Case Studies.
Add Case Study
Our Case Study database tracks 18,927 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Download Excel
Filters
-
(157)
- (81)
- (37)
- (24)
- View all
-
(96)
- (75)
- (15)
- (4)
- View all
-
(47)
- (17)
- (8)
- (8)
- View all
-
(28)
- (16)
- (4)
- (3)
- View all
-
(28)
- (28)
- View all 12 Technologies
- (221)
- (50)
- (22)
- (17)
- (16)
- View all 30 Industries
- (72)
- (48)
- (44)
- (27)
- (15)
- View all 9 Functional Areas
- (225)
- (101)
- (38)
- (14)
- (11)
- View all 40 Use Cases
- (103)
- (96)
- (54)
- (21)
- (18)
- View all 8 Services
- (240)
Selected Filters
|
Global Management in Just a Few Steps: BHN's Infrastructure Upgrade with Check Point Solutions
BHN Dienstleistung GmbH & Co. KG, an external IT service provider, was tasked with operating the entire IT infrastructure for a medium-sized engineering company at around 60 global sites. The challenge was to expand the Check Point infrastructure by connecting and securing global subsidiaries, upgrading the perimeter gateway, and installing a new data center firewall. BHN had been using Check Point security solutions for nearly 20 years, and due to an increasing awareness of cyber threats and a growing number of user connections and requirements, a full security infrastructure upgrade was needed. The upgrade was to include the engineering company's global subsidiaries, integrate sites that did not yet have a Check Point infrastructure, and connect them to headquarters.
|
|
|
Coxhealth's Dynamic Scaling of Security with Hyperscale Maestro Checkpoint Orchestrator
CoxHealth, a leading regional healthcare system in southwest Missouri, faced a significant challenge in securing high traffic levels generated by COVID work-from-home requirements. The healthcare system's priority was to keep the network at maximum performance without allowing a cyber attack or malware to affect the network and cause an emergency system crash or interrupt patient care. However, the shift of 3,500 employees from onsite to work-from-home environments tripled network bandwidth usage and strained firewalls to capacity due to external traffic coming in over VPNs. Outlying clinics' network connections were also strained. Additionally, CoxHealth had to quickly install temporary kiosk environments, which also needed network connectivity, across the region to conduct COVID testing.
|
|
|
Scalable IoT Solution Ensures Uninterrupted Work During Pandemic: A Case Study of Helmholtz-Zentrum Dresden-Rossendorf
Helmholtz-Zentrum Dresden-Rossendorf, one of the largest research institutions in Saxony, Germany, was facing a significant challenge with its firewall technology. The institution was originally using the Check Point open server landscape without appliances, a solution that was no longer compatible with the growing performance demands. The institution needed a flexible security architecture that could scale instantly in an environment of growth. They were dealing with multiple systems for configuration and operation, which was not efficient. The increasing demand made appliances necessary. The existing system, under heavy load, would reduce the security level and allow traffic through without fully analyzing it. This posed a significant risk to the institution's security and integrity.
|
|
|
Futureproofing MOTORTECH with Check Point Security Solutions
MOTORTECH, an international specialist manufacturer of components and accessories for the gas engine industry, was faced with the challenge of enhancing its security to combat the latest cyber threats, both known and unknown. The company needed to ensure complete protection and prevention of these threats to safeguard its sensitive data. The data needed to be protected from unauthorized external access to prevent encryption, deletion, and compression of internal data by malware. The company reviews the security market annually to ensure sufficient protection of its data, focusing primarily on current and future threats. For the past four years, MOTORTECH has been working with Check Point to counter the changing threat situation with effective solutions.
|
|
|
CloudGuard Application Security: A Shield for VITO’s Satellite Imagery
VITO’s Remote Sensing Unit, a part of the Flemish Institute for Technological Research, is a crucial entity that processes and archives satellite images, converting the data into actionable information on global matters. The unit, which has grown into a 100-strong team, operates an environment with around 650 physical servers and 7PB of data. The global significance of their data means it is delivered to almost every country in the world, leaving it vulnerable to cyberattacks on many fronts. The unit required comprehensive web and API protection that offered more than a traditional CloudGuard Application Security. The challenge was to protect the organization’s applications and websites from potential cyber threats while ensuring the security solution was scalable to support the growing organization.
