Forcepoint
概述
总部
美国
|
成立年份
1994
|
公司类型
私营公司
|
收入
$100m-1b
|
员工人数
1,001 - 10,000
|
网站
|
推特句柄
|
公司介绍
Forcepoint simplifies security and helps organizations secure data everywhere to prevent the theft or loss of sensitive data and intellectual property no matter where it resides.
Forcepoint creates safe, trusted environments for customers and employees in more than 150 countries.
Supplier missing?
Start adding your own!
Register with your work email and create a new supplier profile for your business.
实例探究.
Case Study
Online Gaming Company Betsson Makes a Sure Bet on Data Security with Forcepoint
Betsson, an online gaming company, was facing a significant challenge in protecting its customer data. The company operates in an industry that generates massive international flows of customer and financial data 24 hours a day. Any public leaks of this information would be disastrous for the company's reputation. Furthermore, Betsson's competitors target the same group of customers, making customer email addresses highly valued data. However, the company lacked visibility into data movements surrounding that database. The main threat did not arise from hackers or financial cybercriminals but from the company’s own staff. Some employees were targeted by competitors but others operated alone.
Case Study
Swire Oilfield Services Case Study
Swire Oilfield Services, a global supplier of offshore containers to the energy industry, faced the challenge of protecting its business operations in some of the world's most remote locations. The company's global presence, coupled with recent acquisitions, resulted in a complex security portfolio with five different security solutions in place for email. This setup became increasingly problematic as the number of malware and phishing attempts targeting the company's cloud app services reached an all-time high. The company needed a solution to standardize its security across all locations, despite varying connection issues.
Case Study
Reliance Capital Case Study
Reliance Capital, a rapidly growing financial services company in India, was facing a significant challenge in protecting the transfer of confidential customer data. With five operating businesses and a heavy flow of information, the organization realized it needed control over data moving across systems, geographies, and group companies. The potential for loss was high and it was critical that its data was secured from accidental or intentional leaks. The use of essential business tools, such as Web and email, presented a challenge to its current systems and the organization was increasingly concerned about the repercussions — both financially and in reputation — if sensitive data was leaked.
Case Study
Colacem Achieves a More Sophisticated Web Security Strategy with Forcepoint
Colacem, a leading cement producer, was facing challenges with its existing open-source web security. The system only allowed antivirus detection and limited profiling, making maintenance expensive without ensuring protection against sophisticated, multistage attacks. The growth of more advanced threats increased the urgency to transition away from a strictly role-based internet security solution. The company needed a more powerful web browsing security solution, especially with the increase in users working remotely.
Case Study
Ross Stores Case Study
Ross Stores, a large retail enterprise, was facing challenges with their existing web security solutions. The Palo Alto Networks & Bluecoat solutions they evaluated lacked in reporting and research capabilities. This led them to look for a more effective solution that could provide advanced threat protection, enhanced reporting functionality, and better integration with their existing systems.
Case Study
Case Study of International Business Machines Corporation
International Business Machines Corporation was facing several challenges with their previous security product. The efficacy of the solution was low, and the company found it difficult to manage. Additionally, the solution lacked scalability, which was a significant issue as IBM needed advanced capabilities to protect its growing mobile and global workforce. The company evaluated several vendors, including Symantec/Blue Coat and McAfee Web Gateway, before choosing Forcepoint Secure Web Gateway.
Case Study
Forcepoint Helps This Turkish Airline Move to the Cloud as Safely as it Flies in the Clouds
The airline's employees often work remotely using company laptops, exposing them to potential security threats from unsecured networks. The company also faced the challenge of complying with strict European GDPR regulations and Turkish Personal Data Protection Authority requirements for data security. The company needed a security solution that could protect its users and data, regardless of their location. The solution also needed to be scalable and capable of integrating other solutions to further improve the level of protection.
Case Study
Lake Michigan Credit Union Case Study
Lake Michigan Credit Union (LMCU) is a large financial institution with over 300,000 members and $3.7 billion in assets. The company provides a wide range of financial services and has a high membership renewal rate. However, LMCU faces the daily challenge of keeping its members' valuable personal information secure. Financial institutions are a top target for threat actors worldwide, and any incident of data loss or theft could cause irreparable harm to customers and the business. LMCU's previous security solution did not offer unified visibility amongst the products and was lacking in actionable guidance for the IT department. As a result, time management was becoming more inconvenient for active users and administrators. They were spending too many man hours “minding” the system. Time spent repairing and monitoring the network was excessive and critical.
Case Study
RWTH Aachen University Case Study
RWTH Aachen University, one of Europe’s most distinguished technological institutions, was facing a significant challenge in terms of network security. Like other research-oriented institutions, universities are an attractive target for cyberattacks, and, as a result, their criteria and demands for security are stringent. The Center for Computing and Communication of RWTH Aachen University had several important criteria for network security, including high performance and availability, heterogeneous infrastructure and system environments, seamless connections to several research networks, and the ability to support variable user roles, permissions, and access rights. The university needed a security solution that could manage a data load of more than 20 Gbps, while offering protection from an increasing number of targeted attacks at end-user devices.
Case Study
Khaitan & Co Secures Client Data with Forcepoint DLP
Khaitan & Co, one of India’s oldest and largest full-service law firms, is the appointed custodian of all its client data in digital format. This includes sensitive documents such as contracts, bonds, and stocks. The firm's survival depends on its ability to protect this client data from falling into unauthorized hands. However, with no security solution in place, the firm lacked visibility and control over its critical data. The data flow within the organization, as well as email accounts from external third parties, couldn’t be effectively monitored and guarded. Unchecked and unauthorized USB/flash devices, printers, and cloud applications also presented a major security risk. The firm needed a solution that could help identify potential sources and points of data loss, and secure them effectively without interrupting normal business operations.
Case Study
Matmut Enhances Network Security with Forcepoint
Matmut, a major player in the French insurance market, hosts its 600 servers and their compliant copies in two data centers which are accessible by the company’s 6,000 employees. The daily objective is to maintain and exceed Matmut’s standard for high quality of service. In order to do so, the Matmut IT team has built its security portfolio around a strategy based on load balancing. Therefore, it’s crucial for its two datacenter sites to communicate efficiently with each other so that critical data can be accessed at all times.
Case Study
Cellcom Israel Ltd. Case Study
Cellcom Israel Ltd., the leading cellular provider in Israel, faced a significant challenge when a serious data leak occurred. The company realized that their sensitive data needed to be better identified, monitored, and protected from potential misuse. As a result of this high-profile security breach, Cellcom assessed its data security situation and decided to look for a data loss prevention solution that would ensure valuable company data was identified and kept inside the organization.
Case Study
Swiss Life Case Study
In 2009, Swiss Life France recognized a key challenge which had been impacting the company as well as several of its peers. Zero-day malware and advanced persistent threats, such as ransomware and rootkits, were infiltrating its network undetected. As a result, Swiss Life recognized that it needed to optimize and better secure the infiltration and exfiltration of its data. In addition, Swiss Life’s sales representatives working remotely (approximately 1,400 in total) are equipped with laptops and Windows tablets. These devices are frequently connected to unsecured external networks and must be equipped with the same level of protection as if connected to the corporate network.
Case Study
A New Security Strategy with Forcepoint Helps this Customer Service Organization Secure Personal Information Across 22 Countries, Despite an Evolving Threat Landscape
The company, a managed administration services group based in Italy, provides a superior experience for its customers’ customers. As its services are rooted in data exchange, the company’s success means that the amount of information it must protect is growing exponentially. A breach would grant bad actors access to data from not just one company, but hundreds. Prior to its relationship with Forcepoint, the company’s open-source security solutions were difficult and time-consuming to manage and maintain. After the enterprise fell victim to a ransomware attack, it knew the time had come to pursue a new security strategy to better safeguard its data against cyber threats, while opening doors to advancing technologies, greater automation, and continual evolution.
