• >
  • >
  • >
  • >
  • >

Case Studies.

Add Case Study

Our Case Study database tracks 22,657 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (48)
    • (40)
    • (24)
    • (17)
    • (15)
    • (3)
    • (1)
    • (1)
    • View all
  • (6)
    • (3)
    • (2)
    • (1)
  • (3)
    • (2)
    • (1)
  • (2)
    • (2)
  • (13)
  • (5)
  • (5)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 19 Industries
  • (49)
  • (6)
  • (1)
  • (1)
  • (32)
  • (29)
  • (14)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 11 Use Cases
  • (46)
  • (42)
  • (5)
  • (5)
  • (1)
  • (1)
  • (1)
  • View all 7 Services
  • (51)
Selected Filters
51 case studies
Sort by:
Illinois State Treasurer Uses CrowdStrike to Protect Public Funds and Deliver a “Security First” Strategy - CrowdStrike Industrial IoT Case Study
Illinois State Treasurer Uses CrowdStrike to Protect Public Funds and Deliver a “Security First” Strategy
The Illinois State Treasurer’s Office faced significant challenges in securing its digital assets due to limited funding, which often resulted in an outdated, inefficient, and uncoordinated IT environment. The complexity of financial compliance requirements further strained resources, while legacy security tools generated excessive false positives and low-priority alerts that overwhelmed the security teams. Additionally, the magnitude of state funds under management, often exceeding tens of billions of dollars, made it a compelling target for cybercriminals. The existing security solution from a state supplier was inadequate, generating nearly 30,000 false positives a day, which quickly overwhelmed the in-house team.
Download PDF
Coventry University Enhances Endpoint Security with CrowdStrike Falcon Complete - CrowdStrike Industrial IoT Case Study
Coventry University Enhances Endpoint Security with CrowdStrike Falcon Complete
Coventry University faced significant challenges in managing endpoint security across a highly diverse and volatile global environment. The university's reactive approach to security was inefficient, with frequent reliance on complete disk reimaging to address compromised machines. The university's dynamic portfolio of over 600 applications and a 'bring your own device' (BYOD) policy further complicated the situation, leading to a resource drain on the security team. An independent audit confirmed that endpoint security was the weakest link in the university's defenses, exacerbated by the diverse and unknown nature of devices connecting to the global network.
Download PDF
Navitas Centralizes Cybersecurity to Protect the Data of Students, Staff, Partners and Investors Worldwide - CrowdStrike Industrial IoT Case Study
Navitas Centralizes Cybersecurity to Protect the Data of Students, Staff, Partners and Investors Worldwide
Navitas, a global education provider, faced significant cybersecurity challenges, including protecting the data of approximately 80,000 users across 120 campuses worldwide. The company needed to comply with strict data security regulations and was experiencing increased phishing attacks. The education industry, in general, is a target for cybercriminals due to the valuable intellectual property and personally identifiable information it holds. Navitas needed to safeguard this data while managing a global footprint and maintaining consistent infrastructure across its numerous campuses. The company recognized the need to centralize and improve the maturity of its security systems to address these challenges effectively.
Download PDF
European Construction Supplier Repels Ransomware, Rebuilds Security Defenses - CrowdStrike Industrial IoT Case Study
European Construction Supplier Repels Ransomware, Rebuilds Security Defenses
SIG, a leading European building solutions provider, faced a significant cybersecurity challenge when a GandCrab ransomware attack struck over 600 devices in its France-based operations. This incident forced the company to shut down its entire French operation, which accounts for almost 30% of its total revenues. The attack highlighted the growing threat of cyberattacks and the vulnerability of endpoint devices. At the time, SIG had multiple endpoint antivirus products in place, but they were proving ineffective due to unnecessary administration challenges and the varying efficacy of the products. The company had a lean IT organization, with regional teams supported by a centralized IT function, making it crucial to find a reliable cybersecurity partner to augment their internal team. The SIG security team had already begun evaluating its cybersecurity culture and infrastructure to protect against such threats, especially for end users who were seen as primary targets. The ransomware attack underscored the need for a robust endpoint protection strategy and the importance of selecting a capable cybersecurity vendor.
