Customer Company Size
Large Corporate
Region
- Europe
Country
- Germany
Product
- PowerBroker
Tech Stack
- Linux
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Cost Savings
- Productivity Improvements
- Customer Satisfaction
Technology Category
- Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
- Software
Applicable Functions
- Business Operation
Use Cases
- Cybersecurity
Services
- System Integration
- Software Design & Engineering Services
About The Customer
XING is a social network for business professionals with approximately 14 million members worldwide, more than 6.7 million of whom are based in German-speaking countries. XING is a platform where professionals from a variety of industries can meet up, find jobs, colleagues, new assignments, cooperation partners and experts, and generate business ideas. The platform is operated by XING AG, which was founded in Hamburg, Germany, in 2003, has been publicly listed since 2006, and listed on the TecDAX since September 2011. XING has made several acquisitions to extend its position as the social recruiting market leader.
The Challenge
XING, a social network for business professionals, was facing a challenge with its existing privilege elevation process. The process was too time-consuming and did not allow for a consistent set of access rights. The company was seeking to improve command elevation from an administrative point of view, as well as establish better auditing features. Furthermore, XING needed to keep in mind a number of regulatory and compliance requirements related to German privacy and related laws. This includes protection of private data, Payment Card Industry Data Security Standard (PCI DSS), as well as other requirements for public companies.
The Solution
XING decided to deploy PowerBroker from BeyondTrust. All productive servers (500 physical and 450 virtual) have PowerBroker for Linux and Identity Server installed. As a result, XING has realized greater visibility and the controls necessary to increase its security posture. The PowerBroker Server has empowered XING to delegate root tasks and authorization on its Linux systems. Using PowerBroker as its enterprise privilege management solution has provided XING with audit-friendly logging and comprehensive reporting to help satisfy its internal and external compliance requirements. Using PowerBroker has been the perfect solution for reaching XING’s goals. The company has been able to manage a growing infrastructure that has more users, with the same amount of people and less effort.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Zapier Aggregates Multiple Analytics in a Single Dashboard with the New Relic Platform
Zapier, a company that enables non-technical users to push data between hundreds of web applications, was facing a challenge in automating and provisioning servers for optimal performance. The company's environment consisted of 50 Linux servers on the Amazon Elastic Compute Cloud (EC2), a Django application split across several servers, and a backend consisting of a dynamic number of celery task workers fed by messages published to a RabbitMQ cluster. They also maintained a number of internal web services on nginx in front of Gunicorn and Node.js processes. Redis handled simple key and value stores, with logging handled by Graylog2 and ElasticSearch. However, they realized that no level of automation would be sufficient without an effective monitoring solution in place. They needed a tool that could provide immediate alerts when something was breaking and could be easily implemented into their environment.
Case Study
Pipeline Insight Case Study: YARCDATA
YarcData faced challenges in determining the conversion rates of prospects into customers through various marketing efforts and identifying the source of its leads. They wanted to know the percentage of opportunities in the sales pipeline that came from different marketing events, web downloads, or self-sourced sales opportunities. Additionally, they needed the ability to drill down into the data to guide where to allocate more marketing dollars based on the success of previous efforts. Previously, YarcData relied heavily on spreadsheets and Salesforce.com reports, which made it difficult to extract the exact information they needed. This reliance on spreadsheets represented about 70% of their data presentation.