Case Study
Nous Infosystems Case Study
Nous Infosystems, a Global 500 company in the banking industry, was facing several business challenges that led them to evaluate and ultimately select Forcepoint DLP. They had disparate DLP policies that left holes in their security posture, leading to data exfiltration that left their organization exposed. Additionally, they were struggling with their ability to control and manage data that’s subject to regulation.
Case Study
Forcepoint Protects Financial Institution from Sophisticated Ransomware
The financial institution, being part of a global financial group and one of the world's largest banks, had to meet strict requirements for data security compliance. It was under intense scrutiny from customers, regulators, and shareholders. The institution needed a robust solution to protect its network from advanced, multi-stage threats. During the Proof of Concept (PoC), Forcepoint detected several of these threats in real time. The successful PoC was one of the deciding factors for the bank in choosing Forcepoint.
Case Study
Global Food Processing Organization Increases Online Connectivity Speeds by Up to 12 Times to Empower Rapid Innovation
The global leader in animal nutrition and aquafeed was facing challenges with slow internet speeds in some of its locations, which was impacting productivity and research efforts. The company was also growing through the acquisition of several smaller companies, which complicated security matters as new systems were brought into their network that may not always have strong cybersecurity in place. The company was a target for C-level spoofing and phishing attempts targeting revenue exfiltration. The company needed to reduce the potential for risky user web browsing or the opening of bogus or malware-riddled emails.
Case Study
IGATE Implements Forcepoint Solutions for Enhanced Data Security
IGATE, a global leader in providing integrated technology and operations-based solutions, faced a significant data security challenge. The company needed to extend its corporate network to a sizable list of globally distributed subsidiary companies, ensuring one uniform policy. The challenge was particularly acute when a user worked out of a remote office or traveled to a remote location. IGATE wanted the same policies to be consistent throughout the company’s entire extended corporate network. The company had experienced an incident involving data leakage when an employee logged into the corporate network from a remote computer and sent unwanted emails to a customer. IGATE needed to take a position where the company could protect corporate data and protect the user while, at the same time, ensuring that the proper policies were in place.
Case Study
Freedom of Information Act (FOIA)
The Freedom of Information Act (FOIA) has been a gateway for Americans to access data and knowledge maintained by government agencies since the 1960s. However, the system has become a victim of its own success, with over 550,000 requests annually, overwhelming the fifteen U.S. departments and agencies that receive 90 percent of all such requests. The departments were struggling with the timeliness of their responses, effectiveness of their communications and facilitation of information flow to citizens. One department, which received more than 22,000 FOIA requests in fiscal year 2012, was spending an average of 33 days to respond to a request, with 22 of those days devoted to locating the required data. The department was seeking a solution to enhance its search capabilities and reduce response time.
Case Study
Chelsea and Westminster Hospital Case Study
Chelsea and Westminster Hospital (C&W) in southwest London is a 550-bed facility with a range of specialisms from pediatrics to dementia, serving 120,000 outpatients per year and a further 120,000 through the Accident and Emergency Department. Over 60 staff members help Acting Director of IMT, Bill Gordon, to manage the IT infrastructure and all matters relating to patient records, clinical systems, networks, and desktop hardware. Data security has always been a priority, the hospital is currently the highest rated in the UK for IG (Information Governance), which covers the implementation of data safety and management procedures. C&W was already a Forcepoint customer for web and email security as part of a comprehensive infrastructure that includes firewalls, encryption, and intrusion and hacking detection systems. An annual penetration test is run by NCC, a CESG-approved third party. Gordon says that C&W generally performs very well, encouraging confidence in the technology to steer behavior in the right direction. Nevertheless, the impetus for change was a security breach – the loss of a USB key – which had to be reported to the ICO (Information Commissioner’s Office). The incident had board-level visibility within the hospital that required an immediate response.
Case Study
Chhattisgarh State Power Companies (CSPC) Case Study
Chhattisgarh State Power Companies (CSPC) faced several challenges with their previous web security solution. The solution would bypass the URL filter, allowing encrypted traffic to run alongside non-encrypted traffic. This meant that if someone accessed an unauthorized site, it would open unchecked, as the platform was unable to filter out undesirable traffic. Additionally, the URL filtering solution didn’t have a proxy. A separate proxy was installed which was integrated with the URL filter. However, since both were separate solutions, there were dependency issues. If one of the solutions had to be upgraded, the other would stop working. This also led to support and management issues. Furthermore, the category database was weak and not very comprehensive, with multiple categories missing. The process of updating the database with a new category was quite complicated.
Case Study
AUSL Modena Public Healthcare
AUSL Modena, a public healthcare organization in Italy, was facing challenges in detecting and preventing advanced threats that reach their target by web and email. The spread of viruses and ransomware like cryptolocker was a significant concern. The organization needed to change its web and email security strategy to better manage the appropriate channels and focus more on end-users and less on terminals. AUSL Modena also needed to integrate with the nearby Modena University Hospital and its 3,000 workstations.
Case Study
Increasing Security and Reducing Costs through the Single Information Environment (SIE) and the Next Generation Desktop (NGD)
The Department of Defence in Australia was faced with the challenge of modernising its heavily distributed ICT networks, which were providing declining IT service and flexibility. This required a full-scale consolidation across the department's data centres, computer rooms, and desktops. The goal was to create a Single Information Environment (SIE) to improve and strengthen infrastructure and maintenance services, while reducing operational costs. The desktop portion of this project, referred to as the Next Generation Desktop (NGD), aimed to provide streamlined desktop and application access to approximately 100,000 users, with 15% of those users requiring simultaneous access to multiple networks.
Case Study
KPIT Case Study: Proactive Web Security
KPIT, a technology company focused on creating domain-intensive products and solutions, needed a web security solution that could manage the web and protect its network. Previously, the company used squid-based proxy servers and manually updated policies. However, the effectiveness of these policies was largely dependent on the knowledge and skill-base of the security administrators. With the dynamic nature of web content, KPIT realized that reactive web filtering measures were insufficient. The company needed a solution that could offer real-time protection and automatically block web threats and malicious sites as they are identified.
Case Study
NCP Case Study: Forcepoint Email Security
NCP, the U.K.’s market leader in the provision of parking services, was struggling with managing increasing amounts of spam. Despite having an on-network email security solution in place, the company was still dealing with spam, false positives, and system latency, which resulted in legitimate emails being delayed. With only three IT staff supporting NCP’s 550 IT users, the management of the situation was becoming a burden. The limited resources prompted NCP to consider switching to a hosted service.
Case Study
Raytheon Company Case Study
Raytheon Company, a global 500 company in the Aerospace & Defense industry, was facing several challenges. They had a lack of or inefficient one-to-many device provisioning and were exposed to advanced network threats. They had evaluated Cisco before choosing Forcepoint. After using Forcepoint Next Generation Firewall, they had to address new challenges such as new firewall deployment, maintaining policy consistency across firewalls, deploying software updates, and having a unified view of all firewalls.
Case Study
Emerson Process Management Finds and Controls Regulated Data with Forcepoint
Emerson Process Management faced several challenges. The company's policies were too complicated and required too much headcount to maintain them. This led to data exfiltration that left the organization exposed. Furthermore, the company needed to control and manage data that was subject to regulation. The company was in need of a solution that could help them easily find and control regulated data and sensitive IP.
