Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
- National Security & Defense
- Telecommunications
Applicable Functions
- Quality Assurance
Use Cases
- Tamper Detection
- Voice Biometrics
Services
- System Integration
About The Customer
Symsoft AB is a telecommunications company that enables operators to offer subscribers profitable new services, such as multimedia messaging. Their solutions have been used in high-profile events such as the 50th annual Eurovision Song Contest, where viewers cast votes via SMS text messages. Symsoft’s real-time solutions for messaging, billing, and data-packet services are used by major operators in Asia, Europe, and South America, reaching more than 80 million subscribers. Based in Stockholm, the company also has offices in Dubai and Ecuador. Despite having only 60 employees, Symsoft has a global reach, installing its software on servers shipped to customer locations across three continents.
The Challenge
Symsoft AB, a telecommunications company, provides innovative services to operators, enabling them to offer subscribers new services such as multimedia messaging. With a small team of 60 employees, Symsoft has a global reach, installing its Java-based software on open servers shipped to customer locations across three continents. The company is obligated to provide 24-hour support for its customers, requiring them to log on to the Symsoft network and connect remotely to customer installations anywhere. This global reach and remote access to customer's real-time, mission-critical systems make security a vital concern. Compromised security could lead to significant revenue losses for a customer and potentially damage Symsoft's reputation. As a software developer, Symsoft also needs to protect its main asset—its source code—from theft or damage by network intruders.
The Solution
Symsoft addressed its security challenges by using Check Point VPN-1 Pro software, a tightly integrated combination of firewall, VPN, and intrusion prevention technologies. This solution allows Symsoft to establish an IT infrastructure linking its distant offices, people, and customers through virtual private networks (VPNs) on the Internet. The Dubai office connects to the Symsoft internal network through a VPN-1 Edge appliance managed from Stockholm, ensuring that the office stays secure and information traveling between the two locations remains confidential. Remote Symsoft users, including office workers in Ecuador, gain secure access to the home network via VPN-1 SecureClient. This solution protects data during transmission and ensures compliance with the company’s desktop security policies for remote users. To further enhance security, Symsoft uses OPSEC-certified SafeWord for Check Point, which eliminates password risk by using tokens to generate new passcodes for every user login.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.