• >
  • >
  • >
  • >
  • >

Case Studies.

Add Case Study

Our Case Study database tracks 22,657 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (6,653)
    • (2,601)
    • (2,127)
    • (945)
    • (676)
    • (312)
    • (229)
    • (194)
    • (163)
    • (141)
    • (135)
    • (114)
    • (100)
    • (53)
    • (28)
    • (2)
    • View all
  • (5,642)
    • (2,469)
    • (1,692)
    • (826)
    • (497)
    • (441)
    • (353)
    • (84)
    • (1)
    • View all
  • (5,571)
    • (2,178)
    • (1,766)
    • (643)
    • (425)
    • (422)
    • (416)
    • (291)
    • (225)
    • (213)
    • (213)
    • (48)
    • (8)
    • (8)
    • (7)
    • (1)
    • View all
  • (5,247)
    • (2,179)
    • (1,715)
    • (1,321)
    • (250)
    • (10)
    • View all
  • (2,881)
    • (1,448)
    • (574)
    • (376)
    • (210)
    • (183)
    • (174)
    • (158)
    • (154)
    • (152)
    • (80)
    • View all
  • View all 15 Technologies
  • (1,985)
  • (1,985)
  • (1,915)
  • (1,679)
  • (1,629)
  • (1,613)
  • (1,446)
  • (1,247)
  • (1,221)
  • (1,179)
  • (1,156)
  • (1,097)
  • (1,075)
  • (979)
  • (847)
  • (824)
  • (735)
  • (608)
  • (593)
  • (493)
  • (482)
  • (387)
  • (343)
  • (342)
  • (340)
  • (271)
  • (247)
  • (211)
  • (203)
  • (201)
  • (181)
  • (179)
  • (148)
  • (142)
  • (117)
  • (87)
  • (83)
  • (71)
  • (65)
  • (58)
  • (24)
  • (9)
  • View all 42 Industries
  • (8,728)
  • (4,742)
  • (3,618)
  • (3,233)
  • (2,947)
  • (1,692)
  • (1,498)
  • (1,332)
  • (1,315)
  • (1,032)
  • (892)
  • (362)
  • (337)
  • View all 13 Functional Areas
  • (3,304)
  • (2,787)
  • (2,603)
  • (2,006)
  • (1,630)
  • (1,625)
  • (1,561)
  • (1,369)
  • (1,043)
  • (732)
  • (725)
  • (711)
  • (690)
  • (647)
  • (601)
  • (574)
  • (521)
  • (486)
  • (472)
  • (470)
  • (434)
  • (416)
  • (410)
  • (364)
  • (356)
  • (352)
  • (340)
  • (315)
  • (305)
  • (302)
  • (271)
  • (257)
  • (252)
  • (242)
  • (237)
  • (235)
  • (229)
  • (229)
  • (222)
  • (214)
  • (188)
  • (183)
  • (176)
  • (167)
  • (147)
  • (145)
  • (143)
  • (142)
  • (142)
  • (139)
  • (137)
  • (133)
  • (130)
  • (121)
  • (120)
  • (119)
  • (119)
  • (119)
  • (115)
  • (105)
  • (99)
  • (98)
  • (96)
  • (96)
  • (91)
  • (90)
  • (86)
  • (85)
  • (84)
  • (83)
  • (81)
  • (80)
  • (69)
  • (67)
  • (65)
  • (62)
  • (62)
  • (61)
  • (58)
  • (58)
  • (55)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (41)
  • (40)
  • (40)
  • (38)
  • (37)
  • (33)
  • (33)
  • (31)
  • (29)
  • (29)
  • (28)
  • (27)
  • (23)
  • (22)
  • (22)
  • (19)
  • (19)
  • (18)
  • (18)
  • (17)
  • (17)
  • (17)
  • (17)
  • (15)
  • (13)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (8)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 129 Use Cases
  • (13,581)
  • (5,296)
  • (4,272)
  • (3,520)
  • (2,856)
  • (1,288)
  • (1,239)
  • (360)
  • (10)
  • View all 9 Services
  • (504)
  • (432)
  • (416)
  • (382)
  • (301)
  • (291)
  • (246)
  • (240)
  • (222)
  • (218)
  • (211)
  • (204)
  • (180)
  • (167)
  • (143)
  • (139)
  • (132)
  • (131)
  • (121)
  • (116)
  • (115)
  • (113)
  • (112)
  • (109)
  • (107)
  • (107)
  • (107)
  • (104)
  • (92)
  • (91)
