CheckPoint Software

Overview
HQ Location
United States
|
Year Founded
1993
|
Company Type
Public
|
Revenue
$1-10b
|
Employees
1,001 - 10,000
|
Website
|
Stock Ticker
CHKP (NASDAQ)
|
Twitter Handle
|
Company Description
Check Point Software Technologies (NASDAQ: CHKP) is a leading AI-powered, cloud-delivered cybersecurity platform provider protecting over 100,000 organizations worldwide. We leverage the power of AI everywhere to enhance cybersecurity efficiency and accuracy through our Infinity Platform, with industry-leading catch rates that enable proactive threat anticipation and smarter, faster response times.
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.
Case Studies.
Case Study
Control Southern Enhances Cybersecurity with Check Point Infinity Architecture
Control Southern, a trusted automation partner for process industries in the Southeastern United States, was facing a growing number of multi-vector cyber attacks targeting its network and endpoints. The company's existing firewalls were reaching end of life and the existing Sophos platform was unable to handle the increasing threats of malware, phishing, and larger-scale infections. The situation worsened when Control Southern moved to Office 365 and experienced a surge in phishing attacks on its endpoints. Ransomware gained access through malware on a web browser, infecting servers and spreading to connected client computers, encrypting gigabytes of data within minutes. The company's McAfee software on endpoints was not updating systems correctly, adding the burden of manually pushing updates to endpoints almost daily.
Case Study
Sallie Mae Enhances Cloud Security and Risk Reporting with Check Point
Sallie Mae was facing significant challenges in securing its cloud perimeter from external threats. The company needed to respond in real-time to events like malware, phishing, and injections that could potentially compromise the security of their systems and the data they hold. The existing on-premise data centers were not able to scale and speed up to the level required to effectively manage the security risks. The company was also struggling with reporting risk to management in a timely manner. The growing AWS environment added another layer of complexity to the security challenges, requiring visibility and scalability in the security solutions.
Case Study
Risk-free Travel: Swiss Re's Journey to Secure Data with IoT
Swiss Re, a leading reinsurance company, faced a significant challenge in protecting critical data on the 4,500 notebooks used by its employees. These laptops were used by employees who frequently traveled, commuted between different locations, or occasionally worked from home. The existing password protection in Windows XP was deemed inadequate, as notebooks protected in this way were vulnerable to misuse within minutes with easily available hacking tools. The company needed a solution that would prevent unauthorized persons from reading the data on these notebooks. The solution had to be compatible with the existing server infrastructure, the application components on the laptops, and the software distribution mechanism. It also had to be installable automatically during operation without the need for support employees on site.
Case Study
Enhancing Endpoint Security at Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works
Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works, a manufacturer of heavy machinery that provides water and electricity, faced significant challenges in securing their network of 8,500 PCs against emerging security threats. The company was struggling to stop business disruption from attacks targeting OS vulnerabilities and protect its intellectual property from leaking through security gaps. The factory needed a unified solution that could provide automatic security updates, enforce compliance, maintain connectivity and business continuity while controlling endpoint access to the network, and protect the network against external infections and loss or theft of confidential intellectual property through unauthorized communication programs.
Case Study
Connexus Energy Enhances SCADA and ICS Security with Integrated Solution
Connexus Energy, Minnesota's largest electric cooperative, faced significant challenges in protecting its Supervisory Control and Data Acquisition (SCADA) and Industrial Control System (ICS) networks from cyber threats. With the rise of smart grids, smart devices, and IoT devices, traditional SCADA and ICS systems often lacked the necessary security controls to defend against sophisticated cyber attackers. Connexus Energy was using multiple security solutions from different vendors, each with specific management requirements, consuming a significant amount of the team’s technical resources. The security team had to parse logs from different systems to identify issues and respond accurately. Furthermore, secure gateways for the SCADA system had to operate in extreme physical conditions, and many of Connexus Energy's existing security solutions were not ruggedized or only partially ruggedized. The challenge was to find a solution that could protect the SCADA system while delivering centralized visibility across the entire security environment.
Case Study
Regina Miracle Enhances Security with Check Point Harmony
Regina Miracle, a leading manufacturer of intimate wear, sportswear, and personal protective equipment, was facing a significant challenge in terms of cybersecurity. The company was experiencing an increasing number of phishing and malware attacks on its Office 365 users. The company's IT team was responsible for managing and securing more than 7000 endpoints and users, which was becoming increasingly difficult due to the rising number of attacks. The company had previously relied on Microsoft protection for its Office 365 Email solution and Trend Micro for endpoint security. However, these solutions were not keeping pace with the rapid increase in email phishing and malware attacks. The situation was further exacerbated by the pandemic, with phishing campaigns targeting webmail and SaaS applications becoming the most significant threat to the company.
Case Study
Jebsen Group's Digital Transformation Secured with Advanced Cybersecurity Protection, Automation, and Agility
Jebsen Group, a leading brand builder and investor, faced a significant challenge in securing its digital transformation. The company had built an agile infrastructure to support the digital transformation of its internal processes and integration touchpoints with customers. This IT architecture included cloud, on-premises, and hybrid environments to support each business unit most effectively. However, the company needed consistent protection and quality of service across its locations, as well as between its AWS cloud and on-premises environments. Gathering threat intelligence across its locations was critical to maintaining consistent security for all users. The company was particularly concerned about credential phishing and wanted better protection for endpoints. Cost-effective scalability was essential, and previous efforts to cope with a growing attack surface had involved completely replacing firewalls or buying extra capacity that might not be needed. Jebsen Group was seeking a solution that delivered high visibility with easy manageability across its diverse environments.
Case Study
ViuTV's Multi-Cloud Security Enhancement with Check Point CloudGuard
ViuTV, a licensed free television station in Hong Kong, faced significant security challenges as it expanded its cloud footprint. Initially, the company launched its services using a traditional physical infrastructure, but soon migrated to AWS to handle unpredictable traffic volumes and eliminate server management issues. However, this shift led to three major security concerns. Firstly, ViuTV lacked visibility across all its cloud accounts and assets, making it difficult to ensure proper usage and prevent data leaks or security loopholes. Secondly, the company needed to protect against misconfiguration risk, which could expose the system to threats. Lastly, ViuTV wanted to ensure compliance with security standards and frameworks as part of its risk management strategy. The security options offered by its cloud providers were too fragmented to provide the necessary visibility and control.
Case Study
E-REDES Enhances Substation Security with Check Point's Next-Generation Solutions
E-REDES, the primary energy distribution system operator in mainland Portugal, faced a significant challenge in securing its vast and diverse infrastructure. The company operates and maintains over 99% of Portugal's energy distribution power grid, connecting more than six million customers through 220,000 kilometers of lines, approximately 500 substations, and 60,000 secondary substations. With the increased digitalization of its infrastructure, E-REDES recognized the heightened cybersecurity risk. The company needed a solution that could provide detailed visibility of all network traffic within substations to identify and analyze abnormal behavior. Additionally, it was crucial to segment zones at each substation, separating the engineering zone used by employees for remote access to systems from the operational technologies dedicated to critical power distribution functions. Lastly, E-REDES required security assets that could detect, identify, and prevent threats from affecting either zone.
Case Study
Proxeem Enhances Customer Security with Check Point Cloud Guard AppSec
Proxeem, a company providing hosting, IT project management, and web development services, faced the challenge of securing websites, web applications, and APIs across a diverse customer base. The company's customers span a wide range of industries, each with different web applications and API connections into different platforms. Proxeem needed to deliver industry-leading protection affordably to its customers while minimizing ongoing solution management. The challenge was to implement reliable security across its customer base without extensive customization, specialized expertise, or extra support staff.
Case Study
NetUSE AG Enhances Security and Operational Efficiency with Check Point Infinity
NetUSE AG, a leading IT system house in northern Germany, faced a significant challenge in securing its internet-active employees and providing a comprehensive security solution while maintaining operational efficiency and cost-effectiveness. The company, which started as one of the first Internet service providers in Germany, had expanded into a large IT security and infrastructure provider. However, the high internet usage by its employees, including private internet usage, exposed the company to various cyber threats. The company needed a robust security solution that could cover the breadth of the landscape and protect its assets from potential cyber-attacks.
Case Study
TopRx Ensures Business Continuity with Check Point Harmony Endpoint
TopRx, a leading national supplier of generic pharmaceuticals, over-the-counter drugs, vitamins, and home health products, faced a significant challenge in extending robust protection to remote endpoints. The company needed to enhance its security posture with better visibility into threats and simplify endpoint security management. The COVID-19 pandemic forced employees to work from home, and TopRx needed to extend protection to their systems. The company's priority was ensuring nonstop operations, and a strong security posture was integral to this goal. Until the pandemic, most of the company's users and endpoints were on premises, defended behind Check Point Next Generation Security Gateways. The challenge was to find a solution that could provide continuous protection for all endpoints, whether on or off the corporate network, and proactively detect, identify, and remediate threats.