Case Study
Crime Analysis Center
The New York Crime Analysis Centers (CACs) faced the challenge of deploying a robust, scalable, and affordable platform to provide each CAC with single-query access to their extensive volume of crime and intelligence data and the ability to query and share statewide. Each CAC represents unique architectures, multiple law enforcement agencies, multiple users with multiple sources, and varying law enforcement and related data. Each CAC varies greatly in configuration, location and data source structure. With new sources of data constantly being identified and updated in daily operations and investigations, CACs have to support local control of the data dissemination without the need to persistently store data in a warehoused environment. DCJS required a cost-effective system that could meet the needs of the CACs while delivering high performance and scalable results.
Case Study
Air Force Central Command (AFCENT) Case Study
The Air Force Central Command (AFCENT) was tasked with establishing a new combined air and space operations center (CAOC) to replace a temporary facility that had been in use for six years. The new CAOC needed to provide more robust systems to accommodate users and improve interoperability. It also had to make the best possible use of physical space and reduce power consumption. The transition from the old facility to the new one had to be seamless so as not to interrupt mission operations. The CAOC was controlling air operations in two live theaters at transition time. The project, from planning to implementation, was completed in less than two years. This desktop consolidation project presented other challenges for all parties because AFCENT’s mission requires 24x7 operations with 99.99% availability.
Case Study
Escorts Limited Manufacturing’s Valuable IP is Secured with Forcepoint DLP
Escorts Limited, a leading engineering conglomerate in India, generates a large volume of in-house IP in the form of blueprints and designs for engines, transmissions, and machines like tractors, cranes, backhoe loaders, compactors, and equipment used in railways. This IP required protection. The company also does business with leading manufacturers worldwide, creating even more IP that must be secured. A largely mobile global marketing and sales force required secure access to IP on and off the official network.
Case Study
Forcepoint DLP Implementation at Crediton Dairy
Crediton Dairy, a medium-sized enterprise in the industrial manufacturing sector, was facing challenges in controlling and managing data that were subject to regulation. The company needed a solution that could provide visibility into data movement within the business and automate policy enforcement based on user behavior. The solution also needed to minimize disruption to users and help the company get started with their data loss protection project faster than expected.
Case Study
Lake Michigan Credit Union Safeguards Member Data with Forcepoint
Lake Michigan Credit Union faced several challenges in ensuring the security of their member data. They needed to protect against external threats such as phishing and malware, which could compromise the trust of their members. Additionally, they needed to prevent internal vulnerabilities, such as employees sending member data via personal email, uploading to a personal or unsanctioned website, or copying to a USB drive. The credit union also wanted to minimize the time their staff spent managing security tools and addressing threats.
Case Study
Egyptian Bank Depends on Forcepoint to Assist in Bridging the Digital Divide
The bank has been a leader in the Egyptian economy by offering progressive digital banking services and increasing financial inclusion for some of the country’s most underserved segments. However, this also means that the bank must safeguard the personal and financial data of some 700,000 retail customers, many of whom are technology newbies. A breach could impact growth and operations while decimating customer trust. After encountering an increase in threats targeting its email communications, the bank turned to Forcepoint for a solution. The bank has seen an uptick in email-based avenues of attack, including executive-level targeted phishing attacks and zero-day attacks via emails sent to its nearly 6,000 employees.
Case Study
Compartamos Banco Safeguards Data in Order to Better Serve its Customers
Compartamos Banco, the largest microfinance bank in Latin America, faced the challenge of protecting a complex organization that includes 16,000 employees, more than 500 offices, and 2.5 million customers. The bank needed to comply with regulations including National Banking and Securities Commission (CNBV), Federal Law of Protection of Data in Possession of Individuals (LFDPPP), and international standards. The bank's objective was to eradicate financial exclusion by offering basic financial services to the low-income population, and to do so, it needed to ensure the security and protection of its data.
Case Study
AMAG deploys Next-Gen CASB
AMAG Pharmaceuticals, a company that develops and commercializes a therapeutic iron compound to treat iron deficiency anemia, decided to adopt G Suite as the all cloud backbone for the company. This decision was made to enhance productivity as G Suite offers a high performance productivity suite that is flexible and easy-to-use. However, combining BYOD and cloud meant that AMAG lost visibility and control of its data, risking security and compliance. Existing security solutions were not readily applicable to cloud apps and raised privacy concerns, since employees didn’t want IT monitoring their personal cloud apps or mobile devices.
Case Study
Global Ad Agency Secures Office 365
The ad agency was looking to migrate from an on-premise solution to Office 365 to cut costs and increase employee productivity. However, some of the agency’s large clients, including Microsoft and Walmart, had concerns about the security of their creative assets. The agency needed to add another layer of security to their public cloud apps. They required solutions for single sign-on, mobile security, and access control. After evaluating several vendors, the agency determined that Bitglass was the only solution that met all their requirements.
Case Study
Hospital System Achieves HIPAA Compliance with Bitglass
The hospital system, located in the Southeastern United States, was in need of a solution for HIPAA compliance on mobile devices. The Department of Health and Human Services reports that 70% of data breaches in healthcare are the result of lost or stolen devices. The hospital's incumbent mobile security solution, AT&T Toggle, was made obsolete after Google acquired the source company Divide. The hospital's compliance team wanted a replacement that was secure, easy to use, and transparent to users. They were particularly wary of solutions that required software on BYOD. A second criterion for the solution was the ability to support migration to Office 365, which was looming in the near term.
Case Study
Wall Street Firm Discovers Zero-day Threat
The mid-sized technology company, which provides services to high-value targets on Wall Street, was facing a significant cybersecurity threat. Despite having a high-end 'Next-Gen-Firewall' installed, the firm discovered that ten internal IPs were contacting Malware Command and Control destinations outside the firewall. Some of the internal IPs had multiple malware infections. The firm was an ideal back door for hackers who could inject malware into the service provider, gain access credentials to their customers, and exfiltrate high-value data without being detected. The average breach lasts almost eight months, posing a significant risk to the firm and its clients.
Case Study
Honda MPE Enhances Data Security with Forcepoint Solutions
Honda Motorcycle and Power Equipment (MPE), a high-profile Australian national company, faced a significant challenge in preventing sensitive data leakages and protecting its user’s access to the Internet. As part of the global Honda brand, Honda MPE had to meet Honda’s global network security standards. The company had experienced several data leakage incidents and needed to control and protect the Internet usage by its staff to ensure that sensitive data was not leaked outside the organization. The IT department at Honda MPE, led by Senior Manager Craig Bassett, was tasked with finding a balance between flexibility and security. They needed a solution that would not restrict their staff from performing their roles but would protect them and Honda from any malicious intent.
Case Study
Smurfit Kappa Enhances Security and Productivity with Forcepoint
Smurfit Kappa, a leading manufacturer of corrugated and solid board packaging, faced a significant challenge in managing its IT infrastructure. The company's IT division was responsible for managing all servers and domains in the Active Directory of the Smurfit Kappa Group, which ran in two data centers located in Amsterdam and Nieuwegein. The division was also tasked with information security management, dealing with incidents of spam, malware, and data theft or loss. The team was dealing with an average of 350 security incidents per week, a daunting task. Additionally, as a global company, Smurfit Kappa had to comply with Sarbanes-Oxley laws and regulations (SOX), which imposed strict requirements for data storage. The existing solution was high maintenance and required continuous monitoring. The company needed a solution that could delegate responsibilities, reduce tasks for IT operations, and manage 56 email domains and 532 DNS servers across Europe, Russia, South America, and Mexico.