|
|
|
SREI's Transition to Cloud with Check Point: A Secure and Compliant Approach
SREI, one of India’s leading asset finance and leasing institutions in the infrastructure sector, faced a significant challenge when it decided to move its operations to the cloud. The company had to comply with stringent financial regulations on data security and protect customer and other internal data held in the public cloud. The transition was prompted by the need for a complete revamp of its 13-year-old datacenter. Being highly regulated by the Reserve Bank of India (RBI), its data had to be co-located in India and it eventually chose Amazon Web Services (AWS) as a cloud vendor. The company needed security solutions with the flexibility to support all deployment needs and to build a security perimeter around its operations, rather than just relying on AWS services.
|
|
|
Improving Retention of Outsourced Personnel Through Smartphone Lending: A Case Study on Copro Holdings
Copro Holdings Co., Ltd., a rapidly growing company specializing in outsourcing construction and plant engineers, faced a significant challenge in improving the low retention rates in the staffing industry. The company aimed to outsource only the highest-quality personnel, which required a focus on hiring and training. A plan was put in place to lend all outsourced personnel smartphones with the goal of training and improving retention. However, finding a balance between security and usability proved difficult. The company also faced the challenge of changing the negative image of the construction industry as dangerous and involving long working hours. Additionally, some of the veteran engineers on staff were not accustomed to using smartphones, which added another layer of complexity to the implementation of the plan.
|
|
|
NHS Scotland Secures Vital Health Data with Check Point Solutions
NHS Scotland faced the challenge of protecting vital patient healthcare data held in the public cloud. With the increasing use of digital services such as video consultations and smart technology, the security of health data became paramount. Over the past five years, NHS Scotland's data volumes have increased tenfold, making the task of securing the data even more critical. The organization needed a solution that could provide complete threat prevention against cyberattacks and could easily scale with the growing data volumes. In 2018, NHS Scotland was affected by the WannaCry ransomware attack, which impacted patient-facing services and made some patient data inaccessible. This incident highlighted the need for a robust solution that could prevent similar cyberattacks and ensure visibility into the information, who is accessing it, where it is being shared, and what is being done with it.
|
|
|
ARSAT's Rapid Security Upgrade from Cisco to Check Point
ARSAT, one of the largest ISPs and data center companies in Argentina, was facing a significant challenge. The company needed to migrate 60 virtual security systems to a new security platform without disrupting production. The existing Cisco firewalls were resource-intensive, with excessive memory consumption and frequent crashes. The company also needed to gain insight into a diverse environment and automate security management tasks. Additionally, ARSAT wanted to add GenV threat prevention capabilities across the network to ensure the best security against advanced threats.
|
|
|
Furniture Manufacturer Secures its ICS Network with Check Point Rugged Appliances and Cyber Security Management
The largest furniture manufacturer in the U.S. faced a significant challenge in securing its Industrial Control Systems (ICS) against cyber threats. The company operates 50 industrial manufacturing work centers and thousands of industrial manufacturing and control systems in harsh environments. These systems, including Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs), are crucial for maintaining optimal manufacturing quality and uptime. However, the factory floor conditions, such as sawdust, temperature swings, vibration, and electromagnetic interference, make it hostile to traditional electronics and security measures. Additionally, space and power are primarily dedicated to manufacturing systems, making it difficult to accommodate additional devices for security. Many of these systems were not designed with cybersecurity in mind, making patching or upgrading risky or even impossible.
|
|
|
Lightbeam Health Solutions Leverages Check Point for Hybrid Cloud Security
Lightbeam Health Solutions, a provider of a data analytics platform for healthcare organizations, faced the challenge of protecting sensitive customer data amidst rapid company growth and the transition from brick-and-mortar data centers to a hybrid cloud environment. The company needed to ensure consistent security for both its data center and cloud infrastructure and services. The continual changes in the healthcare industry, new technologies, and company growth were outpacing the data centers' abilities to keep up, leading Lightbeam to extend its infrastructure to the cloud. The challenge was to ensure comprehensive protection for cloud assets without sacrificing agility or scale, and to simplify security management across premises and cloud infrastructure.