Case Study
NHS England Enhances Mobile Security and Compliance with Check Point Harmony Mobile
NHS England, the organization responsible for overseeing the budget, planning, delivery, and day-to-day operation of the commissioning side of the National Health Service in England, faced a significant challenge in securing mobile access for its 6,800 staff members. The organization had to simplify security management for its critical mobile workforce, which was increasingly reliant on mobile devices for tasks such as checking emails, sharing reports, setting up video calls, accessing staff records, and submitting expenses. The challenge was not only to provide secure access but also to ensure compliance with the UK’s Data Protection Act, 2018, and the European General Data Protection Regulation (GDPR).
Case Study
Gimv Enhances Cloud Security with Check Point CloudGuard
Gimv, a European investment company, was faced with the challenge of securing critical data as it developed its cloud IT strategy. The company was also tasked with simplifying the management of an ever-changing threat landscape. As a business, Gimv's challenge was to identify investment opportunities, examining more than 1,000 companies each year for their investment potential. The company needed to balance corporate security with end-user flexibility, allowing staff to work from a device and location of their choice, while maintaining an overview of the threat landscape.
Case Study
Avianca's Secure Cloud Migration with Check Point
Avianca, Colombia’s national airline, was faced with the challenge of migrating to Microsoft Azure public cloud while maintaining security and compliance with Sarbanes-Oxley, PCI and GDPR. The company was also looking to segment and secure portions of the network to reduce risk. As part of its corporate-wide digital transformation initiative, Avianca aimed to move as many operations to the cloud as possible to increase agility, reach, and cost-effectiveness. One of its first steps was to move its e-commerce site to the Microsoft Azure public cloud environment. However, the Azure public cloud's security services were not sufficient for Avianca's needs, which required additional capabilities to strengthen security and support unique technologies in both its internal operations and customer-facing services.
Case Study
Consolidated Security Solution for Goglio Group by Check Point
Goglio Group, a leading multinational company in the packaging sector, was facing a significant challenge in consolidating its IT security. The company needed to save time and resources, better protect confidential customer data shared between branches, achieve real-time zero-day protection from the latest security threats, and guarantee the security of customers’ sensitive data. Goglio has a data center in Varese, with dual connectivity (fiber optic and radio). Initially, all data lines for internet access from the European sites converged in the Varese headquarters. Goglio needed an Internet connection in every location, each protected by a separate firewall, but all managed centrally by its IT team. The company was looking for a solution that would help them improve the security of their data and that of their customers, in an agile way, achieve real-time protection and maintain governance and control in Varese.
Case Study
Ayesa Enhances Cloud Security with Check Point CloudGuard SaaS
Ayesa, a multinational Spanish company specializing in engineering, technology, and consulting, faced a significant challenge in protecting its cloud-based SaaS applications, particularly Microsoft Office 365, from sophisticated cyber threats. The company needed to protect user identities and credentials from targeted attacks. Ayesa had migrated to the cloud to improve productivity and facilitate decision-making and project development for its nearly 5,000 employees worldwide. Despite having standard protection measures and integrated security measures offered by Microsoft, Ayesa was still vulnerable to cyber threats. Research showed that 90% of data breaches on SaaS applications occur from targeted attacks, and 50% of breaches in companies using SaaS happen when attackers take control of accounts and compromise employees’ corporate credentials.
Case Study
Enhancing Network Security and Business Continuity at Hotel Nikko San Francisco
Hotel Nikko, a luxury hotel located in San Francisco’s Union Square, was facing a significant challenge in maintaining its network security. The hotel relies heavily on its network to support guest services, reservation systems, property management, and other critical business operations. Any network outage could lead to lost revenue, disappointed guests, and damage to the hotel’s reputation. Despite having a firewall from another vendor, the hotel found it difficult to manage and it provided only limited protection against sophisticated network threats. The situation became critical when a virus invaded the hotel’s network and impacted some of its most critical business systems. The hotel was in need of a comprehensive security solution that could identify and mitigate the latest online threats, and was easy for its small IT team to set up and use.
Case Study
Sinopec Group Enhances Network Security with Check Point 12407 Security Appliance
China Petrochemical Corporation (Sinopec Group), a large petroleum and petrochemical enterprise, was facing significant challenges in protecting its complex network infrastructure from increasingly sophisticated threats. Traditional firewall and anti-virus protection were proving insufficient. The company needed a comprehensive and robust security solution that could protect its information assets, provide secure remote access to corporate resources, integrate intrusion prevention for increased protection, and simplify and centralize network security management. The solution also needed to be future-proofed, capable of evolving with the company's needs and the ever-changing threat landscape.
Case Study
Securing Multi-Agency Network: Ada County's IoT Solution
Ada County, Idaho, is responsible for managing and maintaining security for multiple departments across several cities. The county's multi-agency network includes Emergency Management, Parks and Waterways, Juvenile Court, Paramedics, Waste Management, and more. The challenge was to maintain separate network zones for each agency and specific policies for departments and individuals. The primary focus for the Ada County IT organization was robust integrated security, consolidation of technologies, and centralized management. They needed to integrate the latest network protection strategies for a strong security posture, manage a large distributed security infrastructure, eliminate the administrative burden associated with operating a multi-vendor security solution, and simplify network security management, administration, and reporting.
Case Study
Pacific Coffee Enhances Customer Loyalty and Secures POS Platform with Check Point Safe@Office
Pacific Coffee Company, a rapidly growing coffee chain with around 80 retail outlets throughout Singapore, Hong Kong, and China, faced a significant challenge when transitioning from conventional cash registers to a modern, integrated Point-of-Sale (POS) system. The challenge was primarily related to network security, especially with the introduction of a new customer loyalty card program, the Perfect Cup Card. This card, which replaced the previous paper card system, required the secure sharing of real-time transaction data between the POS terminals in coffee outlets and the main data center. The company needed a solution that could securely handle this data transfer, protect the POS systems from potential security threats, and support the new sales and marketing initiatives associated with the Perfect Cup Card.
Case Study
Securing Broadband Across Multiple Locations: A Case Study on Walters-Dimmick Petroleum
Walters-Dimmick Petroleum, Inc. (WDP), a marketer of Shell petroleum products, operates a large network of Shell-branded retail facilities across Michigan, Indiana, and Ohio. These facilities not only sell Shell gasoline but also incorporate convenience stores, fast food restaurants, car washes, ATMs, phone card services, and other services. The company faced a significant challenge in managing more than 58 locations, each of which required a secure Internet connection for email access and corporate communications. When WDP replaced its dial-up service with broadband, it needed a solution that could provide secure, high-speed DSL across all its locations. The company also sought a solution that could meet and exceed the requirements for PCI compliance, which includes protecting systems containing cardholder data from Internet threats, securing transmission of cardholder data across public networks, enforcing access and authorization policies across networked systems, providing application protection for Web-facing systems, delivering real-time security updates, and simplifying management, reporting, and analysis of security systems.
Case Study
Enhancing Network Security at the University of Hawaii with Check Point Tools
The University of Hawaii (UH) was facing a significant challenge in managing its computer-network security and availability for over 47,000 students and 30 in-house software developers. The university was using a firewall from a legacy computer-network provider, which lacked the necessary functionality and user-friendly interface. With a community of over 58,000 students, faculty, and staff, and a peak usage of 36,000 sessions per second, UH needed to stay ahead of the network demand curve and prevent potential performance issues. The university also required a solution that was flexible and adaptable to the changing pattern of attacks on the Internet. The existing firewall/VPN was too rigid and lacked intelligent management capabilities. Therefore, UH began to evaluate alternatives to its current configuration in winter 2004.
Case Study
Implementing Absolute Security for P&T Luxembourg with Check Point
P&T Luxembourg, a leading provider of residential and professional services in the Grand Duchy of Luxembourg, faced a significant challenge in protecting their infrastructure, applications, and data from the increasing threat of Internet attacks. The speed, profusion, and structure of these attacks, including viruses, spamming, and phishing, necessitated the development of preventive and remote security measures. The company needed to ensure that these security measures were in place before any potential attacks could strike their IT infrastructure. Furthermore, there was a growing trend among companies to rely on external service providers for safeguarding their IT networks and infrastructure from Internet threats. To meet this challenge, P&T Luxembourg turned to a range of Check Point solutions to provide its customers with a dependable, quality service.