Case Study
Growth Requires AudioNova to Focus on a Comprehensive Security Solution
AudioNova, a large provider of hearing aids in Europe, was facing challenges due to its rapid growth and expansion to over 1,200 stores throughout Europe. The company had multiple solutions for web and email security on-premises in different regions and locations. This made it challenging for the small IT department to manage security efficiently from the headquarters in Rotterdam. The disparate set of security products was not meeting the company's needs, and a more comprehensive solution was required.
Case Study
Arizona Financial Crimes Task Force
Transnational criminals launder billions of dollars in illegal proceeds every year. In the Southwest Border affected areas, over half a million humans are smuggled and prescription drugs, illegal drugs and intellectual property are stolen. Law enforcement agencies have been challenged to process and analyze an overwhelming amount of data that pertains to these operations. Parsing and finding the incriminating data in a vast sea of constantly expanding data sources became extremely difficult, as the sheer volume of transaction data far exceeded the capability and volume capacity of typical database software. Due to the limitations and restrictions of the technology, transaction volume became the enemy, and it became harder and harder to detect money laundering patterns across the financial industry. A simple query involving multiple names, addresses or telephone numbers, for example, took hours or days to complete. Enforcement agencies were forced to invest a great deal of time searching through databases, sometimes containing millions of records each, for the suspicious activity they knew lurked among the data. In this timeframe, it was difficult to conceptualize money laundering patterns while remaining a few steps behind the criminals themselves.
Case Study
Pacific Air Forces (PACAF) and 353d CTS
The Pacific Air Forces (PACAF) and the 353d Combat Training Squadron (353d CTS) operate and manage the premiere joint combat training venue – RED FLAG-Alaska (RF-A). RF-A exercises are held at the Joint Pacific Alaska Range Complex (JPARC) at Eielson Air Force Base and Joint Base Elmendorf-Richardson. JPARC is the largest instrumented air, ground, and electronic combat training range in the world. With multiple joint and coalition forces exercises per year, RF-A provides relevant and real-world air and ground combat scenarios with realistic threats and targets. As many as 90 aircraft and 2,000 personnel participate in the RF-A tactical exercises that cover 66,000 square miles of training airspace and 1.6 million acres of often-rugged land in the joint Air Force/Army-managed JPARC. The JPARC encompasses more than $200 million worth of equipment and instrumentation to support warfighter training exercises. In addition to size and cost, PACAF has the added responsibility to ensure that sensitive data is not accessed or leaked to unauthorized parties or systems – especially critical when training multinational coalition forces. To provide the most realistic training for the warfighter, which includes multiple nations and clearance levels, a cross domain solution was needed. To best support the required live, virtual, and constructive (LVC) aspects of the joint training, this cross domain solution had to be near-real time, support a flexible protocol, and be able to obtain an authority to connect (ATC) at the Secret and Below Interoperability (SABI) level.
Case Study
Istituto Nazionale dei Tumori Case Study
Fondazione IRCCS Istituto Nazionale dei Tumori (INT) was spending a large majority of its time completing security-related tasks manually. It also required flexible protection against all risks and malicious software. These are classic security issues for both private and public companies, and these issues will always need to be approached by management in the most innovative way. For INT, threat protection is an essential aspect of that challenge. Bellazzi mentioned “browsing on the move” as his security platform requirement. At its core, this is protecting a mobile workforce on all endpoints. Mobile employees are going to leave the on-premises network at some point. Knowing that, it is crucial for any company to keep its same protocols unified across all endpoints, on-premises or remote.
Case Study
Italian Healthcare Provider Protects Patient Data While Allowing Lifesaving Information to Circulate Freely
The regional healthcare provider serves millions of patients across seven social-health districts and four hospitals in Italy. As it continues to modernize its IT environment by providing better access to information and incorporating more connected medical devices, its growing cyberattack surface creates new potential entry points for viruses and ransomware—a challenge further complicated by the system’s size and complexity. The organization had already suffered the impact of an environment that wasn’t secure enough when it fell victim to a cryptolocker attack. Its existing proxy server solution for web browsing and email spam-blocking left it vulnerable to system-crippling attacks.
Case Study
Danieli & C. Officine Meccaniche S.P.A. Case Study
One of Danieli’s key challenges was protecting its intellectual property, specifically its designs for machinery and industrial plants. Moreover, as a public company, Danieli was concerned with protecting its corporate image while providing protection against a quickly evolving and adapting threat landscape. Additionally, the company was looking for a solution that would easily extend the same level of security across all locations with the ability to manage everything from one centralized and unified console. The leadership team realized the need for a Data Loss Prevention (DLP) solution — a solution that would solve all of these issues. The importance of security in other internal company departments was not always at the forefront of people’s minds. Many people have the perception that security is not a priority until after a breach has occurred. The introduction of a DLP solution highlights the significance of handling data that could jeopardize the company if it were in the wrong hands.
Case Study
National Union of Socialist Mutual Health Insurance
The National Union of Socialist Mutual Health Insurance Funds (SocMut) in Belgium was facing challenges with its on-site email security. The previous solution was implemented locally and required extensive management attention. As users pressed for more flexibility, their demands were met by more and more ad-hoc solutions that stretched management time even further. The organization was increasingly limited by its on-site email security. The criteria for a new solution included cost, security, management, and the knowledge and expertise of the supplier.
Case Study
Law Enforcement: Providing a Highly Secure and Efficient System
The Law Enforcement agency's mission is to safeguard the United States from a variety of national security and criminal threats. This mission generates an extreme amount of data, of all different types and formats, that is used during investigations and as evidence in prosecuting court cases. This data must be securely captured, analyzed, managed, stored, and available to stakeholders when and where needed. The agency's overarching goal is to modernize its technology infrastructure in support of the mission. Part of this goal is to enhance information sharing both within the agency and with other agencies and organizations. One challenge inherent in the need to efficiently and securely share information is the sheer amount of data that needs to be shared – all with different formats, types, and sensitivities. All data collected, analyzed, and shared by this agency has the added challenge of becoming evidence in complex legal proceedings that can be governed by many different regulations.
Case Study
Vector Keeps Email Communications Moving Safely with Forcepoint
Vector SpA, an international freight forwarding agent, was facing challenges with its existing antispam software. The software was unable to effectively filter spam messages from the company’s high volume of email. This led to a significant amount of manual analysis required to identify false positives in the quarantined email messages. The company needed a solution that could effectively manage and secure their email communications without slowing down the IT team or the rest of the company’s more than 2,500 employees.
Case Study
U.S. Department Of Health and Human Services
The U.S. Department of Health and Human Services (HHS) needed a security solution that could effectively protect more than 150,000 users across multiple departments and locations. These users access billions of sensitive data files and interact with the American public through various online communication methods. The challenge was to maintain a high level of productivity while ensuring that the systems and data remain free of malware. The department also needed to balance data security with user access. Doctors and researchers within HHS handle very sensitive health information daily, making collaboration with other researchers worldwide risky without the right security. The department also had to meet the requirements of the Federal Information Security Management Act (FISMA) and implement continuous monitoring of computer systems for security.
Case Study
Leeds and York Partnership NHS Foundation Trust
In 2010, Leeds & York Partnership NHS Foundation Trust (LYPFT) embarked on a project to manage costs, which affected all facets of the organization. IT budgets were adjusted, leading to a change in web security and the implementation of Cisco IronPort. However, the IronPort solution introduced a number of operational challenges for LYPFT. The level of expertise needed to manage IronPort put a significant and unexpected strain on LYPFT’s IT resources. The IronPort solution also lacked the necessary reporting capabilities—which caused issues between the IT and Human Resources departments because of delays in generating information relating to employee website usage. Aside from reporting, LYPFT needed advanced threat protection from ransomware attacks, a prevalent type of malware that many UK businesses currently face. During that time, LYPFT experienced an uptick of attacks similar to the recent spate of attacks on US healthcare organizations, which successfully targeted a considerable number of LYPFT employees.
