Case Studies.
Add Case Study
Our Case Study database tracks 18,927 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Download Excel
Filters
-
(157)
- (81)
- (37)
- (24)
- View all
-
(96)
- (75)
- (15)
- (4)
- View all
-
(47)
- (17)
- (8)
- (8)
- View all
-
(28)
- (16)
- (4)
- (3)
- View all
-
(28)
- (28)
- View all 12 Technologies
- (221)
- (50)
- (22)
- (17)
- (16)
- View all 30 Industries
- (72)
- (48)
- (44)
- (27)
- (15)
- View all 9 Functional Areas
- (225)
- (101)
- (38)
- (14)
- (11)
- View all 40 Use Cases
- (103)
- (96)
- (54)
- (21)
- (18)
- View all 8 Services
- (240)
Selected Filters
|
Prokit’s Industries Co., Ltd. Enhances E-commerce Adoption and Network Security with Check Point Solutions
Prokit’s Industries Co., Ltd., a leading manufacturer of hand tools, power tools, soldering equipment, test instruments and accessories, was facing a significant challenge in increasing e-commerce adoption by its business partners and customers. The company needed to enable access to its internal and external business portals from multiple internet-enabled devices. This was crucial for the company's global operations, with distribution to more than 90 countries worldwide and a sales and distribution network covering five continents. Additionally, Prokit’s was looking to reduce costs and simplify network security management. The company required a highly secure solution to enable remote access to its distribution and business partner portals from multiple internet-enabled devices. It was also necessary to ensure robust security for a variety of managed and unmanaged PCs and mobile devices accessing the network, provide seamless remote access to distribution and business portals, and maximize efficiency through centralized network security management.
|
|
|
Mississippi Secretary of State's Office Enhances Mobile Security with Check Point SandBlast Mobile
The Mississippi Secretary of State's Office faced a significant challenge in providing enterprise-grade protection for Android and iOS mobile devices used by its employees. The office supports approximately 100 state executives, department heads, and directors who use their own mobile devices for business. These high-value targets usually have access to more sensitive information than lower-ranking employees and travel more often, making them attractive targets for cybercriminals. The previous solution couldn’t ensure secure connections for mobile devices to the state’s network, increasing the risk of an attacker breaching the device. The antivirus solution also took up space and processing power on the device, which was a nuisance to users. Additionally, the entire solution was difficult to manage as it wasn’t integrated with the rest of the network or security infrastructure, and there were different processes required for Android and iOS platforms.
|
|
|
Mississippi Secretary of State Enhances Security with Check Point SandBlast
The Mississippi Secretary of State, which provides information and services to citizens through eight different divisions, was facing a significant challenge in upgrading its security posture to protect against advanced threats such as ransomware. The agency was in need of a solution that could simplify management and provide comprehensive advanced threat prevention from network to endpoint. The solutions previously deployed lacked capabilities such as sandboxing that could accurately stop and analyze potential threats. Endpoint protection was a traditional, signature-based antivirus product that not only missed malware and advanced threats, but also negatively impacted users’ PC performance. The agency also lacked adequate visibility into threats and actionable information for combating them.
|
|
|
Helvetia's Transition to a Secure Software Defined Data Center with Check Point vSEC
Helvetia, a Swiss insurance services provider, was faced with the challenge of migrating to a Software Defined Data Center (SDDC) model without compromising security. The company was also looking to increase the efficiency of its IT team and secure its VMware NSX data center deployment. Like most IT organizations, Helvetia’s IT team was constantly seeking ways to handle a rapidly growing volume of work with the same number of employees. This meant minimizing the number of manual tasks required of team members, reducing the need to retrain and redeploy teams, and finding new ways to deliver services as efficiently as possible. Helvetia saw automation and adopting an SDDC strategy as the means to increased efficiency.
|
|
|
Enhancing Security in Biotechnology: Gnosis SpA's Journey with Check Point Security Solutions
Gnosis SpA, an Italian biotechnology company, was facing a growing security challenge due to its rapid expansion. The company's increased attack surface was becoming more susceptible to zero-day and other advanced threats. As a pharmaceutical company, Gnosis had to comply with strict government security regulations, which were increasingly focusing on system security in facilities such as laboratories and manufacturing facilities. However, Gnosis' legacy systems were not equipped to prevent advanced threats from gaining access. The company needed a more efficient, consolidated security solution that could protect its network, data, and communications between its headquarters and other sites. It was looking for a next-generation solution to protect against advanced threats targeting employees, visitors, suppliers, websites, and outgoing communications like email.