  • (89)
  • (88)
  • (86)
  • (85)
  • (85)
  • (84)
  • (80)
  • (78)
  • (77)
  • (75)
  • (75)
  • (73)
  • (72)
  • (72)
  • (72)
  • (69)
  • (69)
  • (68)
  • (67)
  • (67)
  • (67)
  • (65)
  • (65)
  • (64)
  • (64)
  • (62)
  • (60)
  • (58)
  • (58)
  • (56)
  • (55)
  • (55)
  • (54)
  • (54)
  • (54)
  • (53)
  • (53)
  • (53)
  • (53)
  • (53)
  • (52)
  • (52)
  • (52)
  • (52)
  • (51)
  • (51)
  • (51)
  • (50)
  • (50)
  • (48)
  • (48)
  • (47)
  • (47)
  • (46)
  • (46)
  • (46)
  • (45)
  • (43)
  • (43)
  • (43)
  • (42)
  • (42)
  • (41)
  • (41)
  • (40)
  • (40)
  • (40)
  • (40)
  • (39)
  • (38)
  • (38)
  • (37)
  • (36)
  • (36)
  • (35)
  • (35)
  • (34)
  • (33)
  • (33)
  • (32)
  • (32)
  • (32)
  • (32)
  • (32)
  • (32)
  • (31)
  • (31)
  • (31)
  • (31)
  • (31)
  • (31)
  • (30)
  • (30)
  • (30)
  • (30)
  • (30)
  • (30)
  • (30)
  • (30)
  • (29)
  • (29)
  • (29)
  • (28)
  • (28)
  • (28)
  • (28)
  • (27)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (26)
  • (25)
  • (25)
  • (25)
  • (25)
  • (25)
  • (25)
  • (24)
  • (24)
  • (24)
  • (24)
  • (24)
  • (24)
  • (24)
  • (24)
  • (23)
  • (23)
  • (23)
  • (23)
  • (23)
  • (23)
  • (22)
  • (22)
  • (22)
  • (21)
  • (21)
  • (21)
  • (21)
  • (21)
  • (20)
  • (20)
  • (20)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 1083 Suppliers
Selected Filters
22,657 case studies
Sort by:
Cloudy Skies Bring Heavy Traffic to Buienradar’s Weather Websites -  Industrial IoT Case Study
Cloudy Skies Bring Heavy Traffic to Buienradar’s Weather Websites
Buienradar’s network was split across a primary and secondary data center, each with a cluster of web servers connected using carrier-grade routers and switches. The network traffic, mainly HTTP, was spread across the servers using load balancers. However, the relatively low performance numbers of the company’s legacy load balancers meant they had to be deployed in Direct Server Return (DSR) mode, causing server responses to bypass the load balancer and disabling many advanced features. When the legacy load balancers reached end of life, Buienradar sought a more robust replacement. Additionally, Buienradar needed a new generation server load balancer capable of providing Global Server Load Balancing (GSLB) to handle their distributed network with geographically separate data centers. Another criterion was the impending depletion of IPv4 addresses, necessitating readiness for IPv6 clients.
Download PDF
William Penn University chooses Absolute to protect endpoints in student laptop program -  Industrial IoT Case Study
William Penn University chooses Absolute to protect endpoints in student laptop program
While the CWA student laptop program is viewed a success by everyone involved, the Information Services Department at William Penn saw two significant challenges to the program: lost or stolen laptop computers, and students dropping out and not returning their laptops to the University. “We had a real problem with laptops not being returned to the College after students withdrew from their programs without graduating” says Dan Morgan, Director of Information Services and Curtis Gomes, Information Technology Supervisor at CWA.
