg e.V. The association's IT assets are vital to service, and any computer malfunctions would force staff to manually document their activities and electronically capture the information later. The same applies to medication plans. The workshop uses an ERP system to keep withdrawal and inventory records on hand. Losing any of this data would severely disrupt operations: both human resources and accounting are entirely software-based. Several years ago, budget pressures forced the IT department to replace the software it relied on for protection against malware: the vendor decided to discontinue a program that allowed Lebenshilfe e. V. to use it under a campus license, raising costs 15-fold. This prompted decision-makers to search for a new, affordable security solution.
Download PDF
Bechtle expands presence in virtual security
Listening to your customers is important, as the large European IT systems integrator Bechtle knows well. When customers increasingly requested Bitdefender solutions, Bechtle conducted a technical and business evaluation and decided to form a new value-added reseller partnership.
Download PDF
Home services provider raises cybersecurity bar for global businesses
The company, a U.K.-based global home repair and improvement services provider with 8.4 million residential customers, was seeking to standardize cybersecurity capabilities and centralize visibility across the infrastructure for its federated businesses in Europe, North America, and Asia. To address these objectives, the company standardized its cybersecurity environment on Bitdefender Managed Detection & Response (MDR) Enterprise.
Download PDF
Cybersecurity posture ranks high at university
When security software slows down endpoint performance to the point that it must be disabled, the solution no longer has any value. That’s what happened at a large university when its Sophos security software required significant computing resources, preventing virtual servers from functioning properly. Sophos was running on user workstations but reduced performance during scans and hampered user productivity. In addition, the solution burdened IT staff since it was painful to manage and deploy to endpoints and was often unsuccessful with blocking infections. The university’s IT team evaluated security solutions from Bitdefender, Trend Micro, and Cylance, and selected Bitdefender GravityZone Business Security Enterprise.
Download PDF
INglass redesigns cybersecurity strategy for better protection
In computer-aided design, advances in graphics rendering and modeling have demanded increasingly powerful computers. When a security solution at INglass, a plastics industry manufacturer, slowed down performance of workstations used by design engineers, complaints from users began to mount. The security software also generated frequent false positives, disrupting user productivity, and burdening the IT staff. In response, INglass considered cybersecurity solutions from Bitdefender, CrowdStrike, Cylance, Symantec, F-Secure, and Kaspersky. Bitdefender GravityZone stood out as the superior option for the company’s requirements.
Download PDF
Unified security solution drives growth for Virtual Vision
As cybersecurity threats have increased in volume and variety, Virtual Vision (V2), a cloud and managed service provider in Saudi Arabia, sought to provide customers with a unified endpoint security solution that addressed a broad range of requirements. In addition, V2’s existing endpoint security solutions were complex to use, as well as consumed significant compute resources, causing workstations and servers to run more slowly. After evaluating and testing several endpoint security solutions, V2 added Bitdefender GravityZone Cloud MSP Security to its offerings.
Download PDF
Close partnership drives business success at Pragma Computers
In the early years of business operations, Pragma Computers did not steer customers to a particular security solution. That all changed when the company formed a strategic partnership with Bitdefender about ten years ago. By joining forces with Bitdefender, Pragma Computers gained access to new growth opportunities in the cybersecurity world, as well as new technical skills and abilities. As a result, Pragma Computers capitalized on the newly acquired advantages, and business development exceeded expectations in a short period of time.
Download PDF
Leading Australian property group leverages Bitdefender’s reporting to improve security strategy
Over more than 25 years, Charter Hall has grown to become one of Australia’s leading property groups, and listed on the Australian Securities Exchange in 2005. With a distributed workforce of approximately 50 locations, and a remote working model to manage, Platforms and Infrastructure Manager Josh Carter, was looking for a security solution to protect 200 Virtual Servers and over 500 endpoints. Their incumbent solution was disparate, with different protection on the server and endpoints, inefficient reporting abilities, no hypervisor protection and generally felt “outdated, inadequate and not suited to virtualization” and therefore increased their business risk.
Download PDF
Magic Cloud takes security performance to new heights
As a service provider, Magic Cloud has more than its own operations to worry about. The company also has hundreds of customers running their businesses from its cloud-based infrastructure. That demands reliable, high-performing, secure operations. But Magic Cloud’s previous security solution was creating performance and manageability problems. For example, when antivirus scans kicked in, application performance dropped. Quite often, their previous solution consumed too much CPU power when updating a client server. And more than once, antivirus would find false positives and remove critical files that shut down several virtual machines (VMs) at a time. In addition, the management server provided limited insight, forcing IT to spend hours of painstaking manual effort to recover a deleted file.
