Technology Category
- Cybersecurity & Privacy - Network Security
- Networks & Connectivity - Gateways
Applicable Industries
- Cement
- National Security & Defense
Use Cases
- Construction Management
- Tamper Detection
Services
- Cybersecurity Services
- System Integration
About The Customer
BHN Dienstleistung GmbH & Co. KG is an external IT service provider. Its main customer is a medium-sized engineering company. BHN operates the company's entire IT infrastructure at around 60 global sites. BHN has deployed Check Point security solutions for almost 20 years. Detlef Stapel, a Team Leader for Windows Systems Environment and Security at BHN, and his ten-person international team, is responsible for providing users with maximum protection from Internet attacks. They use Check Point to protect each separate network at all their global sites, large or small, and everything within the networks.
The Challenge
BHN Dienstleistung GmbH & Co. KG, an external IT service provider, was tasked with operating the entire IT infrastructure for a medium-sized engineering company at around 60 global sites. The challenge was to expand the Check Point infrastructure by connecting and securing global subsidiaries, upgrading the perimeter gateway, and installing a new data center firewall. BHN had been using Check Point security solutions for nearly 20 years, and due to an increasing awareness of cyber threats and a growing number of user connections and requirements, a full security infrastructure upgrade was needed. The upgrade was to include the engineering company's global subsidiaries, integrate sites that did not yet have a Check Point infrastructure, and connect them to headquarters.
The Solution
To meet future demands, BHN decided to upgrade the entire security environment, which included 40 small sites, four larger sites, and the headquarters with up to 2,000 users. They chose Check Point products primarily based on performance, ensuring that additional security features could be added without impacting the user experience. The plan included upgrading and adding multiple different Check Point firewall clusters spread across the organization. Quantum Security Gateways were used, which include network security features such as firewall and VPN to securely connect remote sites. Mobile access was used to securely connect remote users. Identity awareness and application control were used to enforce user-based policy controls and provide safe access to the Internet. Anti-Bot was used to detect and block Command and Control communications, stopping the threat. Multiple Quantum Security Gateways were deployed in a cluster to ensure security was always available and protecting site assets. Monitoring was used to provide visibility of the entire security infrastructure.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
System 800xA at Indian Cement Plants
Chettinad Cement recognized that further efficiencies could be achieved in its cement manufacturing process. It looked to investing in comprehensive operational and control technologies to manage and derive productivity and energy efficiency gains from the assets on Line 2, their second plant in India.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Digital Transformation of Atlanta Grout & Tile: An IoT Case Study
Atlanta Grout & Tile, a Tile, Stone & Grout restoration company based in Woodstock, Georgia, was facing challenges with its traditional business model. Despite steady growth over the years, the company was falling behind the web revolution and missing out on the opportunity to tap into a new consumer base. They were using independent software from different vendors for each of their department information and workforce management. This resulted in a lot of manual work on excel and the need to export/import data between different systems. This not only increased overhead costs but also slowed down their response to clients. The company also had to prepare numerous reports manually and lacked access to customer trends for effective business decision-making.
Case Study
Enhancing Security and Compliance in Remitly's Global Money Transfer Service with Fastly
Remitly, an online remittance service, was faced with the challenge of securing its proprietary global transfer network. The company needed a security solution that could meet PCI requirements and protect customers' sensitive transactions through its mobile application. The solution had to be capable of defending against new and emerging attack types without impacting performance. Remitly also had to deal with irregular traffic patterns, such as a sudden spike in account transfers from a small network segment on the Pacific coastline of South America. The company needed to determine in real time whether such traffic indicated an attack or valid requests. A traditional web application firewall (WAF) would not be able to distinguish this traffic, potentially leading to customer frustration if the IP was blacklisted.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.