Download PDF
BOB Financial Digitally Transformed Security to Support Growth Leveraging Cloud Infrastructure - CrowdStrike Industrial IoT Case Study
BOB Financial Digitally Transformed Security to Support Growth Leveraging Cloud Infrastructure
BOB Financial faced multiple challenges including regulatory compliance, sustainable growth, and a rapidly evolving threat landscape. With over 900 users across seven locations and plans to expand both domestically and internationally, the company needed improved security management and visibility of its end-user devices. The existing antivirus solution was signature-based, difficult to update, and inadequate against zero-day and sophisticated cyberattacks. Additionally, the lack of visibility and centralized control posed significant limitations, especially with a small in-house IT team supporting geographically distributed users. The company also needed to ensure compliance with financial industry and government regulations while preparing for business growth and managing a remote workforce.
Download PDF
Operational Efficiency Gains Empower CARE Ratings On Its Journey of Digital Transformation - CrowdStrike Industrial IoT Case Study
Operational Efficiency Gains Empower CARE Ratings On Its Journey of Digital Transformation
CARE Ratings faced significant challenges with its legacy signature-based endpoint protection solution, which was placing a heavy burden on the company's networks, servers, and security team. The existing system required substantial manual oversight to monitor and secure the perimeter, which was not sustainable as the company aimed to advance its digital transformation efforts. The need for a more efficient and effective security solution was critical to reduce workload and enhance the company's defenses. The legacy system's impact on network bandwidth and compute cycles was also a concern, as it affected end-user productivity and the overall responsiveness of the business.
Download PDF
CTOS Protects Customer Data, Meets Strict Compliance and Expands Globally with Advanced Security Solution - CrowdStrike Industrial IoT Case Study
CTOS Protects Customer Data, Meets Strict Compliance and Expands Globally with Advanced Security Solution
CTOS faced a complex security landscape due to the diversification of geographies, services, and customers, along with new compliance obligations. The company needed to securely store and provide access to sensitive information for an increasing number of customers. Additionally, CTOS expanded its geographic coverage by acquiring companies in Thailand and the Philippines. The introduction of the Risk Management in Technology (RMiT) policy by Bank Negara Malaysia required CTOS to comply with stricter cybersecurity requirements. The management of legacy antivirus solutions was challenging, as the agents were difficult to update and required ongoing maintenance. CTOS needed a solution to address these challenges and ensure compliance with the RMiT policy.
Download PDF
Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threat-based Operational Security Approach - CrowdStrike Industrial IoT Case Study
Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threat-based Operational Security Approach
Despite a conservative approach to cybersecurity investment, the Asia-Pacific region, including Globe Telecom, faces the same cyberthreats as elsewhere, particularly the growing concern of ransomware. The region's conservative approach has led to a talent gap, making it difficult to identify and recruit threat hunters and experienced analysts. Telecom is one of the industries most commonly targeted by sophisticated adversaries, and Globe Telecom required cutting-edge cybersecurity to protect both its internal systems and infrastructure and its customers from the latest threats. Additionally, Globe Telecom sought to adopt a new approach to security for full visibility to better manage response, resources, and compliance.
Download PDF
Greenhill Enhances Data Security with CrowdStrike's Comprehensive Endpoint Protection Solutions - CrowdStrike Industrial IoT Case Study
Greenhill Enhances Data Security with CrowdStrike's Comprehensive Endpoint Protection Solutions
Greenhill, a global independent investment bank, faced significant challenges in protecting sensitive data, complying with financial industry regulations, and securing remote employees. The firm operates from 17 offices across five continents, focusing on client services rather than investing or trading. With a mid-market size, Greenhill needed to ensure that its data remained secure, especially with employees using their own devices and connecting from home. The ever-changing threat landscape and the need to maintain a solid defense-in-depth strategy were major concerns for the company.
Download PDF
TDK Electronics Enhances IT Security with CrowdStrike's Cloud-Based Solutions - CrowdStrike Industrial IoT Case Study
TDK Electronics Enhances IT Security with CrowdStrike's Cloud-Based Solutions
TDK Electronics faced significant challenges in maintaining robust IT security due to the increasing sophistication of cyberattacks targeting their infrastructure. The company needed to detect and prevent attacks effectively while reducing the complexity of their security stack. Additionally, they aimed to decrease the rate of false positives, which was a significant issue with their previous solutions. The existing antivirus software was inadequate for the evolving threat landscape, especially with the rise of mobile device usage and sophisticated malware. TDK Electronics required a solution that could integrate AI to avoid dependency on frequent security updates and streamline security administration. The need for a comprehensive solution that could manage endpoint security across their global operations was critical, as the company had to ensure high levels of availability, confidentiality, and integrity for their high-profile clients in the automotive and industrial electronics sectors.