Download PDF
Northstar elevates quality of IT services with cybersecurity
When you’re in the business of helping organizations manage their IT environments, security needs to be a top priority. Yet Northstar Services Ltd., a major IT services provider in the U.K., found that even with well-known security solutions, infections were attacking clients’ systems almost weekly and endpoints were running slowly. To address these shortcomings, Northstar’s engineers were consumed with labor-intensive infection cleanup, and operating system reinstallations. To reduce overhead and improve protection, Northstar conducted a market analysis of all the major security vendors and concluded the Bitdefender Cloud Security for Managed Service Providers (MSPs) offered the best solution.
Download PDF
BROMIUM CASE STUDY INTERPOL Washington
INTERPOL Washington faced significant security challenges including malvertising, email attachments, drive-by attacks, spear phishing, downloads, ransomware, and preventing data loss. They evaluated several vendors such as Cylance, Invincea, and SentinelOne before choosing Bromium. The primary drivers for selecting Bromium were to reduce the workload for their teams, eliminate crisis patch management, secure a mobile workforce, and protect business assets such as brand reputation and intellectual property.
Download PDF
Mosaic: Bromium’s Complete Endpoint Security Elevates Risk Posture
Paul Hershberger, director of security, risk and compliance at Mosaic, aimed to improve the company's overall risk posture by modernizing the computing environment and optimizing endpoint security. Mosaic faced advanced threats from state-sponsored bad actors, hactivists, external cybercriminals, and internal bad actors. Hershberger conducted a thorough risk assessment of Mosaic's existing security infrastructure, which included traditional threat-mitigation technologies like IDS, IPS, Web and email filters, desktop firewalls, antivirus, anti-malware, and anti-spam. Despite these measures, the residual risk was almost equal to the inherent risk, indicating that the current solutions were ineffective. Hershberger sought a more effective endpoint security solution and was introduced to Bromium's unique approach by a channel partner.
Download PDF
Bromium Case Study: National Membership Organization
The business faced significant security challenges before implementing Bromium, including zero-day threats, malvertising, email attachments, unauthorized file transfers, drive-by-attacks, watering holes, (spear) phishing, ransomware, persistent attacks, preventing data loss, and targeted attacks. The top purchasing drivers for Bromium were to secure a mobile workforce and protect business assets such as brand reputation and intellectual property.
Download PDF
Bromium Case Study: Masonicare Corporation
Masonicare faced significant security challenges including zero-day threats, email attachments, drive-by attacks, and ransomware. They evaluated Carbon Black before choosing Bromium. The primary driver for selecting Bromium was to reduce the workload for their security teams, particularly in terms of time spent investigating threats.
Download PDF
Nahdi Medical - Customer Success Story
Nahdi Medical Company faced the challenge of analyzing a vast amount of feedback from both employees and patients, which included comments on various topics such as employee salaries, vacation time, online pharmacy orders, delivery & pricing, and appointments. The primary issue was finding an error-free, accurate system that could analyze all the comments from patient voice data and surveys in Arabic without losing the nuances of the language. Existing text analytics solutions that translated non-English text into English first for sentiment analysis were not effective, as they diluted the nuances of Arabic text. Nahdi needed a solution that could seamlessly understand Arabic and its dialects, classify and categorize valuable feedback, and provide insights for strategic and focused decision-making.
Download PDF
Health-Links Success Story: Arabic Sentiment Analysis Solution
Health-Links faced several challenges in analyzing patient and employee feedback. The primary issue was the need for a robust, cloud-based sentiment analysis solution that could natively understand Arabic and handle mixed Arabic-English responses. The client needed to analyze a massive amount of unstructured text from over 12 million surveys annually. Manual interpretation was prone to human bias and errors, leading to inaccurate insights. The client required a solution that could provide sentiment scores for themes specified in the Saudi Complaints Taxonomy, enabling healthcare organizations to understand the pros and cons of their operations.
Download PDF
WakeUp! How a leading architecture firm boosted its patch success rates by 55%
Prior to their engagement with 1E, Sheppard Robson faced two major challenges. Firstly, the architecture sector is a regular target of cyberattacks, making it essential to keep software updated. However, the specialist software required by the firm’s employees was often enormous, causing updates to take an extremely long time. This necessitated managing updates outside of working hours, but they had no way of doing so with certainty. Secondly, the firm had sustainability targets to meet and a broader IT commitment to greater automation. The need to stay current with software updates and deploy the latest versions of highly technical tools caused Sheppard Robson to embrace Windows 10 and its servicing. However, the demanding update cadence created more trouble for end users, often resulting in chaotic Monday mornings where employees had to wait up to an hour and a half to log in. Additionally, the firm aimed to do more with less staff, focusing on automation to cover more bases with fewer people, making their operations quicker, simpler, and more effective.