|
|
|
Dutch Water Resource Board Enhances Network Security and SCADA Systems with Check Point Solutions
The Hunze en Aa Water Resource Board, responsible for managing water throughout eastern Groningen, the Netherlands, faced a significant challenge in maintaining the security and reliability of its Supervisory Control and Data Acquisition (SCADA) systems. The board's primary responsibility is to ensure that communities in eastern Groningen and northeastern Drenthe have access to sufficient, clean water. However, the area's geographical location, much of which is below sea level, makes it particularly vulnerable to flooding. Therefore, any network downtime could jeopardize the safety and lives of people throughout the region. The board needed a reliable solution that provided complete control and minimized risks in its SCADA environment. The existing security tools, which were eight years old and mixed, needed to be replaced with a central, manageable solution. Additionally, the board sought to improve compliance with guidelines from the Baseline Information Security Water Board (BIWA), which has established recommendations to secure utilities’ physical environments and digital information.
|
|
|
Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions
The state agency, serving all boards and agencies of its state government, was faced with the challenge of abiding by strict compliance and privacy laws. The agency needed to ensure optimal data protection and was looking for a solution that could consolidate technologies including encryption, firewall, and anti-malware. They also required simplified central management and reporting, reduced costs associated with a multi-vendor deployment, and increased protection through user education. The selection criteria for the solution included comprehensive coverage, enhanced support, a common management console with a single interface, policy-based controls, a small footprint, and cost-effectiveness.
|
|
|
Smart & Final's Rapid Retail Expansion Secured by Advanced IoT Solutions
Smart & Final was faced with the challenge of protecting its rapidly expanding retail presence from increasingly sophisticated professional hackers. The company needed to standardize firewall security across all its stores and centralize visibility and management. Additionally, they aimed to enable a rapid roll-out of new stores with minimal manual involvement. All these had to be achieved while reducing the strain on their small in-house IT team, which was tasked with managing the roll-out of firewalls to up to 50 stores a week.
|
|
|
Arcopedico's Modernization of IT Infrastructure and Security with Check Point
Arcopedico, a Portuguese ergonomic footwear manufacturer, was facing a significant challenge with its outdated corporate firewall. The existing firewall had limited functionality and was nearing its end of life. As more devices connected to the corporate network, the company realized the need to partition the network to enhance security. The urgency for a change in corporate policy became evident when Arcopedico experienced a 'phishing' incident introduced by an external email account on the network. Although the incident was quickly contained and had no impact on the business, it highlighted the company's vulnerability to cybersecurity threats.
|
|
|
AESI Simplifies Mission-Critical Security Operations with Check Point
AESI, a company providing engineering and consulting services to electric utility generation, transmission, distribution, and independent system operators, faced a significant challenge in securing its hybrid cloud environment. The company needed to reduce time and costs associated with security infrastructure management and gain flexibility for quick response to threats and other events. AESI operates in a highly regulated industry and is subject to stringent reliability and security requirements, making it crucial to maintain a highly secure IT infrastructure with high-availability, next-generation security capabilities, and a full range of controls. The company had moved from premises-based infrastructure to a hybrid cloud environment, and when support costs escalated for its previous firewall solution provider, the Technology team began looking for a new solution.
|
|
|
Securing ICS/SCADA Network: A Case Study of Central Hidroeléctrica de Caldas
Central Hidroeléctrica de Caldas (CHEC), a major electricity generator and distributor in Colombia, faced a significant challenge in securing its Supervisory Control and Data Acquisition (SCADA) devices. These devices, located in power plants and substations, monitor and control the transmission and distribution networks that deliver power across the regions. However, these SCADA systems were deployed years ago, before cyber security controls were deemed necessary. As a result, they were vulnerable to cyber attacks that could potentially compromise one or more SCADA devices and gain control of vital systems. Furthermore, power plants generating more than 100 megawatts of power and substations transferring more than 115 KW were required to comply with security controls mandated by the Ministerio de Minas y Energía de Colombia and the Comisión de Regulación de Energía y Gas. The challenge was to secure the SCADA devices to prevent network infiltration by attackers and meet governmental security requirements for power generation plants, all while operating in harsh, inhospitable environments.