Download PDF
St. Joseph Home Care Network is Confident of HIPAA Compliance with Absolute DDS -  Industrial IoT Case Study
St. Joseph Home Care Network is Confident of HIPAA Compliance with Absolute DDS
In 2010, St. Joseph transitioned to an electronic medical records (EMR) provider, so that patient care professionals could bring tablets with them during their home visits. Because these tablets would be carrying sensitive patient data, St. Joseph needed to implement a technology that could monitor the devices off the local network and maintain visibility to ensure the integrity of the stored data.
Download PDF
Peace of mind for one of Denmark’s largest technology colleges thanks to Absolute -  Industrial IoT Case Study
Peace of mind for one of Denmark’s largest technology colleges thanks to Absolute
Over a period of a year, the college suffered from a number of thefts and 56 devices were stolen. These thefts were frustrating for the college as not only was it was proving expensive to replace the laptops each time they were stolen but it could take up to 20 working days for a replacement to be delivered. This had a real impact on the teaching staff as they struggled to prepare for lessons without a laptop. Syddansk Erhvervsskole decided to look for a solution that would enable it to quickly recover its laptops in the event of theft.
Download PDF
Storage Networking Industry Association eliminates device theft with Absolute -  Industrial IoT Case Study
Storage Networking Industry Association eliminates device theft with Absolute
Given the high stakes, losing a laptop was not really an option. “In this case, we knew that regardless of how prevalent laptop theft might be, we also knew we couldn’t afford to lose any machines,” Bauer reflected. Bauer understands how technology can be used to solve larger business challenges. By stepping back and looking at the whole picture, Bauer recognized that there had to be a way to draw together the seemingly disparate elements of how an organization functions and how technology can be used to solve the specific problems of loss prevention, data protection and regulatory compliance: “If you implement solutions that address the root of a problem, then quite often subtle technological modifications can invoke sweeping organizational change.”
Download PDF
Greenville Health System Leverages Absolute’s HIPAA-Compliant Data Security and Recovery Services -  Industrial IoT Case Study
Greenville Health System Leverages Absolute’s HIPAA-Compliant Data Security and Recovery Services
Greenville Health System needed to secure devices and sensitive medical information across a large and growing network of employees and devices. They required a scalable, always-connected security solution to lock down devices, remotely delete sensitive information, and ensure encryption to industry standards. The organization faced challenges in measuring risk exposure, monitoring device theft, and maintaining compliance with HIPAA regulations.
Download PDF
Absolute Enables Personalized Learning at Loudoun County Public Schools by Minimizing Risk and Increasing Device Utility -  Industrial IoT Case Study
Absolute Enables Personalized Learning at Loudoun County Public Schools by Minimizing Risk and Increasing Device Utility
In order to bring this initiative forward, the budget needed to be approved by the board. Demonstrating device utilization rates on and off the school network was required to drive consensus that teachers did need to have a laptop and take them home, and that students were intensively using their laptops in the classroom. Additionally, even though in the past some desktop computers were occasionally stolen, laptops were obviously more vulnerable to theft and security was required on the device to protect the new investment.
Download PDF
Proactive device security at Auburn Washburn USD -  Industrial IoT Case Study
Proactive device security at Auburn Washburn USD
Don Williams, AW’s Technology Coordinator, describes laptop theft as costly and inconvenient; it overstretches available resources and interrupts the workflow of both staff and students. As school boards often face a rigid budget, maximizing IT investments is essential. Each time a lost or stolen asset has to be replaced, the budget is challenged. Williams explains that current economic conditions have intensified the need to get the most out of IT assets, requiring AW to be particularly “proactive and reactive” in minimizing loss and maximizing the lifespan of their computer population.
Download PDF
Centre Hospitalier Universitaire tackles device theft with Absolute -  Industrial IoT Case Study
Centre Hospitalier Universitaire tackles device theft with Absolute
CHU de Clermont-Ferrand was losing an average of two devices each month to theft. Sensitive patient data was secured as it was hosted in the hospital’s data centre but device theft created a considerable disruption to the end user’s work, not to mention the extra IT resources required to replace and configure a new device each time. Hervé Grandjean, Head of Administrative Information and Services for CHU de Clermont-Ferrand, needed to find a practical and cost-effective to secure his endpoints.