Case Study
Forcepoint's Secure Multilevel Access Solution for Intelligence Community
The Intelligence Community (IC) customer was facing several challenges including crowded desktops, facilities at capacity causing a strain on power, excessive cooling, limited floor space, network proliferation, decreasing annual budgets, and a need for cross domain collaboration. They embarked on an enterprise-wide initiative for a multilevel security solution to support both high-end tactical operations support and low-end administrative users. The complete solution called for a data guard with self-release and reliable (two-person) human review capabilities. The overarching goal was for a desktop solution that can become the enterprise standard for the IC, achieving a “Culture of Collaboration.”
Case Study
Chilean Bank Gets Proactive on Data Security After Cyberattacks Rock Latin America
The Chilean bank, which primarily caters to high net worth individuals and corporations, decided to get proactive about bolstering its cybersecurity and data loss prevention posture in the wake of 2018’s high-profile cyberattacks targeting Latin American banks. The bank was not affected by these attacks, but the incidents spurred the Chilean government to begin drafting legislation that will require Chile’s banks to comply with certain cybersecurity measures, including data loss prevention. The bank decided to get ahead of the curve to better protect clients and itself, instead of waiting for government regulations to take effect. The bank has been transitioning to the cloud to support remote bank employees and account managers who meet premier clients in their own environments. The bank needs its security solutions to both adhere to coming government data protection legislation and to safeguard the usage of cloud applications and service providers.
Case Study
Global Logistics Provider Enhances Network Security and Efficiency with Forcepoint
A global logistics provider was seeking an alternative to their multi-protocol label switching (MPLS) service. The customer wanted to boost the productivity of their workforce and lower costs by migrating applications to the cloud; however, doing so would create a large amount of additional traffic that would have to be backhauled to the data centers. This would inevitably cause latency and a subpar user experience. Adding additional MPLS lines would take months to implement and would be a costly solution, especially when considering the vast number of locations. At the same time, the customer’s aging network security devices were unable to provide substantial visibility into their highly distributed network. With warehouses and data centers spanning the globe—most of them without an on-site technical team—any new network security deployments would have to support centralized management, provide detailed insights into what was happening on their networks, and offer robust reporting capabilities. As one of the world’s largest logistics companies, the customer required the very best in security efficacy to maintain business continuity and to continue honoring commitments they had made to their clients.
Case Study
Pegasus Airlines Enhances Productivity and Data Protection with Forcepoint Cloud Security
Pegasus Airlines, a leading low-cost airline in Turkey, faced challenges in maintaining regulatory compliance due to the vast amount of customer data it collects and stores. The company also supports workforce productivity by allowing their employees to work from anywhere using personal devices to access email and browse the web. This created a challenge in upholding the mandates of the General Data Protection Regulation (GDPR), which has strict penalties for companies that cannot quickly identify, report, and respond to data loss incidents.
Case Study
Northern California Bank Case Study
This multi-billion dollar bank needed a vendor that could help protect corporate assets and customer information against internal threats in a unique technology environment. At the recommendation of an external audit, the bank sought a unified solution with embedded data loss prevention (DLP) within the web and email gateways to protect against risky employee behavior.
Case Study
BSE Secures Sensitive Data with Forcepoint DLP
BSE, Asia’s first stock exchange, houses highly sensitive, critical corporate and trading data belonging to over 5,500 corporate houses listed on the exchange. It is one of India’s most critical infrastructures, and it is their responsibility to ensure the security and integrity of this sensitive data. They needed to maintain stringent, around-the-clock monitoring to secure the data from any possible internal or external threats. In an attempt to strengthen its security posture, BSE underwent a complete revamp of all its cybersecurity systems, opting to replace its existing security products with new, cutting-edge technology solutions, including for DLP, which is an integral part of BSE’s overall security strategy. BSE wanted a comprehensive solution that covered endpoint, network and e-mail.
Case Study
Aosta Valley Region Balances Security and Productivity with Forcepoint Web Security
The Aosta Valley region, a Special Statute Region in Italy with a population of just under 130,000 people, faced a common problem for public and private companies, especially one as large as itself - securing web navigation. The region needed to define policies that supported a high level of security while preserving employee productivity. The spread of social networks, the e-commerce boom, and the concurrent availability of internet access on all workstations created a need for a cyber intervention. As a result, the region viewed web protection to be a priority, in order to manage and regulate web access based on content and source. The region decided to integrate its existing firewall with a web security component.
Case Study
Global Packaging Company Increases Safety and Productivity on its Way to the Cloud
The company was dealing with underperforming and inflexible web and email security solutions, which were generating an average of 350 incidents each week, including false positives, that required staff time to investigate. This created a significant management burden for the company’s IT Infrastructure division. The company needed a new solution that could reduce the number of necessary investigations through better efficacy, thereby generating fewer false positives. In addition, centralized management and reporting capabilities would make investigations more efficient and reduce staffing needs. The company also needed a solution that could support their future challenges of moving to the cloud.
Case Study
Huisman Case Study
Huisman is a globally operating company with extensive experience in the engineering and manufacturing of heavy construction equipment. The company develops and manufactures cranes, pipelay systems, drilling equipment, winches, vessel designs and special products. In addition to oil and gas, Huisman focuses on renewables, leisure and civil industries. In view of its international presence, safe and secure communication between offices is key to Huisman’s success. That is why the company selected Forcepoint’s web and email security solutions to protect internal systems against malware and data leaks. Huisman is a high-tech company with a lot of intellectual property in the field of engineering. Therefore, it needs a high-quality security platform that offers ultimate protection, ease-of-use and ease-of-management.
Case Study
Enterprise Oil & Gas Company Secures Critical Data with Forcepoint Insider Threat
The company stores a variety of valuable data: internal patents, intellectual property (IP), merger and acquisition data, machine schematics, and geological data like potential drill sites. Many of those with access to this sensitive data are temporary contractors, employed for only a brief period of time. Understanding the higher risk that accompanies shorter-term employees, company leaders brought in third-party analysts to do an assessment of insider threat risk. Analysts found that data was indeed leaving the company, and that nearly half of the data loss incidents were directly related to the actions of negligent or malicious insiders. Upon hearing the results, company leaders authorized the creation of an internal insider threat task force.
Case Study
UCI Protects Customer Personal and Financial Data with Forcepoint NGFW
UCI, a financial institution that provides mortgages to homebuyers in four European countries, faced the challenge of safeguarding sensitive personal and financial data of its customers. With the advent of new GDPR regulations, the need to protect this data became even more critical. The institution needed to ensure safe and efficient connectivity across devices and locations. The challenge was to deploy a solution that could minimize security risks, reduce manual solution management, and integrate into UCI’s existing SIEM systems to help detect company policy infractions.
Case Study
Southern Communications– Data Services Ltd.
Southern Communications, a provider of mission-critical infrastructure as a service (IaaS) for medium to large scale enterprises, was facing a challenge with their signature product, Smart-Connect. As broadband lines improved, leased lines became more affordable, and new technologies became available, the customer desired an alternative solution that could support larger enterprise customers. Managed services are a commoditized market, and Southern Communications needed a way to differentiate their offering from its competitors. The new solution needed to support a wide range of connectivity options, allow for redundancy at each site, have the ability to assign priority to business-critical application traffic, provide visualization tools and reports, offer next-generation security, and have centralized management.