|
|
|
Unitel Bolsters Critical Infrastructure Security with Check Point Infinity
Unitel, Angola’s leading mobile telecoms provider, faced the challenge of protecting critical national infrastructure against continuous cyber-attacks. The company holds a significant amount of personal and financial data of Angolan citizens, making it a prime target for cyber threats. A disruption or breach of Unitel's systems could cause a major disruption to the Angolan economy. The company also needed to simplify its security management, as managing multiple security solutions from different vendors was proving to be complex and inefficient.
|
|
|
Top Telecom Provider Bolsters Security with Check Point Next Generation Firewalls
The telecom provider, operating one of the largest LTE networks in the US and serving over 80 million customers, faced the challenge of protecting a vast and diverse network environment. The network supports a wide range of traffic, from voice calls to streaming video, with the traffic mix and bandwidth requirements changing daily. The provider needed to secure an expanding attack surface with traffic entering the network from various sources, including handsets, the Internet, and point-to-point vendor connections. Concurrently, the provider was grappling with an increase in the volume, diversity, and sophistication of cyber attacks. In recent years, service providers have fallen victim to highly visible DDoS attacks that disrupted networks and services. Attackers also frequently stole credentials and attempted to gain access via brute force attacks. The telecom provider required network security defenses that could accommodate the rapid growth of its customer base, traffic volumes, and the global cyber attack landscape.
|
|
|
Securing Segmented Networks at University of Bergamo with Check Point
The University of Bergamo, a public university in Italy, faced a significant challenge in managing and securing its large, segmented network. The university, home to 25,000 students and 600 staff members, is spread across 20 sites in the city of Bergamo. The challenge was to protect the personal data of all its students and staff across multiple networks, systems, and devices, all managed by a small IT team. Each year, the university welcomes a new class of students who need to be taught how to work within the university’s IT network security policy. The security solution needed to be effective across all these networks and manageable by a small team.
|
|
|
MAO's Leap in Security and Data Privacy with Check Point Solutions
Medical Advocacy & Outreach (MAO), a nonprofit medical institute based in Montgomery, Alabama, was facing a significant challenge in upgrading its security infrastructure to support its rapid growth and meet compliance requirements. The organization had been relying on third parties for network management and security services, and the anti-malware product installed on the endpoints was not sufficient to meet compliance requirements. The existing security measures were outdated and not capable of defending against threats such as malware and ransomware infections. The challenge was to enhance the clinic’s security posture to effectively defend against these threats and support the organization's growth.
|
|
|
X by Orange Enhances Cloud Security with Check Point
X by Orange, the B2B technology arm of Orange Spain, was faced with the challenge of making cloud-based security available to advanced service companies at an affordable price. The company aimed to automate security management and provide peace of mind to its clients. As it began developing two new products, X-Privacy and X-Security, X by Orange needed a security solution that would ensure the products were not only affordable, predictable, and easily operated, but would also protect their clients’ corporate data from known and unknown cyber threats without requiring hands-on management. The challenge was to find a solution that would provide a high level of security, be easy to use, and would not require a long-term commitment from their SMB clients.
|
|
|
Bezeq Enhances Security and Credibility with Check Point Partnership
Bezeq, Israel's leading telecommunications service provider, faced the challenge of ensuring end-to-end security management for its business customers. As a market leader, Bezeq was a target for ambitious mobile operators, internet providers, and content makers, making it crucial to protect and grow its mobile, internet, and TV services businesses. The company needed to develop security solutions that addressed customer needs and ensured data security, particularly in light of the increasing importance of connectivity and data security in the telecommunications sector. Furthermore, Bezeq needed to maintain its speed to market, moving quickly and with certainty to seize lucrative opportunities when they arose.
|
|
|
Centrify's Continuous Compliance and Security Best Practices on AWS with Check Point CloudGuard
Centrify, a leading cybersecurity company, faced several challenges when moving its software-as-a-service (SaaS) applications to Amazon Web Services (AWS). The first challenge was cloud inventory management. With new application deployments, various security groups, IAM roles, policies, and Amazon Simple Storage Service (Amazon S3) buckets were created. Due to the dynamic nature of SaaS environments, the Centrify IT team had to spend significant time to stay updated with their environment and assets. The second challenge was cloud compliance. Centrify needed to ensure continuous compliance with various frameworks in their rapidly scalable AWS environment. Misconfigurations or policy changes could immediately make them non-compliant. They needed automation capabilities built into their existing workflow process. The third challenge was network visibility. Centrify required a solution that could provide a detailed view of the security infrastructure and help identify misconfigurations. They needed a tool to synthesize and visualize information from multiple accounts and regions from a single pane of glass.