Download PDF
Sacred Heart Hospital Protects Devices and Patient Data with Absolute -  Industrial IoT Case Study
Sacred Heart Hospital Protects Devices and Patient Data with Absolute
Sacred Heart Hospital has dramatically increased the number of laptops they provide to nurses, physicians, and other staff to enable more effective patient care. However, with the move towards portable devices, Sacred Heart needed to effectively monitor the devices and have a solution in place where the hardware, as well as the sensitive data stored on these devices, were protected regardless of the device location or the user.
Download PDF
Cayman Islands Ministry of Education Manages Assets and Protects Devices with Persistence Technology -  Industrial IoT Case Study
Cayman Islands Ministry of Education Manages Assets and Protects Devices with Persistence Technology
These devices are Ministry assets and require an added level of protection. A number of device thefts instigated the search for a solution that would help the Ministry retrieve these devices and serve as a deterrent for future theft. With 3,000 devices spread across more than 6,000 students and teachers, a stolen laptop represented not only a lost investment but a road block to student progress.
Download PDF
Absolute the key in “biggest bust ever” at University Police Department -  Industrial IoT Case Study
Absolute the key in “biggest bust ever” at University Police Department
The faculty and staff at the College are assigned Hewlett-Packard tablet computers, while the students at the College of Business enjoy free 3-hour checkout privileges to HP tablets owned by the College. Students pursuing minors in Business studies also receive access. Colorado State University needed a way to track these devices as they changed hands and ensure they were protected throughout.
Download PDF
Arizona’s fastest-growing School District offers laptops in the classroom -  Industrial IoT Case Study
Arizona’s fastest-growing School District offers laptops in the classroom
As with a growing number of school districts across North America, Dysart is increasingly turning to laptops and mobile devices as an everyday learning tool in an effort to produce better results in the classroom and prepare students for life in the new century. The move is evident in the District’s work with device manufacturer HP. The District’s laptop learning program began with the purchase of 1,000 desktop and 300 notebook computers. This expanded quickly, adding more than 1,700 devices with a goal of putting 5-6 in selected District classrooms.
Download PDF
Hundreds of thousands saved makes Absolute a “no brainer” for Kansas City, Kansas Public Schools -  Industrial IoT Case Study
Hundreds of thousands saved makes Absolute a “no brainer” for Kansas City, Kansas Public Schools
When first told of plans for the 1:1 program, the school, parents, and the local community voiced a common concern: that of student safety. With devices come theft and the misdemeanors that surround it. What if students were bullied to hand over their laptop? Would the program attract thieves? And how could an already tight IT budget overcome the sunken costs of loss due to theft? For KCKPS, proving that these concerns were addressed was a crucial step in gaining approval.
Download PDF
Absolute diminishes the threat and fear of violent theft for Swedish pupils -  Industrial IoT Case Study
Absolute diminishes the threat and fear of violent theft for Swedish pupils
The mobile devices are a huge educational benefit to students, but giving expensive items to young people to use anywhere runs the risk of loss, theft or older children taking devices from younger ones. Kungälvs Kommun found that on average around 17 devices a year were going missing. But despite the loss of the devices, the main concern for Kungälvs Kommun was the potential risk of harm that pupils faced if they were to be threatened with violence during a theft.
Download PDF
Absolute Strengthens Asplundh’s Security Posture by Self-Healing Critical Endpoint Applications -  Industrial IoT Case Study
Absolute Strengthens Asplundh’s Security Posture by Self-Healing Critical Endpoint Applications
With most endpoints off the corporate network on a regular basis, it was difficult for Asplundh to manage and secure their deployment efficiently and ensure endpoint protection at all times. Despite their best intentions, users would unintentionally compromise endpoint security and compliance by either disabling DLP, anti-virus or other security applications or installing incompatible software that would remove corporate protection processes and policies. The impact of just one vulnerable device could severely impact their business. If a criminal targeted an Asplundh vehicle, the device and data was at risk, potentially damaging Asplundh’s brand and resulting in penalties for non-compliance.
