Customer Company Size
Mid-size Company
Region
- America
Country
- United States
Product
- F5 BIG-IP Local Traffic Manager (LTM)
- F5 BIG-IP Application Security Manager (ASM)
Tech Stack
- Content Management System
- Web Application Firewall
- Load Balancing Device
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Productivity Improvements
- Customer Satisfaction
- Cost Savings
Technology Category
- Application Infrastructure & Middleware - API Integration & Management
- Cybersecurity & Privacy - Network Security
Applicable Functions
- Sales & Marketing
- Business Operation
Use Cases
- Cybersecurity
- Supply Chain Visibility
Services
- System Integration
- Cloud Planning, Design & Implementation Services
About The Customer
Human Kinetics (HK) is a publishing company based in Illinois that specializes in producing print, online, and multimedia materials related to kinesiology. The company hosts its own e-commerce website and nearly 40 other educational and storefront sites, which together attract about half a million unique visits per month. HK had been custom-building and individually supporting the websites it hosts, but decided to deploy a content management system to build and support sites more efficiently. The new system also allowed users to upload content, necessitating the need for HK to protect its systems and users from potentially harmful content.
The Challenge
Human Kinetics (HK), a publisher of kinesiology-related materials, was facing significant challenges with its third-party network solution. The system had become unstable, inflexible, and difficult to support, leading to significant downtime. The solution was also impairing performance, which led to customer complaints and lost revenue. HK's previous solution could not track users' IP addresses, which was crucial for applying the correct currency to a user's order. This led to a flood of customer complaints as orders couldn't be processed without the correct currency information. The updates from the third-party vendor caused high latency and system instability, leading to frequent crashes and up to four hours of downtime per week.
The Solution
HK replaced its existing system with two F5 BIG-IP Local Traffic Manager Application Delivery Controllers and the F5 BIG-IP Application Security Manager web application firewall module. The F5 solution provided a new level of system flexibility, adapting to HK's network topology rather than requiring the network to adapt to the devices. The F5 devices also provided more granular information, making them more flexible and configurable. The F5 solution has not had any outages related to the devices since deployment, effectively reducing downtime to zero. The solution also improved security by enabling deep packet inspection, allowing HK to determine the exact cause of an error and how to fix it. The F5 solution also enabled HK to assign role-based access control, allowing different groups to make changes to their sites.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.

Case Study
Remote Temperature Monitoring of Perishable Goods Saves Money
RMONI was facing temperature monitoring challenges in a cold chain business. A cold chain must be established and maintained to ensure goods have been properly refrigerated during every step of the process, making temperature monitoring a critical business function. Manual registration practice can be very costly, labor intensive and prone to mistakes.

Case Study
Enel Secures Italian Power Generation Network
Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid. This grid:• Serves 31 million customers• Has a net installed energy capacity exceeding 31 gigawatts• Includes more than 500 power generation plants,including hydroelectric, thermoelectric, and wind• Is managed and monitored by Enel 24/7/365• Is operated by Terna, the Italian Transmission System Operator (TSO)Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.

Case Study
Retail Uses RFID to Enable Cold Chain Monitoring
Like most grocery retailers, Hy-Vee is faced with the challenge of providing the highest quality products to its shoppers. Shoppers want the longest possible shelf life from perishable products and expect a consistent product experience each time they shop. Controlling the quality of products sold leads to shopper loyalty, which is of paramount importance to the success of Hy-Vee. Before products arrive in stores, Hy-Vee's distribution centers (DCs) handle items including dairy products, fresh meats, seafood, deli items, produce and frozen goods, all of which have different temperature needs and sensitivities. During transit from suppliers to DCs, Hy-Vee has limited visibility and temperature management abilities due to large amount of supplier managed transportation. For instance, during a week-long transit, a supplier's carrier equipment may malfunction, causing an item to thaw and then refreeze once repairs are made. Hy-Vee sought help from TempTRIP, an RFID solution provider that focuses on shipping, storage, receiving, and temperature control. TempTRIP's EPC RFID tags use Impinj chips to monitor and report temperature readings throughout the shipping and receiving process. The tags can also be re-configured and re-used, a unique feature within the current market of temperature monitoring devices.

Case Study
Securing the Connected Car Ecosystem
In-vehicle communications and entertainment system hosts high-value or sensitive applications. API libraries facilitate communication and sharing of vehicle data. These API libraries are vulnerable to reverse engineering and tampering attacks and may even result in loss of passenger safety. Attackers can inject malware that may be able to migrate to other in-car networks such as the controller-area-network (CAN) bus which links to the vehicle’s critical systems. Software provided for dealers to interface with cars through the OBD2 port is vulnerable to reverse engineering and tampering attacks. Hackers may be able to abuse these tools to inject malicious code into the ECUs and CAN bus. Attackers can lift the cryptographic keys used, and use that to build their own rogue apps/software. Their cloned version of the original app/software may have altered functionality, and may intend to gain access to other in-car networks.