Case Study
Securing ANSA’s Information with Check Point
Agenzia ANSA, a leading news agency in Italy and one of the first in the world, faced a significant challenge in ensuring secure remote access for its travelling users. The agency, which provides complete coverage of Italian and foreign events through 22 offices in Italy and 81 agencies in 74 countries, needed to protect its popular portal from intrusion attempts and attacks. ANSA's journalists, working under stressful conditions and extreme deadline pressure, needed to be able to file their stories in a timely manner from anywhere that news is breaking. The agency had relied on VPN-1 Power for years to guarantee secure connections for its remote offices and local bureaus to the home office. However, there was a need for a solution that would allow users to transmit news stories from any location where there is Internet service.
Case Study
Securing Patient Privacy in Healthcare: A Case Study of M.D. Anderson Cancer Center
The University of Texas M.D. Anderson Cancer Center, one of the world’s most respected centers devoted exclusively to cancer patient care, research, education and prevention, faced a significant challenge in maintaining patient privacy. The center, which handles approximately 65,000 patients annually, has always prioritized patient privacy, even before federal and state regulations made it mandatory. As part of their Code of Ethics, patient information is confidential and cannot be disclosed to third parties without patient consent. However, with the advent of the internet and the opportunities it presented, such as telemedicine, remote access to patient records, remote consultation with a patient’s primary physician and mobile healthcare services, the center had to find a way to balance these technological advancements with the stringent requirements of HIPAA. The challenge was not only substantial due to the sheer number of patients but also because of the large number of employees, volunteers, students, postdoctoral fellows, and others who needed access to the information for educational and distance-learning opportunities.
Case Study
Zim Integrated Shipping Services Enhances Security and Connectivity with SSL VPN
Zim Integrated Shipping Services Ltd., one of the largest container-shipping companies in the world, faced a significant challenge in maintaining information security while providing high-performance network access to its globally dispersed workforce. With over 3,000 employees spread across approximately 200 sites worldwide, the company needed a solution that could ensure secure access to network resources, even from less reputable sites. The company's operations were supported by three regional data centers in Haifa, Hong Kong, and Norfolk, Va., and its remote users utilized a variety of network services, including FTP, email synchronization, and remote desktop via Citrix. The geographical dispersion of the company's operations added another layer of complexity, as Zim needed a centralized view of its security solution across its widespread gateways.
Case Study
Securing Remote Endpoints in Financial Services: A Travelex Case Study
Travelex, a global leader in foreign exchange services, faced significant challenges in securing its distributed network. With over 300 workstations in 200 retail locations across the United States and Canada, the company needed to ensure the secure exchange of proprietary financial data across its network. However, many branch locations were connecting to the internet through unsecured dial-up, making it difficult to ensure that all remote locations had the latest antivirus signatures. This situation made certain offices susceptible to aiding virus outbreaks. Additionally, connection speeds varied widely across branches, making it unreliable to push out patches when security upgrades were necessary.
Case Study
Enhancing Mobile Device Security at The Ritz London with Pointsec
The Ritz London, a legendary hospitality establishment, is renowned for its attention to detail and guest confidentiality. However, a security incident involving the theft of a PDA belonging to the IT manager, Richard Isted, highlighted a significant challenge. The stolen PDA was synchronized to Richard's email, and the existing security measures required the device to connect back to the mobile network to self-destruct. This system was deemed insufficient for lost or stolen devices. Furthermore, Richard needed a solution that would protect the information on all mobile devices used by The Ritz's executives without compromising usability. Many executives used their PDAs for email communication and viewing downloaded files, pictures, or music. Therefore, the solution needed to be user-friendly, fast, and transparent, and allow for a degree of flexibility to accommodate both work-related and personal use.
Case Study
VPN-1 Power Facilitates IT Consolidation at Electrolux
Since the 1990s, Electrolux has experienced significant growth and acquisitions, leading to a lengthy process of reorganization. For the IT organization, this meant consolidating infrastructure, focusing resources into a few data centers, and emphasizing connections between these data centers, business offices, and production plants. Connections with the remaining server farms at local sites were equally important. Electrolux had approximately 600 UNIX and Windows servers and about 70 AS/400 systems in Europe, as well as a mainframe. Over time, especially following acquisitions, various problems arose due to the integration of disparate information systems. VPNs had to be established to link different equipment and operating environments while maintaining their ability to be remotely managed. In 2005, Electrolux accelerated the process to optimize its infrastructure and solve the problems of managing such a widely distributed system.
Case Study
Prokit’s Industries Co., Ltd. Enhances E-commerce Adoption and Network Security with Check Point Solutions
Prokit’s Industries Co., Ltd., a leading manufacturer of hand tools, power tools, soldering equipment, test instruments and accessories, was facing a significant challenge in increasing e-commerce adoption by its business partners and customers. The company needed to enable access to its internal and external business portals from multiple internet-enabled devices. This was crucial for the company's global operations, with distribution to more than 90 countries worldwide and a sales and distribution network covering five continents. Additionally, Prokit’s was looking to reduce costs and simplify network security management. The company required a highly secure solution to enable remote access to its distribution and business partner portals from multiple internet-enabled devices. It was also necessary to ensure robust security for a variety of managed and unmanaged PCs and mobile devices accessing the network, provide seamless remote access to distribution and business portals, and maximize efficiency through centralized network security management.
Case Study
Mississippi Secretary of State's Office Enhances Mobile Security with Check Point SandBlast Mobile
The Mississippi Secretary of State's Office faced a significant challenge in providing enterprise-grade protection for Android and iOS mobile devices used by its employees. The office supports approximately 100 state executives, department heads, and directors who use their own mobile devices for business. These high-value targets usually have access to more sensitive information than lower-ranking employees and travel more often, making them attractive targets for cybercriminals. The previous solution couldn’t ensure secure connections for mobile devices to the state’s network, increasing the risk of an attacker breaching the device. The antivirus solution also took up space and processing power on the device, which was a nuisance to users. Additionally, the entire solution was difficult to manage as it wasn’t integrated with the rest of the network or security infrastructure, and there were different processes required for Android and iOS platforms.
Case Study
Mississippi Secretary of State Enhances Security with Check Point SandBlast
The Mississippi Secretary of State, which provides information and services to citizens through eight different divisions, was facing a significant challenge in upgrading its security posture to protect against advanced threats such as ransomware. The agency was in need of a solution that could simplify management and provide comprehensive advanced threat prevention from network to endpoint. The solutions previously deployed lacked capabilities such as sandboxing that could accurately stop and analyze potential threats. Endpoint protection was a traditional, signature-based antivirus product that not only missed malware and advanced threats, but also negatively impacted users’ PC performance. The agency also lacked adequate visibility into threats and actionable information for combating them.
Case Study
Helvetia's Transition to a Secure Software Defined Data Center with Check Point vSEC
Helvetia, a Swiss insurance services provider, was faced with the challenge of migrating to a Software Defined Data Center (SDDC) model without compromising security. The company was also looking to increase the efficiency of its IT team and secure its VMware NSX data center deployment. Like most IT organizations, Helvetia’s IT team was constantly seeking ways to handle a rapidly growing volume of work with the same number of employees. This meant minimizing the number of manual tasks required of team members, reducing the need to retrain and redeploy teams, and finding new ways to deliver services as efficiently as possible. Helvetia saw automation and adopting an SDDC strategy as the means to increased efficiency.
Case Study
Enhancing Security in Biotechnology: Gnosis SpA's Journey with Check Point Security Solutions
Gnosis SpA, an Italian biotechnology company, was facing a growing security challenge due to its rapid expansion. The company's increased attack surface was becoming more susceptible to zero-day and other advanced threats. As a pharmaceutical company, Gnosis had to comply with strict government security regulations, which were increasingly focusing on system security in facilities such as laboratories and manufacturing facilities. However, Gnosis' legacy systems were not equipped to prevent advanced threats from gaining access. The company needed a more efficient, consolidated security solution that could protect its network, data, and communications between its headquarters and other sites. It was looking for a next-generation solution to protect against advanced threats targeting employees, visitors, suppliers, websites, and outgoing communications like email.
Case Study
Dutch Water Resource Board Enhances Network Security and SCADA Systems with Check Point Solutions
The Hunze en Aa Water Resource Board, responsible for managing water throughout eastern Groningen, the Netherlands, faced a significant challenge in maintaining the security and reliability of its Supervisory Control and Data Acquisition (SCADA) systems. The board's primary responsibility is to ensure that communities in eastern Groningen and northeastern Drenthe have access to sufficient, clean water. However, the area's geographical location, much of which is below sea level, makes it particularly vulnerable to flooding. Therefore, any network downtime could jeopardize the safety and lives of people throughout the region. The board needed a reliable solution that provided complete control and minimized risks in its SCADA environment. The existing security tools, which were eight years old and mixed, needed to be replaced with a central, manageable solution. Additionally, the board sought to improve compliance with guidelines from the Baseline Information Security Water Board (BIWA), which has established recommendations to secure utilities’ physical environments and digital information.