Download PDF
Absolute protects the laptops of the Intelligrated mobile workforce -  Industrial IoT Case Study
Absolute protects the laptops of the Intelligrated mobile workforce
The company has grown rapidly in the last four years through consolidations, acquisitions, and because their conveyors, sorters and palletizing systems are in such high demand. Because of this, the number of laptops have increased, and the ability to track and manage them has become increasingly difficult. The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute.
Download PDF
Capital Guardian Youth ChalleNGe Academy tracks laptops and protects sensitive data with Absolute -  Industrial IoT Case Study
Capital Guardian Youth ChalleNGe Academy tracks laptops and protects sensitive data with Absolute
The CGYCA is currently configured to support up to 176 cadets on campus. The 12 campus buildings (including dorms) are spread across 29.7 acres. The challenge was to ensure that cadets had access to computers during the program to complete classroom work and exams, especially after the GED examination moved from a paper-based to a paperless test. Additionally, there was a need to protect these laptops from theft and ensure the security of sensitive data related to underage cadets.
Download PDF
UK School’s stolen laptops tracked and recovered from India -  Industrial IoT Case Study
UK School’s stolen laptops tracked and recovered from India
Having already suffered a theft from the school, Jon Bullard, Laleham Gap’s network manager wanted a solution that could protect both devices and the students. “I was really keen to find a solution that would prevent laptop theft. It was important that if we did have any thefts we could recover the laptop to minimise any inconvenience. Additionally, if the person or people involved in the theft could be brought to justice, so much the better,” said Mr. Bullard.
Download PDF
As Cybersecurity Exposure Grows, Trusource Labs Taps Arctic Wolf for Security Operations -  Industrial IoT Case Study
As Cybersecurity Exposure Grows, Trusource Labs Taps Arctic Wolf for Security Operations
Due to the nature of its business, Trusource has access to vast client databases housing personally identifiable information for tens of thousands of individuals. That means a security breach could have devastating consequences, so the company is always concerned about email security and phishing attacks. With global clients representing a broad range of industries, including healthcare and financial services, Trusource must ensure compliance with a whole spectrum of regulations in its handling of client data. What’s more, as a rapidly growing business that ramps up quickly during seasonal periods, its IT team must always be wary of potential malicious actors among its own workforce. For these reasons and others, Trusource knew it needed more than the endpoint and firewall protection it had in place. It sought an all-encompassing security solution that could defend against potential threats anywhere and anytime, without exhausting its existing IT staff and resources. Trusource considered building a security operations center (SOC) internally, but in the end decided a SOC-as-a-service solution was the best choice.
Download PDF
Arctic Wolf Remedies Jackson Parish Hospital’s Security and Compliance Pain -  Industrial IoT Case Study
Arctic Wolf Remedies Jackson Parish Hospital’s Security and Compliance Pain
Jackson Parish Hospital faced significant challenges in managing its IT infrastructure and ensuring cybersecurity. With limited IT resources and expertise, the hospital struggled to monitor a diverse environment that included endpoints, physical and virtual servers, and cloud services. Compliance with HIPAA and PCI DSS was also a critical requirement. The hospital's IT infrastructure was outdated, and there was a lack of comprehensive visibility and documentation. Dr. Jason Thomas, the COO and CIO, recognized the need for a solution that could provide visibility, ensure compliance, and proactively address cybersecurity threats.
Download PDF
Valley Strong Credit Union Bolsters Security and Compliance Using Arctic Wolf for Security Operations -  Industrial IoT Case Study
Valley Strong Credit Union Bolsters Security and Compliance Using Arctic Wolf for Security Operations
Valley Strong Credit Union faced significant challenges in maintaining visibility across a diverse IT environment, monitoring and responding to security incidents, and locating, training, and retaining IT and security expertise. The credit union's IT infrastructure includes over 600 workstations, nearly 200 servers, and various IP phones, routers, switches, and access points. The 36-member IT team, including a small team of security specialists, struggled to protect member data and oversee the diverse environment. Additionally, the technology hubs of Southern California and Silicon Valley attracted much of the local talent, making it difficult for Valley Strong to find and retain skilled IT professionals. The credit union initially tried to monitor its environment internally and later engaged Dell SecureWorks as a managed security service provider (MSSP). However, SecureWorks could not meet Valley Strong's security requirements or provide the necessary business flexibility.
