Technology Category
- Analytics & Modeling - Machine Learning
- Sensors - Level Sensors
Applicable Industries
- Mining
- National Security & Defense
Applicable Functions
- Facility Management
Use Cases
- Cybersecurity
- Tamper Detection
About The Customer
Gnosis SpA is a leading biotechnology company with over 20 years of experience in microbial fermentation for oral- and injectable-grade, microbial-derived biopharmaceuticals. The company specializes in the fermentation, purification, and chemical synthesis of raw materials and natural finished products used in the pharmaceutical, nutraceutical, cosmetic, veterinary, and agricultural industries. With locations in Italy, Switzerland, the U.S., and China, Gnosis has grown rapidly, expanding its operations and increasing its attack surface.
The Challenge
Gnosis SpA, an Italian biotechnology company, was facing a growing security challenge due to its rapid expansion. The company's increased attack surface was becoming more susceptible to zero-day and other advanced threats. As a pharmaceutical company, Gnosis had to comply with strict government security regulations, which were increasingly focusing on system security in facilities such as laboratories and manufacturing facilities. However, Gnosis' legacy systems were not equipped to prevent advanced threats from gaining access. The company needed a more efficient, consolidated security solution that could protect its network, data, and communications between its headquarters and other sites. It was looking for a next-generation solution to protect against advanced threats targeting employees, visitors, suppliers, websites, and outgoing communications like email.
The Solution
After evaluating several cybersecurity providers listed in the Gartner Magic Quadrant, Gnosis chose Check Point SandBlast ZeroDay Protection to secure its networks and data against zero-day threats. It also deployed Check Point Next Generation Threat Prevention (NGTP) with multi-layered protection from known, signature-based threats. Gnosis utilized Check Point's firewall services, app control, intrusion prevention, perimeter antivirus, antibot, antispam, and URL filtering capabilities. It also adopted Threat Emulation and Threat Extraction technologies, which include evasion-resistant CPU-level exploit detection, machine learning, and Push-Forward Adobe Flash emulation. In addition to the NGTP capabilities that protect against all known threats, Gnosis chose SandBlast Zero-Day Protection, which protects SMTP, HTTP, and HTTPS traffic from all unknown threats—zero-day, cryptolocker, Advanced Persistent Threats (APT), and others. CPU Level Protection blocks malwares intended to bypass sandbox technologies protection.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Underground Mining Safety
The goal was to produce a safety system to monitor and support underground mining operations; existing systems were either too simple (i.e. phone line) or overly complex and expensive, inhibiting deployment, and providing little-to-no support in event of an accident. Given the dangerous nature of the mining work environment and the strict regulations placed on the industry, the solution would have to comply with Mine Safety and Health Administration (MSHA) regulations. Yet the product needed to allow for simple deployment to truly be a groundbreaking solution - increasing miner safety and changing daily operations for the better.
Case Study
Mining Firm Quadruples Production, with Internet of Everything
Dundee Precious Metal’s flagship mine, in Chelopech, Bulgaria, produces a gold, copper, and silver concentrate set a goal to increase production by 30%. Dundee wanted to increase production quality and output without increasing headcount and resources, improve miner safety, and minimize cost.
Case Study
Fastenal Builds the Future of Manufacturing with MachineMetrics
Fastenal's objective was to better understand their machine downtime, utilization, quality issues, and to embrace cutting-edge manufacturing technology/process improvement capabilities to bring their team to the next level. However, there was a lack of real-time data, visualization, and actionable insights made this transition impossible.
Case Study
Joy Mining Systems
Joy equipment faces many challenges. The first is machine integration and control. The business end of the machine has a rapidly-spinning cylinder with 6-inch diamond-studded cutting teeth. It chews through rock at rates measured in tens of tons per minute. The system grinds through the rock in front, creating a rectangular mine tunnel. Hydraulic lifters support the ceiling as the machine moves forward. Automated drills and screws drive 3-ft long screws into the ceiling to stabilize it. The rock and coal fall into a set of gathering "fingers" below the cutting cylinder. These fingers scoop up the rock and coal and deposit it onto a conveyor belt. The conveyor passes under the machine and out the back. A train of conveyor belt cars, up to a mile long, follows the cutter into the mine. The rock shoots along this train at over 400 feet per minute until it empties into rail cars at the end. Current systems place an operator cage next to the cutter. Choking dust (potentially explosive), the risk of collapse and the proximity of metal and rock mayhem make the operator cage a hazardous location.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.