Case Study
Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions
The state agency, serving all boards and agencies of its state government, was faced with the challenge of abiding by strict compliance and privacy laws. The agency needed to ensure optimal data protection and was looking for a solution that could consolidate technologies including encryption, firewall, and anti-malware. They also required simplified central management and reporting, reduced costs associated with a multi-vendor deployment, and increased protection through user education. The selection criteria for the solution included comprehensive coverage, enhanced support, a common management console with a single interface, policy-based controls, a small footprint, and cost-effectiveness.
Case Study
Smart & Final's Rapid Retail Expansion Secured by Advanced IoT Solutions
Smart & Final was faced with the challenge of protecting its rapidly expanding retail presence from increasingly sophisticated professional hackers. The company needed to standardize firewall security across all its stores and centralize visibility and management. Additionally, they aimed to enable a rapid roll-out of new stores with minimal manual involvement. All these had to be achieved while reducing the strain on their small in-house IT team, which was tasked with managing the roll-out of firewalls to up to 50 stores a week.
Case Study
Arcopedico's Modernization of IT Infrastructure and Security with Check Point
Arcopedico, a Portuguese ergonomic footwear manufacturer, was facing a significant challenge with its outdated corporate firewall. The existing firewall had limited functionality and was nearing its end of life. As more devices connected to the corporate network, the company realized the need to partition the network to enhance security. The urgency for a change in corporate policy became evident when Arcopedico experienced a 'phishing' incident introduced by an external email account on the network. Although the incident was quickly contained and had no impact on the business, it highlighted the company's vulnerability to cybersecurity threats.
Case Study
AESI Simplifies Mission-Critical Security Operations with Check Point
AESI, a company providing engineering and consulting services to electric utility generation, transmission, distribution, and independent system operators, faced a significant challenge in securing its hybrid cloud environment. The company needed to reduce time and costs associated with security infrastructure management and gain flexibility for quick response to threats and other events. AESI operates in a highly regulated industry and is subject to stringent reliability and security requirements, making it crucial to maintain a highly secure IT infrastructure with high-availability, next-generation security capabilities, and a full range of controls. The company had moved from premises-based infrastructure to a hybrid cloud environment, and when support costs escalated for its previous firewall solution provider, the Technology team began looking for a new solution.
Case Study
Securing ICS/SCADA Network: A Case Study of Central Hidroeléctrica de Caldas
Central Hidroeléctrica de Caldas (CHEC), a major electricity generator and distributor in Colombia, faced a significant challenge in securing its Supervisory Control and Data Acquisition (SCADA) devices. These devices, located in power plants and substations, monitor and control the transmission and distribution networks that deliver power across the regions. However, these SCADA systems were deployed years ago, before cyber security controls were deemed necessary. As a result, they were vulnerable to cyber attacks that could potentially compromise one or more SCADA devices and gain control of vital systems. Furthermore, power plants generating more than 100 megawatts of power and substations transferring more than 115 KW were required to comply with security controls mandated by the Ministerio de Minas y Energía de Colombia and the Comisión de Regulación de Energía y Gas. The challenge was to secure the SCADA devices to prevent network infiltration by attackers and meet governmental security requirements for power generation plants, all while operating in harsh, inhospitable environments.
Case Study
SONPO Enhances File Transfer Security with Check Point ThreatCloud API Integration
SONPO, a security, development, and integration services provider, faced the challenge of protecting its clients against zero-day threats hidden in email attachments and transferred files. The company needed to integrate sandboxing technology for malware analysis with their file transfer service offering. The challenge was to ensure protection across a wide range of client businesses, infrastructures, and file types. The company was also tasked with defending against ransomware, malware, and other zero-day threats, which is an ongoing challenge for companies worldwide. Each organization that SONPO served had a unique environment to defend, so there was no one-size-fits-all security solution.
Case Study
Paschoalotto Leverages Check Point for Scalable Security in Financial Services
Paschoalotto, a leading call center for the financial industry in Brazil, faced several challenges with its existing security infrastructure. The company needed to meet the highest level of security as required by customers and government privacy laws, deliver a flexible security architecture that could scale instantly in an environment of hyper-growth, and integrate the company’s multiple sites and private cloud under a single unified management system. The company's previous solution consisted of multiple vendors, which had led to occasional problems. The new solution needed to support two data centers serving seven different locations, as well as protect the company’s private cloud, all under the umbrella of a single, integrated management system. The security team required a single-vendor solution with a wide array of integrated capabilities, including demonstrated interoperability with their VMware-based private cloud infrastructure.
Case Study
Major Aerospace Company Accelerates Secure Growth with IoT
The major aerospace company, a leader in technologically advanced and intelligent solutions for the global aerospace and defense industry, faced a significant challenge in upgrading its security infrastructure to meet Gen V and future cyber threats. The company's network infrastructure consisted of almost a dozen nodes spread around the globe, capable of delivering massive bandwidth to any link. Bandwidth could spike from one to 10 gigabits per second for long periods, often multiple times a day. The network was fully redundant, with high availability, low latency, and instant scalability mandated to meet customer Service Level Agreements (SLA’s). The security team needed a solution that would allow them to scale on demand and stay secure in the face of dynamically changing bandwidth requirements or overall latency would increase, thus violating customer SLA’s. The company needed to protect all data in transit and secure East-West traffic as well, along with addressing insider security threats that are becoming more and more prevalent in the industry.
Case Study
ENT Credit Union Enhances Network Traffic Visibility with Check Point Next Generation Firewalls
ENT Credit Union, a leading credit union in Colorado, was facing a challenge in improving its security posture with the ability to see east-west traffic and simplifying its infrastructure complexity. The credit union had rigorous security measures in place, using Check Point Firewalls for perimeter security to monitor north-south network traffic from the Internet to the bank’s network. However, they used a different solution to monitor east-west traffic—internal traffic moving on the network between credit union servers and locations. This posed a challenge as they needed a comprehensive view of all network traffic for enhanced security.
Case Study
Eurowind Energy: Safeguarding Critical Energy Infrastructure with Check Point Infinity Total Protection
Eurowind Energy, one of Europe's leading developers and operators of photovoltaic (PV) and wind turbine projects, faced a significant challenge in establishing a comprehensive cybersecurity infrastructure that could adapt during periods of rapid business growth. The company needed to prevent malicious cyber-attacks from impacting its IT infrastructure and protect the critical energy business and industry from downtime. The growth of renewable energy from a niche investment to a critical piece of national infrastructure has increased the need for robust cybersecurity measures. As national energy grids become smarter and more international, the flow of data and touch points increase, thereby expanding the potential attack surface. Eurowind wanted to establish complete visibility of its security posture across its network, cloud, and mobile environments. It sought immediate protection and prevention, as well as an understanding of new threats.
Case Study
Regional Bank Enhances Security Operations and Prevents Advanced Attacks with Check Point SandBlast
The regional bank in the United States was facing a significant challenge in maintaining its network security. The bank was spending considerable resources and man-hours every week to remediate issues caused by malware entering the network and infecting the endpoints. The bank's network security was compromised when internal users visited malicious or compromised websites, which would download malicious content, some of which were unknown, infecting the users' machines. Additionally, spam emails and embedded word documents were bypassing the bank's firewall and reaching the end users. When users opened these malicious files, the executable code in them would enable attacks on the endpoints. The IT security team had to engage in time-consuming remediation procedures. The bank needed a solution that would detect the malicious files before they arrived at the endpoints and reduce the time spent on remediation.
Case Study
Terma A/S Enhances National Security with Check Point Infinity
Terma A/S, the largest aerospace, defense, and security company in Denmark, was facing a significant challenge in tightening its security to protect nation-state secrets from targeted cyber-attacks. The company, which works on highly confidential projects for civilian and military applications, was a prime target for cyber-attacks that could potentially disrupt internal operations and pose risks to national security. Terma needed to update to the latest technology on a regular basis to stay ahead of the hackers who were constantly trying to infiltrate their systems. The main challenge was that hackers are very patient, so Terma always had to be on its toes with the latest technology.
Case Study
Tradair Secures Cloud-Based Financial Trading Platform with CloudGuard Dome9
TradAir, a company that provides end-to-end trading infrastructure software, was seeking a robust cloud security product to protect its mission-critical business assets. The company's solution, which leverages advanced technology services like Docker and Google Big Query, is delivered through a hybrid hosting model residing in the Amazon cloud and Equinix data center. The challenge was to find a security solution that could minimize security risk, eliminate unnecessary infrastructure exposure, and provide firewall management, policy automation, authentication, and access control. The solution also needed to be a key aspect of TradAir’s audit and compliance program, helping the company meet international financial regulations on three continents such as SOX and PCI.
