M1 Future-Proofs its Infrastructure with Comprehensive Security and Unified Visibility Across Cloud, Network and Endpoints
Technology Category
- Cybersecurity & Privacy - Application Security
- Cybersecurity & Privacy - Network Security
Applicable Industries
- National Security & Defense
- Telecommunications
Use Cases
- Cybersecurity
- Tamper Detection
Services
- Cloud Planning, Design & Implementation Services
- Cybersecurity Services
About The Customer
M1 is Singapore's first digital network operator, providing mobile, fixed line, and fiber services to more than two million customers over its Next Generation Nationwide Broadband Network (NGNBN). M1 offers a wide range of mobile and fixed communication services to consumers. Its extensive suite of business services includes symmetrical connectivity solutions of up to 10Gbps, as well as managed, cloud, cybersecurity, Internet of Things, and data center solutions. With a mission to drive transformation in Singapore's telecommunications landscape, M1 began with its own digital transformation journey, seeking to improve agility and deliver a holistic, highly personalized customer experience.
The Challenge
M1, Singapore's first digital network operator, embarked on a digital transformation journey with the aim of improving agility and delivering a highly personalized customer experience. The company designed its all-digital platform on four fundamental pillars: cloud-native for scalability, data analytics for actionable insights, automation for efficient integrations, and hyper-personalization of services. M1's Azure cloud infrastructure supports everything from internal systems and tools to customer-facing systems and customer data. The challenge was to defend these assets against all cyber threat vectors, which was mission-critical. The company needed to safeguard services and customer data, defend a digital infrastructure across cloud, network, and endpoints, and increase security visibility across the enterprise.
The Solution
M1 chose Check Point Infinity Total Protection as an integral part of its 'secure-by-design' approach. This solution provides network security hardware and software with fully integrated endpoint, cloud, and mobile defenses. It includes the most advanced, real-time threat prevention against zero-day and emerging cyber attacks with 24x7 support and real-time updates. With Check Point CloudGuard Network Security, M1 gained immediate protection for its cloud assets and network through a virtual security gateway. Check Point automates and unifies advanced threat intelligence and prevention across all of the company's environments. Check Point Maestro Hyperscale Network Security enables M1 to seamlessly scale security defenses as-and where-needed with Terabit-per-second throughput. Web applications and APIs that enable third-party partner integration are automatically protected against malicious actors and by Check Point Cloud Guard Application Security. Check Point Harmony Email & Office secures essential business applications against phishing attacks and protects users from threats posed by malicious attachments and URLs. Check Point Harmony Endpoint protects all company endpoints, fixed and mobile, against the most imminent threats, such as phishing, ransomware, and malware.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.