|
|
|
SONPO Enhances File Transfer Security with Check Point ThreatCloud API Integration
SONPO, a security, development, and integration services provider, faced the challenge of protecting its clients against zero-day threats hidden in email attachments and transferred files. The company needed to integrate sandboxing technology for malware analysis with their file transfer service offering. The challenge was to ensure protection across a wide range of client businesses, infrastructures, and file types. The company was also tasked with defending against ransomware, malware, and other zero-day threats, which is an ongoing challenge for companies worldwide. Each organization that SONPO served had a unique environment to defend, so there was no one-size-fits-all security solution.
|
|
|
Paschoalotto Leverages Check Point for Scalable Security in Financial Services
Paschoalotto, a leading call center for the financial industry in Brazil, faced several challenges with its existing security infrastructure. The company needed to meet the highest level of security as required by customers and government privacy laws, deliver a flexible security architecture that could scale instantly in an environment of hyper-growth, and integrate the company’s multiple sites and private cloud under a single unified management system. The company's previous solution consisted of multiple vendors, which had led to occasional problems. The new solution needed to support two data centers serving seven different locations, as well as protect the company’s private cloud, all under the umbrella of a single, integrated management system. The security team required a single-vendor solution with a wide array of integrated capabilities, including demonstrated interoperability with their VMware-based private cloud infrastructure.
|
|
|
Major Aerospace Company Accelerates Secure Growth with IoT
The major aerospace company, a leader in technologically advanced and intelligent solutions for the global aerospace and defense industry, faced a significant challenge in upgrading its security infrastructure to meet Gen V and future cyber threats. The company's network infrastructure consisted of almost a dozen nodes spread around the globe, capable of delivering massive bandwidth to any link. Bandwidth could spike from one to 10 gigabits per second for long periods, often multiple times a day. The network was fully redundant, with high availability, low latency, and instant scalability mandated to meet customer Service Level Agreements (SLA’s). The security team needed a solution that would allow them to scale on demand and stay secure in the face of dynamically changing bandwidth requirements or overall latency would increase, thus violating customer SLA’s. The company needed to protect all data in transit and secure East-West traffic as well, along with addressing insider security threats that are becoming more and more prevalent in the industry.
|
|
|
ENT Credit Union Enhances Network Traffic Visibility with Check Point Next Generation Firewalls
ENT Credit Union, a leading credit union in Colorado, was facing a challenge in improving its security posture with the ability to see east-west traffic and simplifying its infrastructure complexity. The credit union had rigorous security measures in place, using Check Point Firewalls for perimeter security to monitor north-south network traffic from the Internet to the bank’s network. However, they used a different solution to monitor east-west traffic—internal traffic moving on the network between credit union servers and locations. This posed a challenge as they needed a comprehensive view of all network traffic for enhanced security.
|
|
|
Eurowind Energy: Safeguarding Critical Energy Infrastructure with Check Point Infinity Total Protection
Eurowind Energy, one of Europe's leading developers and operators of photovoltaic (PV) and wind turbine projects, faced a significant challenge in establishing a comprehensive cybersecurity infrastructure that could adapt during periods of rapid business growth. The company needed to prevent malicious cyber-attacks from impacting its IT infrastructure and protect the critical energy business and industry from downtime. The growth of renewable energy from a niche investment to a critical piece of national infrastructure has increased the need for robust cybersecurity measures. As national energy grids become smarter and more international, the flow of data and touch points increase, thereby expanding the potential attack surface. Eurowind wanted to establish complete visibility of its security posture across its network, cloud, and mobile environments. It sought immediate protection and prevention, as well as an understanding of new threats.
|
|
|
Regional Bank Enhances Security Operations and Prevents Advanced Attacks with Check Point SandBlast
The regional bank in the United States was facing a significant challenge in maintaining its network security. The bank was spending considerable resources and man-hours every week to remediate issues caused by malware entering the network and infecting the endpoints. The bank's network security was compromised when internal users visited malicious or compromised websites, which would download malicious content, some of which were unknown, infecting the users' machines. Additionally, spam emails and embedded word documents were bypassing the bank's firewall and reaching the end users. When users opened these malicious files, the executable code in them would enable attacks on the endpoints. The IT security team had to engage in time-consuming remediation procedures. The bank needed a solution that would detect the malicious files before they arrived at the endpoints and reduce the time spent on remediation.
