Technology Category
- Networks & Connectivity - Gateways
- Networks & Connectivity - Routers & Bridges
Applicable Industries
- National Security & Defense
- Telecommunications
Use Cases
- Inventory Management
- Tamper Detection
Services
- Cybersecurity Services
About The Customer
FIASA (Federazione Industria Artigianato per i Servizi Amministrativi) is an in-house business consultancy for companies associated with the Parma Industrial Union. It provides HR, accounting, finance, and health and safety services. As a provider of business services to two of Italy’s largest trade associations, FIASA handles a wealth of highly sensitive personal and corporate data. This puts FIASA in the position of having to pay the utmost attention to protecting the data it holds. FIASA has a long history of taking cyber threats seriously, providing critical services such as payroll processing, invoice management, and overseeing accounts.
The Challenge
FIASA, an in-house business consultancy for companies associated with the Parma Industrial Union, faced a significant challenge in protecting its customers’ sensitive personal data and its own corporate data from cyber-attacks. The company had to adhere to strict GDPR regulations regarding the storage of customer data. Additionally, FIASA needed to support mobile working while simplifying security management. The introduction of GDPR and an evolving threat landscape led FIASA to re-evaluate its security position. The company aimed to strengthen threat prevention for around 200 users of the FIASA network, support mobile working, and reduce the strain on in-house management and help desk support.
The Solution
FIASA adopted Check Point 5000 Next Generation Firewall, Check Point SandBlast, and Check Point R80 Security Management to address its security challenges. These solutions offer a fully integrated, multi-layered approach designed to deliver maximum security without impacting performance. The gateways provide FIASA with the most advanced threat prevention security. Check Point SandBlast’s Threat Extraction feature checks every email entering the organization and immediately removes any suspicious attachments. The R80 security management dashboard allows IT staff to easily assess or implement new rules and create unified policies. The solution's ease of use and high-level performance have been particularly beneficial.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.