Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Network Security
Applicable Industries
- National Security & Defense
- Telecommunications
Applicable Functions
- Sales & Marketing
Use Cases
- Tamper Detection
- Usage-Based Insurance
About The Customer
Glatfelter Insurance Group (GIG), founded in 1951, is an all-lines, full-service insurance broker providing property, casualty, life, accident, and health insurance products and services to individuals, businesses, and organizations. Based in York, Penn., this employee-owned organization employs more than 450 associates who serve in excess of 20,000 customers in all 50 states and Canada, placing GIG among the nation’s top 25 privately owned insurance brokers. Central to GIG’s business philosophy is the understanding that prompt and considerate claims service is the organization’s ultimate responsibility to its customers. GIG’s unique culture, operating structure, and strong market relationships enable it to offer an impressive portfolio of value-added products and services designed to help every client manage risk.
The Challenge
Glatfelter Insurance Group (GIG), a leading insurance broker, faced a significant challenge in supporting its home-based sales executives. The company markets its Volunteer Firefighters Insurance Services (VFIS) products and programs through independent agents and a network of sales executives who work from their homes. To support these sales executives, GIG implemented new customer relationship management (CRM) and imaging applications with a Web interface. However, the remote access via toll-free dialup was slow, and telecommunications costs were soaring as these associates frequently stayed connected all day. GIG needed a faster, more cost-effective, and secure way for sales executives to access sales-support information and communicate with underwriters and claims professionals.
The Solution
GIG implemented Check Point UTM-1 Edge appliances to provide high-speed remote access to all its home-based VFIS sales executives. These devices, ideal for connecting remote offices securely over low-cost, high-bandwidth VPNs, proved to be the cost-effective solution GIG was seeking for home deployment. The UTM-1 Edge appliances extend the company’s network perimeter security, putting a Check Point firewall between the dangers of the Internet and every home office and GIG’s corporate IT resources. Incorporating firewall, VPN, intrusion prevention, and antivirus features in one appliance, UTM-1 Edge gives GIG a complete security solution for its home-based sales executives. For traveling executives who require remote access, Check Point Endpoint Security ensures that their laptops are not chinks in the company’s defenses. It gives GIG laptops an endpoint firewall that can be managed from a console at headquarters and that can ensure the laptops meet antivirus, OS patch, and other requirements before they connect to the network.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.