Download PDF
Arctic Wolf Helps Gifford Health Maintain a More Proactive Approach to Cybersecurity -  Industrial IoT Case Study
Arctic Wolf Helps Gifford Health Maintain a More Proactive Approach to Cybersecurity
Beyond saving lives and improving patient quality of life, the healthcare industry faces another daunting task—safeguarding patient data, business operations, and revenue from today’s cybercriminals. As cyberattacks in healthcare become more sophisticated, hospitals will face increased exposure to malpractice claims and potential lawsuits, according to Moody’s Investor Service. The situation is especially difficult for smaller healthcare providers that lack the financial means to weather a data breach. Many of these providers haven’t invested in the kind of technology that can improve their security posture against the growing legion of threat actors. Gifford Health Care knows this situation well. After learning of a breach at a large nearby university health system—and tens of millions of dollars in fines as a result—Gifford’s security team knew it was time to act before they also found themselves on the receiving end of a devastating cyberattack.
Download PDF
Arctic Wolf Helps Southern US-Based Construction Company Stay Protected and Reduce Cyber Risk as It Moves to the Cloud -  Industrial IoT Case Study
Arctic Wolf Helps Southern US-Based Construction Company Stay Protected and Reduce Cyber Risk as It Moves to the Cloud
As more organizations leverage digital technology, processes become more efficient, and the speed of doing business accelerates. However, digitization expands the attack surface, particularly for companies in the supply chain. A southern US-based construction company recognized the growing threats and the need to bolster its defenses. The company had limited visibility with former security solutions and vendors and needed to strengthen its security posture following a cyberattack. The leadership was initially concerned about the cost of new security solutions but changed their stance after frequent reports of increasing attacks in their industry.
Download PDF
Arctic Wolf® Gives Scott Equipment ‘Peace of Mind’ While Helping Company Improve Security Maturity -  Industrial IoT Case Study
Arctic Wolf® Gives Scott Equipment ‘Peace of Mind’ While Helping Company Improve Security Maturity
Many organizations that were previously analog-only and brick-and-mortar first have found themselves digitizing more and more as technologies and business needs change. This digitization helps the business grow and thrive, but it also widens an attack surface and creates new cyber threats that weren’t previously present. Many organizations in this position find themselves behind the curve when it comes to cybersecurity, IT staffing, and proactive security measures. They are innovating when it comes to their business model, but struggling to stay ahead when it comes securing and expanding their IT environment. Scott Equipment is a perfect example of that kind of organization. The construction equipment company has been providing the best heavy-duty construction equipment, working with world-class manufacturers, and providing equipment servicing since before cyber threats were a common problem. But as Scott Equipment has grown over the decades, so has their digital footprint. Now the company relies just as much on emails, networks, and digital assets as it does bulldozers and cranes. Keeping their networks and IT systems protected is now as critical for their business continuity as their ability to provide great equipment and customer service. But with a lean IT team, the organization has not been able to meet the security demands of a changing business landscape. Five years ago, Scott did not have multi-factor authentication for their Microsoft Office accounts. That oversight resulted in accounts being compromised through phishing attacks. For the small IT team, it was a lot to clean up and a major wake-up call about their cybersecurity and lack of control. They immediately implemented new security measures, including MFA, and started re-prioritizing security efforts. But as that incident lived in their memory, another threat started looming on the horizon: ransomware.