Case Study
Rösler Improves Network Transparency with Forcepoint NGFW
Rösler, a leading player in the mechanical surface finishing sector, was facing challenges with its IT security. The company had been using several firewall systems in its branches, all of which had to be separately managed and maintained. This made determining the IT security status of the entire network either rarely possible or extremely time-consuming. Tasks like updates or the securing of individual firewalls were also very time-consuming. Most firewalls in the individual branches could not be regularly monitored due to time constraints. This meant that settings and administrative activities were not being monitored on an ongoing basis, daily compliance checks were not being carried out, and configuration errors and potential security risks were not immediately being noticed. It was therefore imperative for the IT department to improve network transparency and to guarantee the simplest possible management process.
Case Study
Empowering a Safe, Productive Educational Environment with Forcepoint
St. Benedict Preparatory School faced a challenge in maintaining a safe and productive educational environment. The school needed to prevent students from accessing inappropriate or distracting web content through classroom technology. However, stringent policies could hinder faculty and staff from performing their duties effectively. The existing firewall/router combo solution was unable to filter web addresses on a per-user basis, which was necessary for the school's unique needs. Additionally, the school needed a solution that could protect students and staff even when they were off-premises.
Case Study
Indian Power Distributor Stays Ahead of Evolving Privacy Regulations
The power distributor provides energy to five power companies across an Indian state with a population of more than 25 million people. Managing the state’s power also means securing the personal and financial data of individuals and business customers. The company manages customer bill pay, consumer feedback, and more—which means that it acquires a sizeable amount of data, from customer names and contact information to invoicing details and power usage trends. In the wrong hands, this data can potentially be used to commit fraud or theft. While the company’s data stores increase, India’s attitude toward data protection is evolving. In August 2017, the country’s Supreme Court ruled privacy was a fundamental human right, spurring work on a nationwide personal data protection bill. While that bill has not yet been enacted, businesses see increased regulation of private data on the horizon and know they will likely need strong regulatory compliance processes very soon. The power company first engaged Forcepoint after reaching an impasse with a web security solution that wasn’t effective or flexible enough to meet its needs. The incumbent web security solution would bypass the URL filter, allowing users to access unauthorized sites. Separate URL filtering and web proxy point products caused a second challenge: the products were meant to work together but dependencies between them meant upgrades to one product would cause the other product to stop working—leading to support and management issues. In addition to these functionality and integration issues, the security product’s category database was less than comprehensive, with multiple categories missing. And a complex update process made it difficult to revise.
Case Study
Customized Data Protection Keeps Up with This High-Speed Enterprise
The global telecommunications enterprise was in a race against time and competitors to secure a significant market share in the 5G technology. The company was under constant pressure to innovate, share information, and move quickly. However, the company was fined for a breach of customer data that its existing DLP product neither prevented nor detected. The security team was under pressure to secure data and intellectual property without slowing down the business operations. The high level of competition in the industry meant that the enterprise leaned towards freeing the business with fewer data controls over completely shutting down data loss, even if that meant taking some risks.
Case Study
Forcepoint DLP Implementation in Microland
Microland, a medium-sized enterprise in the computer services industry, was facing challenges in controlling and managing data that were subject to regulation. The company needed a solution that could effectively discover, control, and limit the usage of regulated data or sensitive intellectual property (IP), even when the data wasn't on the network. The solution also needed to provide visibility into data movement within the business and help prevent potential data breaches.
Case Study
Greater Visibility into Trading Floor Communications Saves This Bank $7 Million in Projected Investigation Costs
In the highly regulated world of investment banking, new communication channels like Skype and WhatsApp, and web forums like Investopedia, are raising the risk of widespread abuse, whether through insider trading, fraud, or leaks of sensitive company information. This bank’s operations and compliance leadership knew they needed a better way to stay close to trader conversations and safeguard the trading floor. The bank’s monitoring technology was obsolete and required a high level of manual intervention to identify and investigate potential compliance issues. With essentially just an email archiving system, investigators had to build lists of words indicative of insider trading activity and conduct manual searches within the archives to build cases.
Case Study
This Energy Provider Keeps the Public’s Trust by Doing More Than Keeping the Lights On
The enterprise energy provider, serving tens of millions of customers, faced multiple external and internal vulnerabilities to both the power grid and their multi-pronged operations. The cyber threats faced by all companies—like data loss and fraud—come with the added complexity of protecting critical infrastructure. Breaches, downtime, and fraud can cause massive problems for both the enterprise and its customers, from loss of revenue and reputation to endangering human safety. Safeguarding sensitive customer information is always paramount; in this case, that includes a number of high-profile individuals whose home addresses or social security numbers make a tempting target for data thieves looking for a quick payday. Then, of course, there are the millions of dollars flowing through the company, including funds from the resale of renewable energy that could be fraudulently rerouted through altered direct deposit information. Finally, the company’s substations, not always managed by a human operator, run the risk of being taken over by an outside entity without the company knowing.
Case Study
IFSP Upgrades Firewall Security with Forcepoint NGFW
The Instituto FederaI de Educacao, Ciencia e Tecnologia of Sao Paulo (IFSP) faced a major challenge in ensuring the protection of its IT network and communication resources. This required maintaining the integrity, confidentiality, and availability of information regardless of where it is located and, above all, ensuring compliance with applicable government regulations. After suffering a number of injection-type attacks and system interruptions due to hardware and other bugs, the IT team decided to look at several NGFW (Next-Generation Firewall) options available in the market. IFSP also found that its former security solutions were a contributing factor in employees leaving the organization. Furthermore, it was important to implement a solution with the best TCO (total cost of ownership) as IFSP had a limited budget and wanted technology that would not require additional licensing and whose functionalities would not stop at the end of the license.
Case Study
Davies Turner Keeps Web Traffic Moving with Forcepoint
Davies Turner, a leading multimodal freight forwarding group in the UK, faced several challenges with its existing security solution. The nature of their business required employees to regularly use the web for work-related tasks, which posed a risk to the network. The company had different user requirements across several offices, necessitating a customizable solution. The HR team also needed increased insight and reporting on time spent online. The existing solution was not user-friendly and could not provide the depth of information needed as the company grew.
Case Study
Secure Cross Domain Access and Transfer Accomplished with One Wire to the Desk
The Center for Army Analysis (CAA) was working with an infrastructure in which access to all Command, Control, Communications, Computers and Information Management (C4I) networks required each user to have four separate workstations and a Black Box KVM switch at their workspace. This resulted in duplication of hardware and massive power consumption. Another problem that CAA faced was a severe time degradation in moving classified information across multiple networks. This prevented the execution of critical Global War on Terror and warfighting analyses.
Case Study
Greater Visibility into Trading Floor Communications Saves This Bank $7 Million in Projected Investigation Costs
The international banking group was facing challenges in meeting SEC compliance regulations due to the increasing use of personal messaging channels and web forums by traders. The bank's existing monitoring technology was outdated and required a high level of manual intervention to identify and investigate potential compliance issues. The system was not covering the full spectrum of modern communication channels and offered no systematic ways to flag potential indicators of fraudulent behavior. These time-consuming investigations, a vast majority of them false positives, were costing the bank millions of dollars.
Case Study
Copa Airlines Case Study
Copa Airlines was facing a challenge in providing better protection for its roaming users and distributed offices. The company was in need of a solution that could offer a full-featured policy set. Prior to choosing Forcepoint Secure Web Gateway, Copa Airlines evaluated other vendors including Zscaler and McAfee. The company was looking for a solution that offered efficacy, deployment flexibility, and ease of management.
