地区
- Europe
产品
- nGeniusONE Service Assurance platform
- InfiniStreamNG appliances
- nGenius 5000 series packet flow switch technology
技术栈
- UC smart analytics
- ASI-generated smart data
- Self-encryption support
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Digital Expertise
- Productivity Improvements
技术
- 网络与连接 - 网络管理和分析软件
适用行业
- 国家安全与国防
适用功能
- 离散制造
- 物流运输
服务
- 系统集成
- 测试与认证
关于客户
负责保卫这个欧洲国家的国防机构已将非军事网络和应用程序元素的运营委托给政府所有的 IT 提供商。无论是部署在地面、空中还是海上防御任务中,当今的军事应用都必须依靠许多商业网络、应用程序和统一通信 (UC) 技术才能充分运行。IT 提供商代表该国国防机构提供必要的主题专业知识来支持这些通用技术平台。该国的军事机构和 IT 提供商都从这种业务伙伴关系中受益。国防机构可以通过将非军事技术平台的劳动密集型监控转移给 IT 提供商,更好地专注于核心军事任务。军方受益于 IT 提供商招募和留住业界认可的网络、应用程序、UC 和网络安全技术人员的能力,从而提高工作效率并有机会减少政府开支。IT 提供商可以应用从这个军事客户那里学到的经验教训,使在全球政府管辖范围内运营的其他公司交付团队受益。
挑战
欧洲某国的国防机构面临着军事用途的网络拓扑和速度要求不断扩大的挑战。他们还需要增加数据存储以用于取证活动,并增加数据加密以增强政府安全要求。IT 提供商必须遵守有关用于支持敏感军事业务的监控方法的政策。这些准则适用于事后故障排除,这使 IT 提供商的故障排除成为一种依赖于网络数据包捕获进行离线取证分析的被动方法。军方还优先使用额外的保护措施,包括在通信环境中强制数据加密。这些挑战使得获得管理这些网络性能所需的可见性变得更加复杂。
解决方案
IT 提供商通过在其数据中心环境中添加下一代 InfiniStreamNG (ISNG) 和 nGenius 数据包流交换设备技术来满足客户新的网络和安全相关要求。ISNG 设备提供扩展的存储和加密支持,以满足军方的要求。nGenius PFS 设备支持客户对 40 GbE 和 100 GbE 网络速度的需求,同时还使 IT 提供商能够聚合、复制、分发和管理从网络到监控工具的流量,以提高下游设备的性能。现在,整个军事网络的应用程序和服务性能得到了更好的保证,IT 提供商的专业服务性能分析技术人员充当“消防员”,在问题发生时使用 nGeniusONE 进行故障排除,方式如下:当在服务交付环境中观察到性能问题时,服务性能分析团队可以根据需要在关键位置使用 nGeniusONE 进行取证活动,以排除故障并确定根本原因。通过生成 nGeniusONE 服务仪表板视图,团队可以快速、根据上下文深入了解精确的数据包级详细信息和分析,而无需耗时的数据包捕获和离线分析。
运营影响
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.

Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Enhancing Security and Compliance in Remitly's Global Money Transfer Service with Fastly
Remitly, an online remittance service, was faced with the challenge of securing its proprietary global transfer network. The company needed a security solution that could meet PCI requirements and protect customers' sensitive transactions through its mobile application. The solution had to be capable of defending against new and emerging attack types without impacting performance. Remitly also had to deal with irregular traffic patterns, such as a sudden spike in account transfers from a small network segment on the Pacific coastline of South America. The company needed to determine in real time whether such traffic indicated an attack or valid requests. A traditional web application firewall (WAF) would not be able to distinguish this traffic, potentially leading to customer frustration if the IP was blacklisted.

Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.

Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.

Case Study
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.

Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.