|
|
|
Terma A/S Enhances National Security with Check Point Infinity
Terma A/S, the largest aerospace, defense, and security company in Denmark, was facing a significant challenge in tightening its security to protect nation-state secrets from targeted cyber-attacks. The company, which works on highly confidential projects for civilian and military applications, was a prime target for cyber-attacks that could potentially disrupt internal operations and pose risks to national security. Terma needed to update to the latest technology on a regular basis to stay ahead of the hackers who were constantly trying to infiltrate their systems. The main challenge was that hackers are very patient, so Terma always had to be on its toes with the latest technology.
|
|
|
Tradair Secures Cloud-Based Financial Trading Platform with CloudGuard Dome9
TradAir, a company that provides end-to-end trading infrastructure software, was seeking a robust cloud security product to protect its mission-critical business assets. The company's solution, which leverages advanced technology services like Docker and Google Big Query, is delivered through a hybrid hosting model residing in the Amazon cloud and Equinix data center. The challenge was to find a security solution that could minimize security risk, eliminate unnecessary infrastructure exposure, and provide firewall management, policy automation, authentication, and access control. The solution also needed to be a key aspect of TradAir’s audit and compliance program, helping the company meet international financial regulations on three continents such as SOX and PCI.
|
|
|
Starkey Hearing Technologies Enhances Security with IoT Solution
Starkey Hearing Technologies, a leading developer and manufacturer of hearing aids worldwide, faced a significant challenge in protecting its systems against zero-day threats and ransomware attacks. The company needed to secure the laptops of its mobile users and gain better visibility into incidents without increasing management and maintenance tasks. The challenge was amplified when Starkey was hit by an advanced malware attack, Gatak, a type of Trojan that hides data in image files. This malware led to three or four advanced malware incidents per week, infecting 2,000 machines in just two weeks. The malware gathered valuable data, escalating access privileges to network assets and spreading laterally. When employees took their laptops home, they became much more vulnerable, indicating that Starkey’s antivirus solution was no longer sufficient.
|
|
|
Almaviva TSF S.p.A: Enhancing Perimeter Security with Check Point Solutions
Almaviva TSF, Italy’s leading system integrator in the Transport & Logistics industry, aimed to implement a new infrastructure to offer data center as a service. The goal was to streamline the use of IT resources to gain a competitive advantage and reach new target audiences. The challenge was to enhance flexibility, both internally and towards customers. The new infrastructure needed to effectively protect the individual computing 'cells' offered to customers, separate and protect the shared computing resources, support a mixed virtual/physical infrastructure, enable the highest data throughput in a high-performance, 10 Gigabit environment, and allow for a single console, easy centralized management.
|
|
|
SF Police Credit Union Enhances Security with Check Point Next Generation Threat Prevention Software Blade Solution
SF Police Credit Union (SFPCU), a financial institution serving over 34,000 members and managing over $760 million in assets, faced significant challenges in meeting government and industry standards for regulatory compliance, improving security to safeguard company and member data, and streamlining management to control costs. The organization's existing firewall, which had been in place for a decade, was found to have major compliance issues during an internal audit. The legacy firewall lacked a robust reporting system and offered no management transparency, making it difficult to generate security posture reports. SFPCU needed an upgraded security solution that could provide improved support for compliance audits, comprehensive protection against external threats and internal issues, and simplified management.
|
|
|
Enhancing Healthcare Security and Compliance: Independence Care System Case Study
Independence Care System (ICS), a nonprofit Medicaid managed long-term healthcare plan serving residents in the New York City area, faced several challenges. The organization needed to improve its security to meet strict HIPAA compliance requirements, maximize business continuity to keep core healthcare applications up and running, and simplify network management to help staff stay productive. ICS was seeking a complete security solution that would simplify regulatory compliance, and protect the organization against security threats that could impact network performance. The solution would have to be easy to expand and modify to meet changing needs, and provide centralized management to simplify and streamline network administration for the firm’s IT staff.