Case Study
FERCAM Updates Web Security Quickly with Forcepoint
FERCAM, a logistics company, was experiencing growth that necessitated the modernization of its technology resources. Internet access had become a crucial part of daily operations, and the company needed a more effective monitoring solution. The previous solution was plagued with issues such as weak performance, ineffective blacklist updating, and inadequate web traffic monitoring and analysis for 800 users. These inefficiencies led to a high number of IT tickets related to service issues or false positives.
Case Study
Forcepoint Enables AZ Sint-Lucas Hospital to Safeguard Patient Care
Healthcare professionals at AZ Sint-Lucas Hospital required unfiltered access to websites to provide patients with the best possible outcome. This resulted in a substantial amount of unprotected data being sent and received via smartphones, tablets, or other devices. A study of user behavior discovered that staff visited more non-work-related websites than job-related sites, posing a serious risk for data loss or theft. The increasing number of spam complaints also required too much time from the IT team to handle.
Case Study
Sauer Corporate Services, LLC Case Study
Sauer Corporate Services, LLC faced several challenges that led them to evaluate and ultimately select Forcepoint Secure Web Gateway. These challenges included the difficult and costly maintenance of appliances and the need for better protection for roaming users and/or distributed offices. They chose Forcepoint’s hybrid deployment option for Secure Web Gateway because of its dedicated filtering in the cloud, the full-featured policy set, and the need to prevent loss of DLP functionality in a cloud deployment. Before choosing Forcepoint Secure Web Gateway, they evaluated or previously used vendors including Cisco, Symantec, and McAfee.
Case Study
Adventist Health Case Study
Adventist Health, a not-for-profit health care organization, was facing a major challenge in safely embracing new technology without putting the hospital chain’s patient database at risk. The healthcare sector faces some very specific regulatory and legal requirements, as well as medical technology obstacles to maintaining its data integrity. The more powerful and sophisticated digital technology becomes, the easier it is to use and save lives. Unfortunately, technological advances also make it easier for cybercriminals to access and exploit critical data. This mixed blessing of technological advancement and more sophisticated cybercrime is the new reality going forward. The growth curve of the cyber threat landscape is both steep and evolutionary; thus the growth curve of cyber defense solutions that effectively address those threats must be so as well. Adventist Health faces threats as they adopt new technology safely and effectively.
Case Study
Cloud-based Web Security Provides a Tailwind for this Airline’s Digital Transformation
The airline was undergoing a digital transformation, moving data and processes to the cloud. This widened the attack surface and created more entry points for malware. The distributed and mobile teams needed safe, efficient access to cloud data and processes. The open web browsing policy necessary for staff to do their jobs left more room for user error. The airline needed a security solution to safeguard off-network activity while keeping business moving at cruising speed.
Case Study
Swiss Telecommunications Company Provides Managed Security Services to Financial Institutions Through a Deep Technical Partnership with Forcepoint
The telecommunications company, a leading internet and mobile services provider in Switzerland, is an integral part of the country’s connectivity, owning most of the country’s business-critical broadband network market and more than half of its mobile networks. As broadband and mobile connectivity edge closer to commodity status throughout the world, the company has leveraged its technological prowess to take its place in the fast-growing managed IT services business, notably in security. As companies move to cloud-based and hybrid infrastructures, digitization and new technologies are creating new avenues for cyberattack. However, a current IT talent shortage is making staff security experts hard to find. This explains why, according to an ICT Security Study 2018 by MSM Research Ltd, fully half of IT security spending in Switzerland flows into the managed services sector. Of surveyed companies, 64% want to expand their collaboration with external service providers further. The company needed airtight security with protection against malware and evasions with zero downtime to keep Switzerland’s economy—as well as the world’s—operating without a hitch. A security failure could lead to a network outage, hindering thousands of financial transactions for customer banks and costing hundreds of thousands of dollars. Worse, a security breach could disrupt or even crash worldwide financial markets.
Case Study
This Energy Provider Keeps the Public’s Trust by Doing More Than Keeping the Lights On
The enterprise energy provider, serving tens of millions of customers, faced multiple external and internal vulnerabilities to both the power grid and their multi-pronged operations. The cyber threats faced by all companies—like data loss and fraud—come with the added complexity of protecting critical infrastructure. Millions of people, companies, and government organizations depend on it, and failure is not an option. Breaches, downtime, and fraud can cause massive problems for both the enterprise and its customers, from loss of revenue and reputation to endangering human safety. Safeguarding sensitive customer information is always paramount; in this case, that includes a number of high-profile individuals whose home addresses or social security numbers make a tempting target for data thieves looking for a quick payday. Then, of course, there are the millions of dollars flowing through the company, including funds from the resale of renewable energy that could be fraudulently rerouted through altered direct deposit information. Finally, the company’s substations, not always managed by a human operator, run the risk of being taken over by an outside entity without the company knowing.
Case Study
At This Cutting-Edge Automotive Parts Supplier, Intellectual Property Protection Has Kicked into High Gear
The company, a leading supplier of cables and wires across several sectors, including automotive, industry, and elevators, was facing the challenge of protecting its valuable IP and that of its high-profile clients across its corporate and international locations. The company needed visibility to risky activity, indicating corporate espionage. With collaboration on a global scale, this sensitive, proprietary data is frequently on the move. Realizing data in motion can be difficult to see and control, the company needed a better way to secure it. And as the company expanded into countries with a known high risk of IP theft and corporate espionage, it wanted to ensure proprietary data was locked down. The breach of just one client’s IP could mean the loss of every clients’ trust—hurting the company’s reputation and its bottom line.
Case Study
Marcegaglia Improves Employee Productivity with Forcepoint
Marcegaglia, a leading steel processing company, relies heavily on the integrity of its technology and data to support its production activities and global strategies. The company employs about 2,000 licensed users with personal accounts and email addresses. In 2008, Renzo Rossi, CTO of Marcegaglia, began looking for a more efficient and secure means for thousands of users to access web content safely. Rossi recognized the need for a more efficient navigation process, company-wide, while protecting employees and data in real-time implementing and improving internal technology hand in hand with the development of the risks of the network.
Case Study
Comdata uses Forcepoint to protect critical data without compromising workforce productivity
Comdata Group, a global leader in customer interaction and process management services, faced a significant challenge in protecting sensitive and critical data as it expanded abroad through acquisitions. The company recognized the importance of focusing on the most valuable layer of their information, related to strategic plans, economics, or synthesis of production trends. They needed to overcome their pre-existing open source solutions, which were burdensome in terms of maintenance and dedicated resources, and make room for technologies that could provide greater automation and continuous evolution. The solutions needed to respond promptly to evolving threats and, with a cloud component, also provide protection on the mobility front.
Case Study
Forcepoint Helps Tekno Group Protect IP and Client Data While Controlling Costs
Tekno Group, a company specializing in manufacturing pre-painted metallic products, was facing a challenge with their previous security solution. The solution had become cost-prohibitive and was not keeping up with advancing technologies. The company needed a security strategy that could protect their intellectual property and client data, increase prevention of threats via email and web, and was cost-effective while still maintaining the highest quality.
Case Study
Validium
Validium, an Employee Assistance Programme (EAP) provider and psychological wellbeing consultancy, was facing a significant challenge with its existing security solution. The solution was high maintenance and was not effectively detecting threats entering Validium’s corporate network. The situation was further exacerbated when Validium became the target of highly-advanced attacks. The company experienced firsthand the severe effects of two crypto-ransomware attacks on its network within a few weeks of each other. The false positives in quarantined emails and malicious activity required tedious, daily management from Validium’s entire Business Projects Department. This wasted valuable time and resources for the business, so the cost of the solution was significantly more in terms of the ongoing management requirement.