Case Study
Starkey Hearing Technologies Enhances Security with IoT Solution
Starkey Hearing Technologies, a leading developer and manufacturer of hearing aids worldwide, faced a significant challenge in protecting its systems against zero-day threats and ransomware attacks. The company needed to secure the laptops of its mobile users and gain better visibility into incidents without increasing management and maintenance tasks. The challenge was amplified when Starkey was hit by an advanced malware attack, Gatak, a type of Trojan that hides data in image files. This malware led to three or four advanced malware incidents per week, infecting 2,000 machines in just two weeks. The malware gathered valuable data, escalating access privileges to network assets and spreading laterally. When employees took their laptops home, they became much more vulnerable, indicating that Starkey’s antivirus solution was no longer sufficient.
Case Study
Almaviva TSF S.p.A: Enhancing Perimeter Security with Check Point Solutions
Almaviva TSF, Italy’s leading system integrator in the Transport & Logistics industry, aimed to implement a new infrastructure to offer data center as a service. The goal was to streamline the use of IT resources to gain a competitive advantage and reach new target audiences. The challenge was to enhance flexibility, both internally and towards customers. The new infrastructure needed to effectively protect the individual computing 'cells' offered to customers, separate and protect the shared computing resources, support a mixed virtual/physical infrastructure, enable the highest data throughput in a high-performance, 10 Gigabit environment, and allow for a single console, easy centralized management.
Case Study
SF Police Credit Union Enhances Security with Check Point Next Generation Threat Prevention Software Blade Solution
SF Police Credit Union (SFPCU), a financial institution serving over 34,000 members and managing over $760 million in assets, faced significant challenges in meeting government and industry standards for regulatory compliance, improving security to safeguard company and member data, and streamlining management to control costs. The organization's existing firewall, which had been in place for a decade, was found to have major compliance issues during an internal audit. The legacy firewall lacked a robust reporting system and offered no management transparency, making it difficult to generate security posture reports. SFPCU needed an upgraded security solution that could provide improved support for compliance audits, comprehensive protection against external threats and internal issues, and simplified management.
Case Study
Enhancing Healthcare Security and Compliance: Independence Care System Case Study
Independence Care System (ICS), a nonprofit Medicaid managed long-term healthcare plan serving residents in the New York City area, faced several challenges. The organization needed to improve its security to meet strict HIPAA compliance requirements, maximize business continuity to keep core healthcare applications up and running, and simplify network management to help staff stay productive. ICS was seeking a complete security solution that would simplify regulatory compliance, and protect the organization against security threats that could impact network performance. The solution would have to be easy to expand and modify to meet changing needs, and provide centralized management to simplify and streamline network administration for the firm’s IT staff.
Case Study
Securing Wireless Connectivity at Melbourne Convention and Exhibition Centre with Check Point Solutions
The Melbourne Convention and Exhibition Centre (MCEC) is a bustling hub that hosts over 1100 events annually, including meetings, conventions, exhibitions, concerts, tradeshows, and gala dinners. With a wide range of in-house technology across lighting, audio, vision, and IT, MCEC aims to create memorable experiences for event attendees. However, the Centre faced a significant challenge in providing reliable public wireless Internet service to thousands of visitors daily. MCEC needed to maintain control over content and applications, protect users, and support client demand for free wireless connectivity for up to 10,000 devices. The Centre required a solution that would enable thousands of users to access the network concurrently, ensure maximum network security, allow flexibility and management of data access and applications, ensure zero downtime, and provide maximum throughput with no user usage impact.
Case Study
Courtagen Life Sciences: Enhancing Cloud Security with Check Point Solutions
Courtagen Life Sciences, a leader in genomic services, relies heavily on Amazon Web Services (AWS) for its network and communications infrastructure. This cloud-based solution offers agility, cost savings, scalability, and support for users worldwide. However, to be successful, the solution must also provide comprehensive security and support regulatory compliance. Courtagen required a security solution that would work smoothly with its cloud environment and provide comprehensive protection against network attacks and data breaches, agility and flexibility to support changing needs, and simple management. The solution also needed to comply with HIPAA and other security regulations and requirements, seamlessly integrate with AWS, support secure access by mobile employees, and be scalable to support additional users.
Case Study
Carmel Partners: Enhancing Network Security and Productivity with Check Point Solutions
Carmel Partners, a real estate investment firm operating in select markets across the U.S., was faced with the challenge of maintaining network integrity, upholding customer confidence, and ensuring regulatory compliance while improving employee productivity. The growing multi-faceted organization needed a solution to secure network traffic, protect against data loss, and provide secure site-to-site connectivity. They also needed to equip their employees with the ability to securely share data, protect the network from next-generation and Web 2.0 threats, reduce management complexity, and improve visibility of traffic across multiple network segments.
Case Study
CRIF's Virtualization Project: Enhancing Security and Flexibility with Check Point Solutions
CRIF, a leading provider of added-value solutions and information services for the financial services industry, embarked on an extensive virtualization project across its entire infrastructure. The project was extended to the security layer with specific goals to simplify IT security and management, reduce costs, streamline resource utilization, guarantee the highest reliability and extensive network protection, gain a comprehensive view over transactions and applications, and future-proof the security infrastructure with an eye on increasing virtualization. The challenge was to find a solution that offered the highest reliability and performance, transparent security management from a centralized console, effective management of a mixed (virtual/physical) environment, and the ability to scale by adding new systems and services as soon as they were needed.
Case Study
Enhancing Data Security in Healthcare: A Case Study of Hospital 9 de Julho
Hospital 9 de Julho, one of the most significant private health institutions in Brazil, was facing a significant challenge in ensuring the security of its digital environment. The hospital was using a 'home-made' solution that was simple and did not offer complete security or efficient controls to protect data and information leakage. The hospital often found itself in critical situations without having complete visibility of what was happening in its system. The main deficiencies included inefficient tools and applications to support the infrastructure and a lack of awareness among teams about the importance of controlling access and protecting information. The hospital needed a solution that would provide greater visibility and control over its security systems, ensure security when accessing digital systems, and make the digital environment widely available for internal and external users.
Case Study
FXCM Inc. Enhances Network Security with Check Point Solutions
FXCM Inc., a global online foreign exchange trading service provider, was facing challenges in securing its distributed network environment. The company, which serves approximately 200,000 retail customers and 200 of the world’s top hedge funds and banks, operates across 15 global offices. The challenge was to find a robust network security solution that could be deployed regionally and managed centrally by a small dedicated staff. The solution needed to provide robust integrated security, high-performance data center grade hardware, simplified network security management, administration, and reporting, and be part of a single vendor eco-system.
Case Study
Enhanced Data Security for NHS Blood and Transplant with Check Point Endpoint Security
NHS Blood and Transplant, a part of the National Health Service (NHS), is responsible for collecting, processing, storing, and issuing approximately 2.1 million blood donations per year. In addition to handling blood donations, the organization also conducts research to improve the safety of blood and blood products. This involves storing confidential personal data and sensitive research data, making it crucial for the organization to have a fail-safe data security solution. Although NHS Blood and Transplant already had a robust laptop and PC security solution in place as an existing Check Point customer, they needed to enhance the protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.
Case Study
Kingdee Youshang's Implementation of Check Point GO for Enhanced Data Protection
Kingdee Youshang E-business Service Co. Ltd., a leading player in China's enterprise online management service market, faced several challenges in maintaining a high level of security for its cloud computing and endpoint devices. The company needed to implement robust mobile data protection and improve efficiency for its remote offices. Many small and medium-sized businesses, which are Kingdee Youshang's primary customers, lack the necessary IT resources for deploying ERP and CRM software solutions. Kingdee Youshang specializes in providing this market with a full array of software, platform, and service support, including security. To ensure proper protection of its resources, the company needed to secure its applications with a robust data protection solution, ensure data integrity on client’s endpoint machines with proven encryption technology, and improve the efficiency of remote offices while maintaining a high level of security for cloud computing and endpoint devices.
Case Study
Getronics Enhances Security and Efficiency with Check Point's Virtual Solutions
Getronics, a leading IT services provider, was facing the challenge of adapting to the growing trend towards virtualization without compromising on functionality, quality, flexibility, or manageability. The company needed a solution that would allow for smooth and easy integration of virtual solutions in a mixed management environment. They also required a system that would simplify the central and operational management of several clients in a shared environment. The solution had to be mature and proven, with a track record of quality.