Download PDF
How 1E and Tableau spun up a 5000-machine company in one week
The Tableau Conference 2016 presented significant logistical and technical challenges. With a record-breaking attendance of around 12,000 delegates and 5,000 laptops to manage, the event required a robust infrastructure to ensure smooth operations. The conference was spread across seven venues in Austin, Texas, adding to the complexity. Ensuring that all laptops were pre-loaded with the correct version of Tableau Desktop and ready for use in over 100 hands-on training sessions was a monumental task. The need for responsiveness and agility was paramount, as any small issue could disrupt the entire event. The traditional method of manually managing each machine was not feasible given the scale and time constraints.
Download PDF
US Bank Holding Company Achieves Federal Compliance Requirements Thanks to Nomad, Shopping and AppClarity
The company needed to build and migrate banking deployment systems quickly and efficiently. Additionally, a government bailout meant that the company was required to comply with federal mandates for migration – criteria it would be unable to meet using IBM’s manual migration processes. It also faced the challenge of manually identifying and installing applications once the OS was migrated.
Download PDF
From F to A: How 1E helped the US Department of Veteran Affairs (VA) make the grade
The US Department of Veteran Affairs (VA) faced significant challenges in managing one of the largest and most complex IT environments globally. With over 500,000 unique computing resources, including mobile devices, medical devices, workstations, BYOD systems, servers, and clustered environments, the VA struggled with software discovery, deployment, and usage calculations. The complexity was further compounded by the need to handle virtualized and clustered environments, making software licensing and compliance a daunting task. The VA's goal was to achieve a consolidated, de-duplicated, and normalized view of their entire IT environment, which required managing at least 300 million records of input data from multiple sources. Conventional inventory and management tools were inadequate for the scale and complexity of the VA's environment, leading to fragmented data and inefficiencies.
Download PDF
Multinational Engineering Firm Slashes Software Spend and Frees Up IT Team for Core Tasks
The company’s process to request and install software on end-users’ PCs was lengthy and resource intensive, hampering productivity and damaging the employees’ relationship with the IT department. The firm was spending too much on software outside of its enterprise agreement, as users were unaware of the cost implications. To resolve these issues, the company wanted an automated solution where users could choose, download and install software themselves quickly and easily, whilst being fully informed of the cost implications.
Download PDF
Cherokee County School District: Why Microsoft plus 1E is the best way to get to Windows 10
The Cherokee County School District (CCSD) faced significant challenges in managing approximately 40,000 PCs, all running Windows software. The primary issues included ensuring a strong network connection during Windows 10 upgrades, avoiding disruptions during critical tasks like registrations and test submissions, and managing the aggressive update schedule of the Windows 10 Servicing Model. The IT team needed a solution that could handle these challenges efficiently without causing interruptions to the educational process.
Download PDF
1E & Bacardi: a perfect cocktail for the Windows 10 era
In 2010, Bacardi decided to create a standard desktop lifecycle within the organization. The goal was to achieve a uniform environment for software deployment, security, and user experience across its 130 locations worldwide. However, the global dispersal of Bacardi's footprint presented several challenges in implementation. Initially, Bacardi's IT infrastructure was managed by a service provider using 1E solutions like Nomad and Shopping in conjunction with Microsoft's Configuration Manager (SCCM). Over time, Bacardi's IT team saw potential benefits in bringing the control of this infrastructure in-house, aiming for cost savings and increased agility, especially with the upcoming Windows 10 rollout.
Download PDF
PC Power Management: Claiming a Premium Environmental Footprint
On average, 60% of PCs were being left on after work on weekdays and over the weekend at Aviva. A key carbon efficiency measure implemented by the sustainable IT taskforce was a PC power management project with 1E.
Download PDF
US Brokerage Company Achieves Rapid Windows Migration, Meeting Federal Deadline
Having missed the transition from Windows XP to Windows 7, the company was determined to become an early adopter of Windows 8. It was prepared to meet its migration deadline by any means necessary, and had prepared for an army of on-the-ground technical resources to complete the migration manually. Although the company was open to an automated approach, the alternatives it looked at centered around native SCCM and only offered minimal time and cost savings.
Download PDF
Myanmar’s RedLink Communications Selects A10 CGNs to Improve Network Services
RedLink Communications faced significant challenges with IPv4 address scaling and exhaustion, which is a common issue for many Internet service providers. Traditional Network Address Translation (NAT) methods were breaking many applications, leading to a suboptimal user experience. The company needed a solution that could not only address the immediate IPv4 scaling concerns but also prepare the network for future connectivity demands, including the transition to IPv6. Additionally, RedLink required a solution that could provide high connection reliability and maintain established sessions during failover, all while being cost-effective and meeting service level agreements (SLAs).
Download PDF
test test