Case Study
Forcepoint Keeps Validium Safe From Even the Most Sophisticated Attacks
Validium, an employee assistance and wellbeing consultancy, was facing a significant challenge with its on-premises web and email security solution. The system was ineffective, allowing sophisticated attacks to slip through. Malicious code embedded in attachments or URLs led to the organization falling victim to two crypto-ransomware attacks within a few weeks. The system also required frequent manual updates, which were time-consuming and did not necessarily improve functionality.
Case Study
Open Source Center
The Open Source Center (OSC) is the US Government’s premier provider of foreign, open-source intelligence. OSC collects data from a wide range of sources, formats, content, media, and languages resulting in large volumes of data distributed across multiple repositories. One of OSC’s challenges is to derive value from this corpus, providing accurate insights while remaining flexible to incorporating new sources and integrating different technological capabilities. OSC analysts needed technology to help discover content, accomplish data harmonization (integration), identify relationships and connections in the data, use visualization and exploratory analytics to better understand the content, and capture/ enable the sharing of analytic discoveries (retain knowledge). OSC must be able to quickly respond to constituent requests from other agencies or Congress, special projects, and general inquiries and therefore required a system that was adaptive, flexible, and agile with respect to the changing landscape of data, requests,and knowledge.
Case Study
MagnaChip Semiconductor Corporation Case Study
MagnaChip Semiconductor Corporation, a leading semiconductor company, faced the challenge of preventing the leakage of high-level internal information due to the competitive nature of the semiconductor industry. The company needed a system that could monitor internal users for signs of behavioral anomalies, identify the causes, and prevent data loss. The system needed to not only inspect unsafe actions but also monitor the entire situation, predict potential data loss incidents, and analyze causes. Additionally, the system needed to be compatible with various existing PC security software and should not interfere with the daily business of each user.
Case Study
Metro Bank Enhances Security for Office 365 Apps with Forcepoint CASB
Metro Bank, the UK’s first new High Street bank in over 100 years, wanted to improve employee productivity by enabling off-network access to Office 365 and Yammer. However, they found the move too risky, even with Mobile Device Management (MDM) in place. The bank needed a solution that would enable them to fully leverage their investment in cloud applications without increasing the risk of company data and confidential information falling into the wrong hands. The Infrastructure Delivery Team’s goal was to provide full access to Office 365 for corporate-owned device users—on or off network—and to extend access to Yammer for personal device users as well. As a second phase, specific colleagues were to be given off-site access to the more-sensitive information within Dynamics CRM. Enhancing mobile endpoint management was another key requirement. Metro Bank wanted to limit off-network access to the corporate devices already managed by AirWatch MDM, and there was no straightforward way to enforce this policy with their existing tools.
Case Study
Spanbild Case Study
Spanbild, a manufacturer of expertly designed, quality steel, timber and paneled temporary, permanent and relocatable buildings, was facing a significant issue with its email security system. The company's website generates a large volume of queries from prospects seeking information and quotes, which are automatically directed by the email server to the appropriate franchisee for follow-up. However, franchisees began to query Spanbild regarding missing prospect information. Upon investigation, Spanbild’s IT team discovered that the company’s email security system was identifying a large number of false positives. Emails that should have been delivered were being categorized as spam and, therefore, filtered out. This included a large number of prospect inquiries. Additionally, they noticed that the email security software was running out of hard disk drive space.
Case Study
Forcepoint Helps FinTech Company Stay Up and Running Safely
The financial services technology organization faced the challenge of protecting sensitive customer data and end users while delivering constant access to the network to maximize employee productivity. The company needed to maintain a balance between giving employees enough control to do their jobs while keeping the network running and secure. The risk of network downtime, which would cost the company significant funds and productivity, was a significant concern.
Case Study
Cobweb Enhances Network Security with Forcepoint NGFW
Cobweb provides hosted services for over 150,000 mailboxes, managing firewalls for hundreds of locations with complex, overlapping IP schemas. The impact of overlapping schemas to Cobweb and its customers created an inability to deliver the service to customers. Furthermore, Cobweb has to ensure that the environment is up-to-date in order to manage a continually evolving threat landscape. Visits to perform data center upgrades in Segensworth, Fareham, and one in Telehouse, London were proving to be time intensive, and the company needed a system it could rely on to upgrade automatically.
Case Study
Hospital Immunizes Against Data Breaches While Improving Patient Care
The hospital was facing a challenge of protecting its sensitive data from human-based vulnerabilities, especially from social engineering attempts. The hospital's employees, dedicated to serving their patients, could be exploited by hackers seeking financial gain. The sensitive information stored by the hospital, such as patient personal data, physician credentials, and Drug Enforcement Agency license numbers, could be used by hackers to create fake identities, pose as a medical professional online, or even file fraudulent insurance claims. The hospital needed a cybersecurity solution that could address human vulnerability without impacting the ability to provide care for its patients.
Case Study
Anoka County Government Data Protection Case Study
Anoka County government in Minnesota's Twin Cities region is a rapidly growing county with over 22 departments and 3,300 users providing services to more than 320,000 citizens. The Information Services department of Anoka County supports a wide range of departments and divisions within the county, including transportation, law enforcement, public works, and administration. Their responsibility is to ensure the smooth running of the county's information systems. However, the challenge lies in keeping the county’s information systems free of malware and protecting confidential government data, which is critical.
Case Study
IMI Remosa Enhances Data Security with Forcepoint
IMI Remosa, a leading manufacturer of control systems, faced a significant challenge in protecting its proprietary information. As the company continued to grow and innovate, the volume and accessibility of sensitive data increased, making the company increasingly vulnerable to data leakage and theft. The company's transition to a multinational organization accelerated the need for a security solution that could prevent data leakage and theft while ensuring safe and regular access to sensitive information. The IT organization was tasked with protecting the company's intellectual property and defining user roles and access privileges. To ensure the security and control the flow of sensitive information within the network, a security solution that provides both comprehensive Data Theft Prevention and detailed analytic reports was necessary.
Case Study
Data is the New Oil, and This Enterprise Keeps its Competitive Edge by Protecting Both with Forcepoint
The company, a Fortune U.S. 50 enterprise oil and gas company, was facing a significant challenge in securing its critical proprietary data from people-based vulnerabilities. The company's task force identified that the biggest risk was employees leaving the company, who could potentially exfiltrate proprietary information. The company was aware of data leaks but lacked the ability to understand if they were accidental or malicious. The company needed a solution that could provide irrefutable evidence in case of litigation and help them get ahead of potential leaks.
Case Study
Global CRM Provider Cegedim Relies on Forcepoint NGFW
Cegedim, a global provider of technology and data services to healthcare, life sciences, and insurance companies, operates a powerful network with extremely high throughput. This required a firewall performance to match. The company needed to deploy a large number of core network firewalls with advanced clustering to protect the entire IT infrastructure from external or internal attacks. Furthermore, Cegedim has distributed branch sites across Europe, Asia, and Australia, which required comprehensive, centralized administration and policy management capabilities.
Case Study
This UK Bank Partners with Forcepoint to Outsmart Relentless Fraudsters Without Affecting the Online Customer Experience
The bank was facing a significant challenge in safeguarding its customers and itself against constantly changing, costly attacks on their online banking application. Fraudsters were always changing their tactics, and the bank's application, which required constant stability, couldn't react quickly enough to these changes. This left the bank vulnerable to the latest methods of fraud. The bank needed a solution that could provide an extra layer of security without affecting the stability of its banking application.