|
|
|
Listrak's Successful Scaling and Security Enhancement with Check Point Quantum Maestro and CloudGuard
Listrak, a digital marketing platform for retailers and consumer brands, faced a significant challenge in scaling to support rapid growth and high-capacity requirements. The company needed to deliver high performance to its clients and improve its overall security posture and visibility. The challenge was particularly acute during peak retail periods like Black Friday and Cyber Monday, when network throughput could triple or quadruple, processing millions of connections per second. The platform had to deliver 100% uptime and maximum performance. However, the traditional firewall that Listrak had been using had reached its capacity limits, becoming unstable and unpredictable, and was also difficult to maintain.
|
|
|
Landkreis Augsburg Hyperscales Security with Check Point Solutions
Landkreis Augsburg, a district in Bavaria, Germany, was facing a significant challenge in scaling its security to keep pace with rapid growth. The district provides services to citizens, businesses, and visitors through its main office and 14 other locations. It also provides internet access, digital capabilities, and security to 17 schools and 19 local communities. The district's IT team was responsible for managing the security of approximately 1,000 endpoints and 2,000 Windows devices through a single Check Point firewall cluster. However, the rapid growth was straining its capabilities. Additionally, the district was continuously expanding its offerings, which needed to be secured. A second firewall cluster secured the school networks, including about 3,000 Windows devices and wi-fi networks with approximately 6,000 clients. The district needed a hyperscale solution that could offer scalability without impacting performance, integrate easily with a high-availability data center strategy, and manage new challenges with existing tools.
|
|
|
Aegean Baltic Bank Enhances Security and Efficiency with Check Point
Aegean Baltic Bank (AB Bank), a Greece-based financial institution, faced significant challenges in ensuring the security of its financial data and providing a secure remote access environment for its employees. The bank, which operates under the regulatory supervision of the Central Bank of Greece, needed to protect the integrity of its financial transactions and safeguard its network from cyber threats. The bank's reputation and the trust it had built with its clientele were at stake. Cyber attacks posed a significant threat to the bank's systems and transactions. The bank required a simple-to-manage solution that could protect its environment and user endpoints from viruses, bots, malicious websites, and other threats.
|
|
|
Valtori's Transformation: Ensuring Business Continuity with Hyperscale Networking and Security
Valtori, the public managed service provider to Finland's government, was facing significant challenges with its service delivery platform. The platform was experiencing numerous outages due to high traffic volumes, maintenance, and software upgrades, affecting all Valtori customers. The network and security capacity was limited, and the diverse environments of the customers made management complex. Valtori's customers include government offices, ministries, government-owned corporations, public authorities, and organizations with public administration or service responsibilities. The company was tasked with ensuring the availability, integrity, and confidentiality of government data and services for more than 100 separate organizations. The complexity of the networking and security environment, serving tens of thousands of employees, was further compounded by the fact that some agencies operated with cloud infrastructure, some used on-premises infrastructure, and others had hybrid infrastructure.
|
|
|
SE2 Leverages CloudGuard for Enhanced Security in Dynamic Cloud Environment
SE2, a third-party administrator of life insurance contracts and annuities, faced the challenge of securing a complex, multi-account AWS environment. The company needed to gain visibility and enforce governance without inhibiting business-critical development. The task was to secure and manage both on-premises and cloud environments with the same team. The move to the cloud gave SE2 agility and resilience, but it also meant securing more, faster, in a constantly changing cloud environment while ensuring the company's security posture stayed strong. The company had to manage 500 EC2 instances with several hundred security groups and multiple users authorized to make configuration changes.