Case Study
Geiger Brothers' Growth and Security Enhancement with Akibia and Check Point
Geiger Brothers, a promotional products company, faced a significant challenge in 2005 when it acquired four companies and established four new offices. The company's 500 employees across 20 offices relied heavily on the centralized order management system and document image system, which contained 3 million documents, including all orders, sales receipts, and expense reports. The company was running a nearly entirely paperless operation, which increased the demand for secure and efficient remote access for employees. This demand was not only from executives who were frequently traveling for acquisitions and industry tradeshows but also from sales associates who wanted the flexibility to work from home or other locations. The challenge was to simplify remote access for executives and sales associates, create cost-effective, secure networks and connectivity in small office/home office (SOHO), speed up the deployment of new branch offices, and enable high availability and performance for data and voice.
Case Study
Securing Global Medical Assistance: A Case Study on International SOS and Check Point
International SOS, a global medical and security assistance company, faced significant challenges in securing its communications. The company used appliances for this purpose, but found them to be cumbersome in emergencies and remote locations. Most firewall and VPN security solutions required a great deal of patience and knowledge to set up, and were not the primary focus in remote field locations where medical and physical security emergencies were more pressing. Additionally, not every solution could be managed from a single console, which demanded a lot of attention from IT administrators. From a cost perspective, most appliances and other security solutions carried a high cost of ownership, unnecessarily burdening the company. Furthermore, finding local technical administration talents in remote locations, especially for specialized appliances, proved to be a challenge.
Case Study
TekJet Enhances IT Security Services with Check Point Solution
TekJet, a Denver-based managed IT services provider, was looking to expand its services to include IT security. The company, which primarily serves small- and medium-sized businesses, had transitioned from a 'break-fix' business model to a managed services model, offering additional value-added services. However, to incorporate IT security into its service portfolio, TekJet needed a solution that would integrate seamlessly with its existing managed services platform. This platform was used for remotely managing customer infrastructures, including network components, servers, and desktop PCs. Furthermore, TekJet required the capability to remotely control policy and upgrades for all customers from their Network Operation Center.
Case Study
Montreal's Secure Voter Registration: A Case Study on Check Point VPN
The City of Montreal faced a significant challenge when it was required to merge with 28 surrounding suburbs, a move that was met with considerable opposition. This led to the promise of referendums to reverse the mergers, provided sufficient voters registered for the referendum. To facilitate this process, the City needed to set up temporary voter registration centers, which required a secure and efficient system to manage sensitive voter information. The City had to ensure total security for this sensitive data, provide a quick setup for these temporary centers, and supply efficient security management. The challenge was further compounded by the need to update the centralized voter list in real time, reducing paper volume and saving time over the previous manual process of collecting paper forms for later data entry.
Case Study
Tokiwa University's Integrated Campus Network Security Solution with Check Point
Tokiwa University, a private educational corporation in Japan, unveiled its new Media and Information Technology Center in 2005 to facilitate education and research across the campus. The center houses a full inventory of digital equipment, including computers, video production studios and equipment, and much more. In 1995, the university connected to the Internet through participation in SINET (Science Information Network). As the needs of the faculty and students quickly grew beyond Web browsing and email, branching into a variety of other applications, the university faced growing issues of network bandwidth and guaranteed availability. The university needed to balance security with network expansion and guaranteed availability. They needed an environment allowing free access to the Internet for students, which means they absolutely had to have strong security measures in place.
Case Study
YMCA of Metropolitan Chicago Enhances Remote Access and Security with Check Point Connectra
The YMCA of Metropolitan Chicago, one of the largest human services organizations in the nation, faced significant challenges related to remote access connections due to its sheer size and the nature of its operations. The organization runs programs in facilities that are not always their own, and a growing number of employees, particularly at the management level, needed to connect to the network from their home or off-site locations. The challenge was to provide these workers with a way to take their laptops off-site or work from home but still be able to connect to the network and access their desktops to retrieve important information. The organization needed a reliable, secure, and cost-effective solution to ensure the confidentiality and integrity of restricted information.
Case Study
Hixardt Technologies Leverages Check Point Solutions for Enhanced SMB and MSP Security
Hixardt Technologies, a company specializing in providing technology services and solutions for small- to medium-sized businesses, faced a significant challenge. The company's primary focus was on businesses with 25-35 users, a segment often overlooked in terms of IT solutions. Most available solutions were either designed for individual consumers or large enterprises, leaving a gap in the market for SMBs. Hixardt needed a solution that could cater to the unique needs of these businesses, particularly in terms of IT security. The solution needed to be integrated into Hixardt’s management system, allowing for centralized management of its clients' IT needs in real-time, while also being cost-effective and profitable.
Case Study
Jeonju University Enhances Security Infrastructure with Check Point Integrated Appliance Solutions
Jeonju University, a leading educational institution in South Korea, was faced with the challenge of managing a vast database of academic credits and personal records for its 12,000 students and nearly 250,000 graduates. The university's existing server was overburdened with daily traffic, leaving it vulnerable to increased attacks and creating a precarious internet environment. The university needed a quick, efficient, and cost-effective security solution that could handle the growing need for protection and ensure the confidentiality and integrity of restricted information.
Case Study
Osmose Enhances Endpoint Security with Check Point Solution
Osmose, a leader in wood preservation technology and asset management, was faced with the challenge of supporting the needs of 800 users in their corporate headquarters and 200 remote users. The remote users, who frequently traveled and used their laptops in various locations worldwide, posed a significant security risk. The company's sensitive and proprietary information was at risk of being compromised due to potentially unsecured endpoints logging in from all over the world. Osmose had a limited IT resource and struggled to ensure these endpoints were secure before accessing the corporate network. As a result, they instituted a closed Internet access policy that required remote users to whitelist the hotel's network before accessing the corporate network. This policy was not well received by users, and many stopped trying to use the Internet access available in hotels. Another challenge was the issue of basic Microsoft Security updates. Many employees neglected to download the latest improvements, further compromising the security of the network.
Case Study
IFAW Enhances Security with Check Point Endpoint Security
The International Fund for Animal Welfare (IFAW) had been a Check Point customer for about eight years and was familiar with the quality and superiority of Check Point security solutions. However, they faced a challenge when users began experiencing problems with secure remote access. With approximately 70 percent of employees working outside the organization’s headquarters, IFAW needed a secure remote access solution that could guarantee more internal security and controls, especially for mobile users. The majority of mobile users were migrating away from using IFAW global dial-up access to the available broadband access options in hotels and conference rooms. This migration led to issues such as worm infestations, an increase in malware, and users returning to the office with unauthorized software installed on their devices. IFAW was concerned that the remote workforce, who had access to confidential internal systems while on the road, would use a VPN tunnel to unknowingly inject something inappropriate inside network headquarters.
Case Study
Denbighshire County Council Leverages Eventia Suite for Enhanced Security Management
Denbighshire County Council, serving a local population of 93,000 in North Wales, UK, was faced with the challenge of managing web access for a diverse range of users. This included providing and supporting leased-line Internet access for 66 primary and secondary schools across the county, as well as Internet services within the County’s local libraries, in addition to maintaining the Council’s own internal network. The council’s IT team was tasked with the daunting task of sorting through the massive volumes of log data produced by its security and network devices every day. Converting millions of data logs from multiple sources into usable, actionable information was proving to be an insurmountable task for the small IT team. This not only made it difficult to perform security checks or spot emerging attacks or vulnerabilities systematically, but also diverted the IT team’s resources away from other important network management tasks.
Case Study
Securing Patient Data: Memorial Health Services' Adoption of Check Point Full Disk Encryption
Memorial Health Services (MHS), a nationally recognized, not-for-profit health care system with five hospitals in Southern California, was faced with the challenge of protecting confidential patient information. With increasing media coverage on the exposure of confidential patient data, MHS was concerned about a potential data breach that could compromise the security or confidentiality of patient information. As one of the top hospital organizations in the country, MHS is responsible for large amounts of confidential patient information. The growing number of employees working remotely and regulatory drivers such as the Health Insurance Portability and Accountability Act (HIPAA) and SB 1386, a California law regulating the privacy of personal information, necessitated a comprehensive data security solution that could be deployed quickly and transparently to secure the personal health information of its patients.
Case Study
Andrade Gutierrez's Converged Network Built on Check Point Foundation
Andrade Gutierrez (AG), one of Brazil’s largest heavy construction firms, was experiencing rapid growth and needed a more reliable, higher-performing, and easier-to-manage network. The company was redesigning its infrastructure to converge voice and data on a single network and required a security solution with the performance and stability to handle the combined traffic. The existing firewalls were unstable, and the company was faced with the decision to upgrade or replace them. At the same time, AG wanted to extend secure network connectivity to all the remote offices at its construction sites in Brazil. While the major offices had direct network links, some smaller offices were left outside the network with only Internet access.