|
|
|
Securing Wireless Connectivity at Melbourne Convention and Exhibition Centre with Check Point Solutions
The Melbourne Convention and Exhibition Centre (MCEC) is a bustling hub that hosts over 1100 events annually, including meetings, conventions, exhibitions, concerts, tradeshows, and gala dinners. With a wide range of in-house technology across lighting, audio, vision, and IT, MCEC aims to create memorable experiences for event attendees. However, the Centre faced a significant challenge in providing reliable public wireless Internet service to thousands of visitors daily. MCEC needed to maintain control over content and applications, protect users, and support client demand for free wireless connectivity for up to 10,000 devices. The Centre required a solution that would enable thousands of users to access the network concurrently, ensure maximum network security, allow flexibility and management of data access and applications, ensure zero downtime, and provide maximum throughput with no user usage impact.
|
|
|
Courtagen Life Sciences: Enhancing Cloud Security with Check Point Solutions
Courtagen Life Sciences, a leader in genomic services, relies heavily on Amazon Web Services (AWS) for its network and communications infrastructure. This cloud-based solution offers agility, cost savings, scalability, and support for users worldwide. However, to be successful, the solution must also provide comprehensive security and support regulatory compliance. Courtagen required a security solution that would work smoothly with its cloud environment and provide comprehensive protection against network attacks and data breaches, agility and flexibility to support changing needs, and simple management. The solution also needed to comply with HIPAA and other security regulations and requirements, seamlessly integrate with AWS, support secure access by mobile employees, and be scalable to support additional users.
|
|
|
Carmel Partners: Enhancing Network Security and Productivity with Check Point Solutions
Carmel Partners, a real estate investment firm operating in select markets across the U.S., was faced with the challenge of maintaining network integrity, upholding customer confidence, and ensuring regulatory compliance while improving employee productivity. The growing multi-faceted organization needed a solution to secure network traffic, protect against data loss, and provide secure site-to-site connectivity. They also needed to equip their employees with the ability to securely share data, protect the network from next-generation and Web 2.0 threats, reduce management complexity, and improve visibility of traffic across multiple network segments.
|
|
|
CRIF's Virtualization Project: Enhancing Security and Flexibility with Check Point Solutions
CRIF, a leading provider of added-value solutions and information services for the financial services industry, embarked on an extensive virtualization project across its entire infrastructure. The project was extended to the security layer with specific goals to simplify IT security and management, reduce costs, streamline resource utilization, guarantee the highest reliability and extensive network protection, gain a comprehensive view over transactions and applications, and future-proof the security infrastructure with an eye on increasing virtualization. The challenge was to find a solution that offered the highest reliability and performance, transparent security management from a centralized console, effective management of a mixed (virtual/physical) environment, and the ability to scale by adding new systems and services as soon as they were needed.
|
|
|
Enhancing Data Security in Healthcare: A Case Study of Hospital 9 de Julho
Hospital 9 de Julho, one of the most significant private health institutions in Brazil, was facing a significant challenge in ensuring the security of its digital environment. The hospital was using a 'home-made' solution that was simple and did not offer complete security or efficient controls to protect data and information leakage. The hospital often found itself in critical situations without having complete visibility of what was happening in its system. The main deficiencies included inefficient tools and applications to support the infrastructure and a lack of awareness among teams about the importance of controlling access and protecting information. The hospital needed a solution that would provide greater visibility and control over its security systems, ensure security when accessing digital systems, and make the digital environment widely available for internal and external users.
|
|
|
FXCM Inc. Enhances Network Security with Check Point Solutions
FXCM Inc., a global online foreign exchange trading service provider, was facing challenges in securing its distributed network environment. The company, which serves approximately 200,000 retail customers and 200 of the world’s top hedge funds and banks, operates across 15 global offices. The challenge was to find a robust network security solution that could be deployed regionally and managed centrally by a small dedicated staff. The solution needed to provide robust integrated security, high-performance data center grade hardware, simplified network security management, administration, and reporting, and be part of a single vendor eco-system.
|
|
|
Enhanced Data Security for NHS Blood and Transplant with Check Point Endpoint Security
NHS Blood and Transplant, a part of the National Health Service (NHS), is responsible for collecting, processing, storing, and issuing approximately 2.1 million blood donations per year. In addition to handling blood donations, the organization also conducts research to improve the safety of blood and blood products. This involves storing confidential personal data and sensitive research data, making it crucial for the organization to have a fail-safe data security solution. Although NHS Blood and Transplant already had a robust laptop and PC security solution in place as an existing Check Point customer, they needed to enhance the protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.
|
|