Technology Category
- Analytics & Modeling - Real Time Analytics
- Application Infrastructure & Middleware - Data Exchange & Integration
Applicable Industries
- Cement
- National Security & Defense
Applicable Functions
- Maintenance
Use Cases
- Cybersecurity
- Supply Chain Visibility
Services
- System Integration
- Training
About The Customer
Cybrary is an online training and career development platform that prepares the next generation of IT and cybersecurity professionals. The platform has a wide range of pages and training content that needs to be protected. The infrastructure team at Cybrary, consisting of only two people, was dealing with issues that their legacy web application firewall (WAF) could not address. As a security-focused organization, Cybrary needed to maintain their brand identity and ensure their security practice was cutting-edge. They needed a solution that could provide more context and visibility at the app layer and make more precise blocking decisions to stop bad web requests.
The Challenge
Cybrary, an online training and career development platform for IT and cybersecurity professionals, was facing a multitude of attacks across its APIs and web properties. Their legacy web application firewall (WAF) was proving inadequate in terms of usability and attack coverage. The two-person infrastructure team at Cybrary was grappling with issues that their legacy WAF could not address. The traditional model of blocking based on pattern matching, such as a specific SQL-injection string, was not effective for their needs. The legacy WAF was not only difficult to configure and debug but also provided incomplete attack coverage and blocked valid requests. It lacked real-time visibility, alerting, or a functional dashboard to monitor activity over time. As a security-focused organization, Cybrary needed to maintain their brand identity and ensure their security practice was cutting-edge.
The Solution
Cybrary sought a modern, feature-rich WAF solution that could be easily configured, block attacks, work natively within Kubernetes containers, and provide real-time alerting without requiring heavy maintenance investment. They chose to replace their legacy WAF with Signal Sciences after a successful two-week pilot. The pilot demonstrated the ease of use, performance, and availability of features required by the infrastructure team, including Slack integration and a unified dashboard, all working seamlessly with Kubernetes. Signal Sciences provided immediate value during the pilot, blocking attacks that the legacy WAF was missing. It also offered complete protection against OWASP Top 10, allowing Cybrary to quickly define, monitor, and take action on any web application or API transaction without extensive tuning. Additionally, Cybrary could protect their WordPress site without using any additional plugins.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
System 800xA at Indian Cement Plants
Chettinad Cement recognized that further efficiencies could be achieved in its cement manufacturing process. It looked to investing in comprehensive operational and control technologies to manage and derive productivity and energy efficiency gains from the assets on Line 2, their second plant in India.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Digital Transformation of Atlanta Grout & Tile: An IoT Case Study
Atlanta Grout & Tile, a Tile, Stone & Grout restoration company based in Woodstock, Georgia, was facing challenges with its traditional business model. Despite steady growth over the years, the company was falling behind the web revolution and missing out on the opportunity to tap into a new consumer base. They were using independent software from different vendors for each of their department information and workforce management. This resulted in a lot of manual work on excel and the need to export/import data between different systems. This not only increased overhead costs but also slowed down their response to clients. The company also had to prepare numerous reports manually and lacked access to customer trends for effective business decision-making.
Case Study
Enhancing Security and Compliance in Remitly's Global Money Transfer Service with Fastly
Remitly, an online remittance service, was faced with the challenge of securing its proprietary global transfer network. The company needed a security solution that could meet PCI requirements and protect customers' sensitive transactions through its mobile application. The solution had to be capable of defending against new and emerging attack types without impacting performance. Remitly also had to deal with irregular traffic patterns, such as a sudden spike in account transfers from a small network segment on the Pacific coastline of South America. The company needed to determine in real time whether such traffic indicated an attack or valid requests. A traditional web application firewall (WAF) would not be able to distinguish this traffic, potentially leading to customer frustration if the IP was blacklisted.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.