Case Study
TeliaSonera's Competitive Edge with Check Point Security Solutions
TeliaSonera, a leading telecommunications company, operates in two distinct markets: the Nordic and Baltic regions, and the rest of Europe and Asia. In the mature Nordic and Baltic markets, TeliaSonera services 23 million out of a total population of 31 million customers. The company's growth strategy in these regions involves offering managed services for voice and data that business customers can tailor to their needs. In the European and Asian markets, TeliaSonera only offers mobile services but is continually exploring new opportunities and expanding as appropriate. The company's managed service solutions include monitoring, support, maintenance, and security from the network level to the server level to the desktop. For the security component, TeliaSonera needed a flexible solution that could cater to a wide range of customers from small businesses to large enterprises and provide easy, cost-effective management of hundreds of firewall gateways.
Case Study
TDC Song's Telecommunications Transformation with VPN-1 VSX
TDC Song, a leading Nordic telecom operator, faced a significant challenge when it was acquired by the TDC Group of Denmark. The acquisition required a name change and a complex consolidation of backend systems across the entire Nordic region, including Denmark, Finland, Norway, and Sweden. As a telecom service provider to 23,000 customers, primarily medium to large enterprises, TDC Song needed to offer easy-to-implement security policies to their customers. However, the company only provided capacity and not security consultation. The consolidation project required a solution that could handle the consolidation of separate physical gateways onto one virtualized gateway, while also allowing for easy adjustment of security policies based on individual end-customer preferences.
Case Study
Shepherd and Wedderburn Leverages Pointsec Protector for Enhanced Data Security
Shepherd and Wedderburn, a leading UK law firm, was faced with the challenge of securing confidential client information and intellectual property against loss or theft. As a legal organization, the firm handles a large volume of sensitive data daily, ranging from medical litigation cases to employment disputes. The potential consequences of any confidentiality breach would be disastrous for the firm, both in terms of reputation and trust. The firm's IT manager, Mark Findlay, identified three key requirements from a security solution: protection of intellectual property including confidential client information, prevention of nonbusiness software/material introduction onto the corporate network, and prevention of virus infections.
Case Study
IoT Security Solution for Redditch Borough Council: A Case Study
In the mid-to-late 90s, Redditch Borough Council, a local government body in the United Kingdom, faced a significant security challenge. The spread of boot sector viruses via infected floppy disks was a major security problem. The council's IT department identified that a significant virus threat to its network was being caused by users introducing floppy disks onto their work PCs, which they had been using at home. The council needed a solution that would manage the introduction of foreign media and control the installation of software and new files on every council PC. Prior to adopting Check Point data security, the council relied on an antivirus package deployed on a small number of machines. However, this solution failed to provide complete security, and the associated costs of protecting the network from unauthorized software installations and viruses proved to be beyond the scope of available budgets.
Case Study
RPS Enhances Remote Access Security with Check Point Solutions
RPS, a leading multidisciplinary consultancy in Ireland, faced a significant challenge in providing secure, reliable remote access for its highly distributed enterprise. The company supports its various divisions with an information technology strategy characterized as a 'distributed centralized model.' Services such as email are centralized, with different services being located in different places connected by an MPLS network. However, hundreds of RPS employees move around, working from various locations including RPS offices, home, hotels, airports, customer facilities, or even remote countryside locations. The company needed to provide secure remote access that is also extremely user-friendly so that consultants can access their email, download standards from the intranet, and report their hourly billings and expenses from the field in a timely manner. The existing https product for remote intranet access was not deemed secure enough for wide distribution due to concerns about the safety of the laptops used by the employees.
Case Study
Securing Healthcare Endpoints: A Case Study on Edwards Lifesciences and Check Point Integrity
Edwards Lifesciences, a global leader in cardiovascular disease treatment, faced a significant challenge in ensuring the security of its network endpoints. As a U.S. healthcare company, Edwards Lifesciences had to comply with numerous federal and state regulations, including the Federal Drug Administration, the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act, the Sarbanes-Oxley (SOX) Act, and the California Security Breach Information Act. To meet these regulatory requirements, Edwards needed to demonstrate that all its endpoints connecting to the network were safe and adhered to the company’s security policies. The company had a presence in 100 cities, with its main data center in Irvine, California, and a regional hub in Horw, Switzerland. Many offices and remote users connected securely through the Internet via Check Point VPN-1 Pro gateways, adding to the complexity of the security challenge.
Case Study
Empowering Disabled Adults with Safe Internet Access: A Case Study of The Freedom Centre
The Freedom Centre, a charity and day center for physically disabled people in Sheerness, Kent, United Kingdom, wanted to offer Internet-related experiences to its members. The trustees believed that the Internet could be a valuable tool for people with disabilities, helping them extend their scope and increase interaction with the world. With a grant from the National Lottery, the center bought two high-capacity PCs, a printer, and software to work on the Internet, and added classes using the Internet, e-mail, and website design for both recreational and research purposes. However, with the expanded independence that the Internet offered, concerns arose about protecting a vulnerable group from offensive, dangerous, and inappropriate inbound and outbound contacts. The Center Trustees also worried about the potential negative repercussions with donors if member-clients were found to be accessing inappropriate web content.
Case Study
Advanced Systems Group Enhances Network Security with Check Point's UTM-1
Advanced Systems Group (ASG), a national Open Systems integrator and certified Check Point partner, was facing growing security challenges as it expanded from a single office to multiple locations. Despite being a smaller company with just over 100 employees, ASG was dealing with significant issues related to network security. The company was using Verizon Business for the management of its wide-area network, but was dissatisfied with the limitations of their network managed firewalls. The cost was high and the bandwidth provided was insufficient for ASG's needs. ASG's Chief Information Officer, Dan Park, was looking for a solution that could provide better internet security management at a more affordable cost.
Case Study
Check Point Power-1 Provides Robust Protection and Unrivalled Manageability for CSL Limited
CSL Limited, a leading mobile network operator in Hong Kong, faced a significant challenge in maintaining robust security protection for its services. As the first mobile phone operator in Hong Kong, CSL has a reputation to uphold among its 2.6 million customers. Any amount of service downtime could severely impact the company's image and reputation. The company operates in a highly competitive market with more than seven mobile service providers and around 11 million mobile subscribers. Given the 24x7 uptime requirement of a mobile service provider in such a competitive environment, attentive support and quick turnaround time from vendors was crucial. The challenge was to find a solution that could provide comprehensive protection against threats, offer one-stop deployment and service support, and ensure secure and continuous uptime.
Case Study
Family Assurance Enhances Security and Achieves FAST Accreditation with Pointsec Protector
Family Assurance, the UK’s largest tax-exempt friendly society, faced a significant challenge in maintaining data and corporate network integrity due to the large number of staff. The company identified risks associated with unmanaged user access, such as the potential for sensitive data to be moved via removable media or the introduction of virus-infected, untested, or unlicensed software. The team at Family Assurance wanted to take a proactive stance and use a sophisticated technology solution to ensure that the company did all that it could to promote good practice. They aimed to achieve accreditation from the Federation Against Software Theft (FAST), a UK organization that promotes the legal use of software. FAST accreditation indicates software compliance and reduces virus risks.
Case Study
Glatfelter Insurance Group's Transformation with IoT: A Case Study
Glatfelter Insurance Group (GIG), a leading insurance broker, faced a significant challenge in supporting its home-based sales executives. The company markets its Volunteer Firefighters Insurance Services (VFIS) products and programs through independent agents and a network of sales executives who work from their homes. To support these sales executives, GIG implemented new customer relationship management (CRM) and imaging applications with a Web interface. However, the remote access via toll-free dialup was slow, and telecommunications costs were soaring as these associates frequently stayed connected all day. GIG needed a faster, more cost-effective, and secure way for sales executives to access sales-support information and communicate with underwriters and claims professionals.
Case Study
Matheson Tri-Gas Streamlines Operations and Reduces Costs with IoT
Matheson Tri-Gas, a supplier of pure gases and gas mixtures, was facing a significant challenge in connecting its numerous branch offices and integrating newly acquired businesses. The company, which has over 900 employees and 60 locations across the United States, was growing rapidly and had plans to acquire more distribution companies. Many of these locations were small offices and retail outlets with limited IT resources. These locations required access to the company’s intranet, centralized ERP applications, and a proprietary cylinder management system that tracks more than 700,000 gas cylinders nationwide. The existing frame relay networks were slow and expensive, and the company wanted to leverage the development of broadband services to link its branch offices. However, the company was concerned about the security risks of always-on Internet connections and needed a cost-effective Internet security and Virtual Private Network (VPN) solution that was easy to use and transparent to the users.