|
|
|
Grupo Telvista Enhances Security and Efficiency with CloudGuard Network Security
Grupo Telvista, a leader in contact center solutions, faced the challenge of securing applications, data, and workloads in their private cloud. The company sought to virtualize security management to improve efficiency and gain industry-leading threat protection. The migration to a private cloud infrastructure based on VMware ESXi virtualized machines was aimed at reducing costs, simplifying infrastructure management, and increasing business resilience. However, this transition also required robust security measures to protect the virtualized environment and prevent the lateral spread of threats.
|
|
|
Regione Marche Enhances Security Infrastructure with Check Point Solutions
Regione Marche, the local government body governing the Italian region of Marche, was facing a significant challenge in consolidating multiple firewall solutions from various vendors. The organization was struggling to maintain consistent management across different environments and locations. The situation was further complicated by the need to ensure security continuity for the business and services, given the sensitive nature of the data they handle, including healthcare, financial, and political information. Cyber threats frequently targeted Regione Marche, with attacks ranging from phishing and website defacement to malware and advanced persistent threats aimed at data exfiltration. The organization had five firewall clusters from different vendors deployed across three locations, making it difficult to ensure consistent security across the region due to multiple management tools and dashboards.
|
|
|
RMK Marine Enhances Security and Business Agility with Check Point
RMK Marine, a global designer and builder of superyachts, faced the challenge of protecting its intellectual property and customer transactions. The company's infrastructure supports essential business operations, from shipping design to business transactions with its global customers. Security is critical as the firm's engineers and designers constantly work with sensitive proprietary data. The company also needed to securely support a remote workforce during the global pandemic. New threats are emerging all the time, and RMK Marine also focuses on protecting its environment from viruses, ransomware, and other threats that could disrupt operations, to keep its business running without interruption.
|
|
|
Henny Penny Enhances Remote Workforce Security and Efficiency with Check Point
Henny Penny, a global manufacturing organization, faced the challenge of protecting its network perimeter from malware, phishing, and malicious attacks. The company needed to simplify its management complexity and maintain business continuity, especially during the COVID-19 pandemic. With 900 employees working in various locations, including the office, from home, and in the field at customer locations, the company's small IT staff required next-generation protection that offered deep visibility and agility on a user-friendly interface. The challenge was to secure not only its data center but also its mobile employees in the field.
|
|
|
Invitalia Leverages IoT to Secure Perimeters and Drive Economic Growth
Invitalia, Italy’s national agency for inward investment and economic development, was faced with the challenge of securing critical data and assets as it pursued a cloud-first strategy. The agency, which is responsible for coordinating investment and development across the country, manages the tender process for national infrastructure projects and helps find funding for start-ups. As a critical piece of national infrastructure, Invitalia is a target for cyber criminals. The agency needed to be agile, secure, and flexible, without sitting on great swathes of unused IT resources. The cloud allowed the business to consume resources as needed, but with sensitive funding and commercial data at the center of Invitalia’s portfolio, the agency was under constant threat. Additionally, the agency was also looking to reduce the strain on its in-house cybersecurity team in the face of an escalating number of attacks.
|
|
|
Securing Sensitive Data for Six Million Residents in Lazio, Italy with IoT
LAZIOCrea, the IT management body for Italy’s second largest region, Lazio, faced a significant challenge in protecting the sensitive data of nearly six million residents. The organization was tasked with ensuring compliance with the latest government-imposed security policies, which required frequent updates. The security scope of LAZIOCrea encompassed five data centers, three of which dealt with public administration services, while the other two were concerned with business continuity and disaster recovery. The organization needed a security solution that was not only easy to use, implement, and manage, but also provided comprehensive protection from cyber attacks, including virus intrusions and phishing attacks, and safeguarded all the company’s critical assets.
|
|
|
Canal Bank Enhances Email Security with Check Point CloudGuard SaaS
Canal Bank, a financial services provider in Panama, was facing a significant challenge in securing its Office 365 application users from malware, phishing, and ransomware. The bank was in the process of acquiring and implementing a new core banking system that would support multiple channels and mobile applications, and it was crucial to ensure the integrity of these new services. The bank's strategy heavily relied on cloud technology, and they were planning to move all operations to the cloud in approximately two years. The first step in this transition was moving their email platform to the cloud, which required a security solution that could be hosted externally to protect against phishing attacks and other threats. The bank's executives understood the importance of security and wanted to ensure that the emails sent and received would not pose a threat to the organization.
|
|