Download PDF
TUI Deploys CrowdStrike to Protect Unique Holiday Experiences for its Customers - CrowdStrike Industrial IoT Case Study
TUI Deploys CrowdStrike to Protect Unique Holiday Experiences for its Customers
TUI Group, a leading global tourism company, faced increasing risks of sophisticated cyberattacks as it aimed to digitize and deliver unique holiday experiences. The existing endpoint security solutions were no longer adequate to protect the vast amount of personal data associated with their services, including booking flights, hotels, and excursions. The company needed to address the growing intensity and sophistication of cyber threats, exemplified by the global Log4j issue, which highlighted the complexity and fast-paced nature of modern cyberattacks. TUI's strategy to offer personalized holiday experiences required a secure IT infrastructure that could cater to the dynamic needs of travelers while ensuring data protection.
Download PDF
CrowdStrike Helps Leading Digital Recruitment Business Protect Personal Content for Thousands of Jobseekers Worldwide - CrowdStrike Industrial IoT Case Study
CrowdStrike Helps Leading Digital Recruitment Business Protect Personal Content for Thousands of Jobseekers Worldwide
StepStone, a leading digital recruitment platform, faced significant challenges in ensuring the security of highly sensitive personal information. As a digital-only, global business, the company was increasingly vulnerable to cyberattacks due to the high volume of global online traffic. Existing antivirus and endpoint security tools were no longer sufficient to protect against sophisticated threats. The company needed to address these vulnerabilities to maintain the trust of its candidates and employers, especially given the high-profile nature of its operations and the sensitive nature of the data it handled.
Download PDF
Leading Eurasian Raw Materials, Building Materials and Ceramic Tile Producer Relies on Advanced Cloud-based IT Security to Protect Against Ransomware - CrowdStrike Industrial IoT Case Study
Leading Eurasian Raw Materials, Building Materials and Ceramic Tile Producer Relies on Advanced Cloud-based IT Security to Protect Against Ransomware
Lasselsberger Group faced significant challenges in IT security, particularly in protecting against modern ransomware attacks. The company was transitioning from a no-cloud strategy to a cloud-first approach, which necessitated a robust cloud security solution. Their existing signature-based antivirus product was outdated, leading to blind spots and a high number of false positives. The administrative burden of managing the old security solution was also considerable, requiring at least one day per week. Lasselsberger needed a modern security solution that could provide comprehensive protection and reduce administrative efforts.
Download PDF
CrowdStrike Helps the State of Arizona Stay Ahead of Today's Threats and Stop Breaches Using AWS - CrowdStrike Industrial IoT Case Study
CrowdStrike Helps the State of Arizona Stay Ahead of Today's Threats and Stop Breaches Using AWS
During the COVID-19 pandemic, the State of Arizona faced a significant challenge in securing remote work capabilities for thousands of state employees. The Cyber Command team, responsible for protecting state devices, needed to quickly implement a robust cybersecurity solution to manage threats against remote endpoints. The existing protection was set to expire, and there was a pressing need to transition to a new system without cost overruns. Additionally, the team required a solution that could provide near-real-time responses to cyber threats and support a small security operations team managing security for thousands of employees. The team also needed to address vulnerabilities related to recent supply chain security events and ensure the security of devices connected to public internet providers.
Download PDF
Mercury Financial Builds a Security Ecosystem Around CrowdStrike - CrowdStrike Industrial IoT Case Study
Mercury Financial Builds a Security Ecosystem Around CrowdStrike
Mercury Financial, a Texas-based credit card and consumer lending company, faced significant challenges in protecting the financial information of its one million customers. The company needed to mitigate threats to its business and brand reputation while consolidating disparate security tools into a single platform. As a cloud-native environment, Mercury Financial required complete protection of its infrastructure and customer data. The company had partnered with several legacy security vendors over the years, but the performance was lacking. As Mercury Financial expanded into new markets and added new customers, it needed a modern solution that could support the scalability of a cloud-native environment and seamlessly protect cloud resources such as dynamic container environments. Additionally, Mercury Financial wanted to consolidate its security stack with a single platform to protect endpoints, cloud, and workloads.