Case Study
Securing Mobile Devices: A Case Study of Tech Electronics and Check Point
Tech Electronics, an IT services company with a wide customer base across the country, faced a significant challenge in securing remote access to customer information. The company's employees handle sensitive data remotely, making it crucial for the company to assure its customers that their data is safe. The company sought a solution to guarantee security and centrally manage security updates across all endpoints on the network. The first challenge was securing mobile connections over the open Internet, with the idea of using a Virtual Private Network (VPN) to secure communications in transit. Another challenge was the logistics of implementing a security solution on new phones for over 200 employees, which involved taking delivery of the phones, uploading the security solution, and distributing the phones to employees in the field. Lastly, the company needed a way to manage updates centrally and automatically once the new phones were distributed.
Case Study
Securing Confidential Data: Michael Page International's Deployment of Check Point Data Security Products
Michael Page International, a leading professional recruitment agency, faced a significant challenge in securing its confidential data across office-based PCs and a fleet of 50 laptops used by directors, senior management, and IT staff. The company, with around 300 PCs in 65 offices across the UK, needed a solution that could protect against data loss or theft, and could be easily deployed and controlled across a distributed network. The need for confidentiality was paramount in their business, as their clients and applicants depended on it. The challenge was to find a solution that would not only secure the data but also operate automatically without disrupting the end user, and reduce the burden on IT support staff.
Case Study
MBM Computer System Solutions Enhances Internet Security for SMBs with Check Point
MBM Computer System Solutions, a Michigan-based Managed Services Provider for SMB clients in various sectors, prides itself on providing end-to-end IT services. The company's reputation is built on its ability to ensure uptime for businesses while helping them run as efficiently as possible. However, to maintain this level of service, MBM needed a solution that offered robust IT security and central management capabilities. The company was also looking for a solution that would allow them to build a recurring revenue model. The challenge was to find a comprehensive solution that could keep pace with ongoing business needs and the constantly shifting security threats. Furthermore, the solution needed to provide MBM with total control over their clients’ IT systems, including control of licensing and renewal of customer’s products.
Case Study
Bavarian Brewer Leverages IoT for Enhanced Security and Network Management
Erdinger Weißbräu, a leading private brewery in Germany, faced a significant challenge in managing its complex IT structure while maintaining its traditional brewing methods. The brewery, which produces 1.5 million hectoliters of wheat beer annually and exports to over 70 countries, required an efficient and easily manageable security environment for its operations. The brewery's development was heading towards the internet, necessitating a robust security solution. The brewery also needed to separate its internal networks, such as the production network from the sales area, to ensure the security of its trade secrets and protect against disruptive attacks. The brewery considered various market leaders, including Cisco and Check Point, and concluded that Check Point was more user-friendly and easier to handle.
Case Study
UTM-1 Edge: A Game Changer for Manfrotto Group's Business Expansion
Manfrotto Group, a global leader in the creation, production, and distribution of professional support systems for the photography, video, and entertainment industries, faced a significant challenge in securing VPN access to their centralized data centers. The company's information systems were consolidated in Bassano del Grappa, where the main data center was equipped with approximately 50 servers. This architecture allowed all the business units within each brand to connect to a centralized data center to access administrative and financial systems. However, as the company grew, so did the demand for secure remote access to corporate resources. More than 25% of the employees in Italy were considered mobile users, and the trend was quickly catching on throughout the branch offices. The company needed a solution that could be centrally managed out of the data center while securing the new access to information and corporate resources for which users were asking.
Case Study
Total Network Security For Telecom Plus − The Utility Warehouse
Telecom Plus plc, a major British company and a leading provider of Internet and landline telecom, and gas and electric utility services in the UK, faced a significant challenge. The company's Utility Warehouse Discount Club needed a network that was completely safe from the threat posed by removable media devices. Many employees at Telecom Plus’ North London headquarters spent a large amount of time ‘hot-desking’ around the office as well as working remotely. This necessitated the use of removable USB devices to carry around large quantities of data. The challenge for the IT department was to ensure that the workforce was as flexible as possible without risking the security of the network, or the threat of data theft through USB flash drives and other removable media devices. A blanket ban on removable media devices would limit the company’s workforce flexibility, and create an air of distrust among employees. The only solution was to control the use of removable media devices and have total visibility of data coming in and out of the network.
Case Study
Securing Grupo VR’s Confidential Information with Check Point Connectra
Grupo VR, a Brazilian company that provides employee benefits in the form of debit cards, faced a significant challenge in ensuring the security and integrity of its confidential information. With a yearly revenue of $2 billion and employing more than 400 people across 12 branches in Brazil, the company had a considerable need for a safe and reliable connectivity infrastructure. The company's employees and third-party suppliers required substantial remote access to the company's systems. As the company evaluated remote-access solutions from several different companies, it sought a solution that would support its diverse requirements while minimizing the complexity of deploying and supporting remote access to applications. The solution also needed to ensure the security of the network for all types of remote-access scenarios.
Case Study
Skipton Building Society Enhances Data Security with Pointsec Protector
Skipton Building Society, the seventh largest building society in the UK, faced a significant challenge in maintaining data integrity and security. In 1998, the society decided to upgrade its IT environment by replacing 'dumb' terminals connected to a mainframe environment with a network of desktop computers, many of which were connected to the internet. This move, while beneficial for operational efficiency, posed a significant security risk. The society needed a comprehensive security solution that could guard against the introduction of malicious code, unlicensed software programs, and unauthorized removable media devices. The solution also needed to maintain data integrity and prevent data theft, a critical requirement given the sensitive nature of the financial data the society handles.
Case Study
UTM-1 Implementation for Secure Infrastructure in Sooki Co., Ltd.'s New Application Services Business
Sooki Co., Ltd., a company specializing in rentals, sales, and repairs of survey and measurement devices, was expanding its business to include 3D application services for various industries. To ensure secure use of these applications by customers from plants, offices, and research centers, Sooki needed to install a unified threat management (UTM) appliance in its data center. The company also needed to provide a low-cost, integrated gateway security system, reduce operating overhead, and provision a uniform security environment for all customer locations. Furthermore, Sooki faced the challenge of constructing a network environment that would allow the construction site, JV office, and each general contractor location to access Sooki’s Tokyo data center via the Internet and use the application. The varying PC environments and inadequate equipment at some sites posed additional challenges.
Case Study
BCA’s European Network Secured and Streamlined with Check Point Solution
British Car Auctions (BCA), Europe’s leading vehicle remarketing company, faced a significant challenge as it expanded its operations across Europe. With 14 centers in 9 different countries, BCA required a highly secure solution to provide its European sites with access to the financial systems and database hosted in the London data center. Additionally, BCA was in the process of developing a centralized auction system to replace the multiple independent applications being used across Europe. The challenge was to find a solution that could provide secure, reliable, and cost-effective network connections for multiple auction sites, ensuring high security, availability, and performance for transactions.
Case Study
Revamping Security Infrastructure for Southern Housing Group
Southern Housing Group, a not-for-profit housing association in southeast England, was facing a persistent security problem. The organization, which has an extensive network of remote offices, was struggling with security management despite outsourcing it. Viruses and other intrusions were affecting network performance and user productivity. The Group's network included a head office, an operational center, four regional offices, and approximately 60 estate offices and temporary on-site project management offices. The number of remote locations fluctuated as projects were started and completed. The Group had a cost-effective site-to-site IP virtual private network (VPN) connecting all the locations. However, the dynamic environment and the extensive network made security management a significant challenge.
Case Study
Securing Global Telecommunications: A Case Study of Symsoft AB and Check Point VPN-1
Symsoft AB, a telecommunications company, provides innovative services to operators, enabling them to offer subscribers new services such as multimedia messaging. With a small team of 60 employees, Symsoft has a global reach, installing its Java-based software on open servers shipped to customer locations across three continents. The company is obligated to provide 24-hour support for its customers, requiring them to log on to the Symsoft network and connect remotely to customer installations anywhere. This global reach and remote access to customer's real-time, mission-critical systems make security a vital concern. Compromised security could lead to significant revenue losses for a customer and potentially damage Symsoft's reputation. As a software developer, Symsoft also needs to protect its main asset—its source code—from theft or damage by network intruders.
Case Study
Dakota Internet Partners Enhances Security Services with Check Point Managed Security
Dakota Internet Partners, a leading Internet Service Provider (ISP) in southern Arizona, was seeking to provide its customers with value-added services that would give them a competitive edge. The company identified network security services as a logical extension of its existing business model. However, providing customers with a security solution was only the first piece of the puzzle. Dakota Internet Partners also required a solution that included a platform for managing numerous, geographically dispersed security appliances from a central location. The company needed to minimize up-front investment in IT infrastructure, provide centralized security management and service provisioning, and deploy seamless integration with existing back office and provisioning solutions.