Technology Category
- Cybersecurity & Privacy - Application Security
- Cybersecurity & Privacy - Endpoint Security
Applicable Industries
- Equipment & Machinery
- National Security & Defense
Applicable Functions
- Product Research & Development
Use Cases
- Remote Control
- Tamper Detection
Services
- Cybersecurity Services
About The Customer
NHS Blood and Transplant is an integral part of the National Health Service (NHS) in the UK. The organization collects, processes, stores, and issues approximately 2.1 million blood donations per year from its 15 blood centres in England and North Wales. In addition to dealing with blood donations, NHS Blood and Transplant conducts new research into improving the safety of blood and blood products, and the ways they can be used to help save lives. The organization stores confidential personal data as well as sensitive research data, making it imperative to have a robust data security solution in place.
The Challenge
NHS Blood and Transplant, a part of the National Health Service (NHS), is responsible for collecting, processing, storing, and issuing approximately 2.1 million blood donations per year. In addition to handling blood donations, the organization also conducts research to improve the safety of blood and blood products. This involves storing confidential personal data and sensitive research data, making it crucial for the organization to have a fail-safe data security solution. Although NHS Blood and Transplant already had a robust laptop and PC security solution in place as an existing Check Point customer, they needed to enhance the protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.
The Solution
After evaluating solutions from several vendors, NHS Blood and Transplant chose to deploy Check Point Endpoint Security. This is the first single agent for total endpoint security that combines a firewall, network access control, program control, antivirus, anti-spyware, data security, and remote access. It is designed to protect company laptops and PCs against malware, data loss, and other threats while enabling secure remote access to the corporate network. The solution was chosen for its ability to deliver comprehensive security in a single software agent that is easily deployed and managed from a single console. Check Point Endpoint Security also includes data security for preventing data loss and theft and a VPN client which provides secure remote access for employees working offsite.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Smart Water Filtration Systems
Before working with Ayla Networks, Ozner was already using cloud connectivity to identify and solve water-filtration system malfunctions as well as to monitor filter cartridges for replacements.But, in June 2015, Ozner executives talked with Ayla about how the company might further improve its water systems with IoT technology. They liked what they heard from Ayla, but the executives needed to be sure that Ayla’s Agile IoT Platform provided the security and reliability Ozner required.
Case Study
IoT enabled Fleet Management with MindSphere
In view of growing competition, Gämmerler had a strong need to remain competitive via process optimization, reliability and gentle handling of printed products, even at highest press speeds. In addition, a digitalization initiative also included developing a key differentiation via data-driven services offers.
Case Study
Predictive Maintenance for Industrial Chillers
For global leaders in the industrial chiller manufacturing, reliability of the entire production process is of the utmost importance. Chillers are refrigeration systems that produce ice water to provide cooling for a process or industrial application. One of those leaders sought a way to respond to asset performance issues, even before they occur. The intelligence to guarantee maximum reliability of cooling devices is embedded (pre-alarming). A pre-alarming phase means that the cooling device still works, but symptoms may appear, telling manufacturers that a failure is likely to occur in the near future. Chillers who are not internet connected at that moment, provide little insight in this pre-alarming phase.
Case Study
Premium Appliance Producer Innovates with Internet of Everything
Sub-Zero faced the largest product launch in the company’s history:It wanted to launch 60 new products as scheduled while simultaneously opening a new “greenfield” production facility, yet still adhering to stringent quality requirements and manage issues from new supply-chain partners. A the same time, it wanted to increase staff productivity time and collaboration while reducing travel and costs.
Case Study
Integration of PLC with IoT for Bosch Rexroth
The application arises from the need to monitor and anticipate the problems of one or more machines managed by a PLC. These problems, often resulting from the accumulation over time of small discrepancies, require, when they occur, ex post technical operations maintenance.
Case Study
Data Gathering Solution for Joy Global
Joy Global's existing business processes required customers to work through an unstable legacy system to collect mass volumes of data. With inadequate processes and tools, field level analytics were not sufficient to properly inform business decisions.