Download PDF
CoreWeave Enhances Cloud Security with CrowdStrike for High-Performance Computing - CrowdStrike Industrial IoT Case Study
CoreWeave Enhances Cloud Security with CrowdStrike for High-Performance Computing
CoreWeave, a specialized cloud provider, faced challenges in securing its high-performance cloud infrastructure as it expanded its client base. The company needed an end-to-end security platform to protect both cloud workloads and endpoints, as their previous in-house solution resulted in too many false positives. Additionally, they required robust security measures that would not impact compute performance, especially as they offered online signups and needed to scale their cloud security infrastructure.
Download PDF
University of Westminster Enhances Cybersecurity with CrowdStrike Falcon Complete MDR - CrowdStrike Industrial IoT Case Study
University of Westminster Enhances Cybersecurity with CrowdStrike Falcon Complete MDR
The University of Westminster faced significant cybersecurity challenges, including a high risk of ransomware attacks, lack of 24/7 threat detection and response, and a reactive security posture due to capacity constraints. The university's legacy antivirus software was insufficient to handle increasingly sophisticated cyber threats, leading to a high risk of attacks and potential reputational harm. The university's IT and security teams typically worked 9 a.m.-5 p.m. on weekdays, leaving a gap in security coverage after hours when most ransomware is deployed. Additionally, the expansion of IT facilities to support remote employees and students during the COVID-19 pandemic, combined with decreasing capacity and increasing workloads, resulted in a reactive security posture. The university also faced major security visibility gaps and blindspots, as its legacy security solutions couldn't provide unified visibility across a variety of operating systems. Implementing an in-house security operations center (SOC) was cost-prohibitive, and the additional staffing burden of a 24/7 security operation was not feasible.
Download PDF
Vijilan Overcomes Scaling Challenges with CrowdStrike Falcon LogScale for Enhanced Cybersecurity - CrowdStrike Industrial IoT Case Study
Vijilan Overcomes Scaling Challenges with CrowdStrike Falcon LogScale for Enhanced Cybersecurity
Vijilan Security faced significant challenges with their previous log management platform, which was unable to scale effectively with the growing data demands of their clients' networks. The platform's performance issues hindered Vijilan's ability to detect and respond to emerging threats in real time, leading to increased costs and complexity as they were forced to add infrastructure, storage, and memory. This situation was critical, as it resulted in Vijilan having to turn down large-scale clients due to their inability to handle the influx of log data efficiently.
Download PDF
How SpareBank 1 Saves Millions of Dollars with CrowdStrike Falcon LogScale - CrowdStrike Industrial IoT Case Study
How SpareBank 1 Saves Millions of Dollars with CrowdStrike Falcon LogScale
SpareBank 1 faced significant challenges with their existing log management platform, which was both expensive and unable to scale to meet the growing demands of their business. As the volume of log data increased, the costs associated with storing this data using their legacy solution became unsustainable. The company was unwilling to compromise by not logging certain data, as logs are crucial for powering security, DevOps, and other business areas. The need for a modern, cost-effective alternative became apparent, especially since SpareBank 1 required an on-premises solution to maintain data control.
Download PDF
Search for Next-Gen Log Management Solution Ends with CrowdStrike Falcon LogScale - CrowdStrike Industrial IoT Case Study
Search for Next-Gen Log Management Solution Ends with CrowdStrike Falcon LogScale
Great American Insurance Group faced challenges with their legacy on-premises log management solution, which required excessive maintenance and was costly to collect and retain necessary logs. The company sought a next-generation, cloud-based log management solution to enhance speed-to-insight and broaden data access. The existing solution was not scalable and distracted from core business objectives, such as compliance, threat hunting, and secure code production. The company needed a solution that could ingest all logs and perform quick searches, as the previous system was not meeting these needs.
Download PDF
Netlify Achieves Real-Time Observability at Scale with CrowdStrike Falcon LogScale - CrowdStrike Industrial IoT Case Study
Netlify Achieves Real-Time Observability at Scale with CrowdStrike Falcon LogScale
Netlify faced a significant challenge as its popularity surged, leading to an increased volume of log data that its existing log management system could not handle efficiently. The complexity and time consumption of maintaining a patchwork of log management systems became a burden, and the sales and support teams were not receiving the log data they needed promptly. The company's principal engineer, Ryan Neal, realized that the old system was no longer sufficient as it struggled to return inquiries in a timely manner. The need for a more user-friendly logging solution was evident, as the previous system required developers to build custom queries for sales and support teams, slowing down operations.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that AGP may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from AGP.
Submit

Thank you for your message!
We will contact you soon.