Download PDF
Manufacturer Protects Intellectual Property With ThreatDefend Platform -  Industrial IoT Case Study
Manufacturer Protects Intellectual Property With ThreatDefend Platform
A major problem the organization had with their cyber security infrastructure was that they had extremely limited visibility into the subnets that contained their most critical data. If these subnets were breached, the team would have significant difficulties detecting the threat inside. Another challenge the organization was facing was the number of alerts that were generated by their other security devices. The alerts generated were not only high in volume, but many times were false positives or unsubstantiated. The impact that the alerts had on the team was that they were unable to conduct the research necessary on these alerts to decipher between substantiated alerts and false positives. Therefore, they could not be confident that if they escalated an alert it would not be a false positive and a waste of resources to investigate. A situation such as this is extremely problematic for any infosec team because it forces them to choose between wasting resources investigating false positives or hoping that their incident response tools will be good enough to remediate an advanced threat that had penetrated their system. Facing this choice, the team was not confident in their security controls to protect their critical intellectual property.
Download PDF
Major Energy Provider Chooses Deception Technology to Better Protect Critical Assets -  Industrial IoT Case Study
Major Energy Provider Chooses Deception Technology to Better Protect Critical Assets
Existing perimeter defenses were not providing adequate visibility into the organization’s complex network environment. Their environment was diverse, with systems and topologies unique to their business, such as SCADA systems and the typical user and datacenter spaces. Any solution needed to scale and be able to detect intruders in this diverse environment without adding excessive workload to the Information Security team.
Download PDF
Dutch Technology eXperts (DTX) Turns to Automox to Provide Full-Service Endpoint Security to Its Customers -  Industrial IoT Case Study
Dutch Technology eXperts (DTX) Turns to Automox to Provide Full-Service Endpoint Security to Its Customers
DTX offers security monitoring and vulnerability management services to their customers, where they help these organizations discover what systems are vulnerable to potential breach or attack. With the massive shift to remote work and the growing complexity of their customers’ IT infrastructure, many of their customers are unable to stay up to date and in control of the IT requirements necessary to tackle a significant increase in disclosed vulnerabilities. While DTX also provides some patching support, they were limited to patching only Microsoft Windows systems. They were looking to offer additional support for macOS, Linux, and third-party applications without the traditional increase of complexity.
Download PDF
Law school has greater control and confidence patching multi-platform devices in the cloud -  Industrial IoT Case Study
Law school has greater control and confidence patching multi-platform devices in the cloud
We manage a base of approximately 700 users consisting of mostly students and about one hundred faculty and staff. We’re a mixed Mac and Windows environment of about 160 machines. An added challenge is that our faculty works all over the world so it’s very important that we’re able to manage machines remotely. The legal education industry relies on an increasing variety of third party software-as-a-service (SaaS) platforms, which means we need to be able to patch both local and cloud-based applications. For years we didn’t have any sort of central patching. We just relied on endpoint devices to pick up updates for Windows OS and software such as Adobe and MS Office. We evaluated SCCM but it was costing the university $30 per endpoint and that cost became painfully prohibitive when passed on to each department. That solution also didn’t enable us to keep third party software patched or allow us to patch offline or off-premise computers, which left our campus infrastructure vulnerable. The unique security challenge in higher education is the tension between being open, allowing academic freedom, and making sure that faculty and students are free to pursue their research and exploration of knowledge, while still keeping them secure. Having a really strong and effective patching system is critical to being secure while preserving the principle of academic freedom.
Download PDF
New Zealand Reseller Sold On Cloud-Native Patching Solution for Greater Flexibility and Improved Visibility for Its Customers -  Industrial IoT Case Study
New Zealand Reseller Sold On Cloud-Native Patching Solution for Greater Flexibility and Improved Visibility for Its Customers
Customers are increasingly moving to IT estates with servers located in the cloud and on-premises. Additionally, user endpoints are more distributed and are connecting to corporate systems from anywhere. How to manage these hybrid corporate IT infrastructures has become increasingly complex, and zero trust security architectures demand different management approaches to function effectively. As corporate systems expand outside of the organizational perimeter, organizations can no longer rely on the corporate network to protect corporate systems. Patching and endpoint hardening must be treated with a sense of urgency, considering that a large portion of known malware is exploiting vulnerabilities that have been in the wild for a prolonged period. Timely patching is becoming more important to chief information security officers to better protect their expanding network infrastructure.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that AGP may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from AGP.
Submit

Thank you for your message!
We will contact you soon.