实例探究.
添加案例
我们的案例数据库覆盖了全球物联网生态系统中的 22,657 家解决方案供应商。
您可以通过筛选条件进行快速浏览。
Download Excel
筛选条件
-
(61)
- (31)
- (30)
- (21)
- 查看全部
-
(11)
- (6)
- (3)
- (2)
-
(10)
- (10)
-
(8)
- (3)
- (2)
- (2)
- 查看全部
-
(5)
- (4)
- (1)
- 查看全部 9 技术
- (22)
- (11)
- (8)
- (7)
- (6)
- 查看全部 22 行业
- (40)
- (23)
- (14)
- (6)
- (4)
- 查看全部 10 功能区
- (26)
- (22)
- (20)
- (17)
- (12)
- 查看全部 19 用例
- (48)
- (39)
- (26)
- (11)
- (7)
- 查看全部 6 服务
- (69)
Selected Filters
![]() |
实现扩展和凝聚力的多云安全和合规战略
作为当今竞争激烈的分析和商业智能行业中的众多公司之一,Qlik 的目标是使相关业务部门的员工能够通过自助服务访问云,尽可能安全地做尽可能多的事情。具体来说,他们希望研发团队进行创新,销售团队进行销售,同时保持安全、风险最小化和效率最大化。
|
|
|
![]() |
Experity 依靠 Rapid7 托管服务扩展安全运营
合并导致人员、办公地点、软件和服务的快速扩张给安全团队带来了独特的挑战。这种对业务连续性和标准化的需求推动了 Experity 团队寻找能够帮助他们管理安全运营并在其安全计划中建立弹性的供应商。该公司一直在使用托管检测和响应 (MDR) 平台,但很明显,虽然它在实施时满足了需求,但该解决方案并没有真正适应所有变化。他们开始寻找可以监控所有活动并提供用户友好且可操作的仪表板的 MDR 和漏洞管理解决方案。
|
|
|
![]() |
User Monitoring and Log Search: Rapid7 InsightIDR Delivers for UK Investment Bank Evercore
Neil Johnson, security manager at Evercore, needed a robust SIEM solution to handle user behavior monitoring and provide comprehensive log search capabilities for data analysis. The existing vulnerability management solution managed by a third party was not meeting their requirements, prompting the need for a more effective solution. The primary drivers for selecting InsightIDR included the ability to alert on anomalous user logins and provide detailed log search functionalities. The head of IT was particularly interested in monitoring user activities to ensure that employee credentials were not compromised.
|
|
|
![]() |
Zoopla 通过 Rapid7 InsightAppSec 增强应用程序安全性
Zoopla 是一家总部位于伦敦的房地产门户网站,在维护其应用程序的安全性方面面临着重大挑战。其旗舰房地产网站和应用程序每月的访问量超过 6000 万次,该公司必须确保用户的最大安全。该公司的安全团队由应用程序安全工程师 Alikhan Uzakov 领导,负责指导数百名 Zoopla 开发人员完成应用程序安全测试过程。这包括进行培训并帮助开发人员将安全工具嵌入到他们的流程中,以确保新功能和产品在发布之前进行安全测试。然而,由于只有三名员工,安全团队发现为大量开发人员提供支持具有挑战性。
|
|
|
![]() |
Securing a City: Corpus Christi Assesses, Prioritizes, and Monitors Threats
Bob Jones, the Information Security Manager for the City of Corpus Christi, Texas, faced the challenge of increasing security awareness across the organization and detecting and investigating attacks more easily. The city’s infrastructure is unique, akin to about 30 separate SMBs operating under a larger parent company, each with different requirements and compliance regulations. Bob's role was multifaceted, involving duties of an analyst, engineer, and penetration tester. He had to change an embedded culture and establish credibility with the CIO and IT Director. The primary challenge was the lack of visibility into assets on the Corpus Christi network, making it difficult to accurately qualify or quantify the level of risk. Bob needed to prioritize remediation to add value and avoid placing a greater burden on the business.
|
|
|
![]() |
Rapid7 UserInsight Enables Acosta Sales & Marketing to Effectively Manage and Reduce User Risk for a Highly Mobile Workforce
Acosta has a highly mobile, geographically distributed workforce. They needed an efficient way to gain actionable insight into user behavior, effectively identify when a user’s account may have been compromised, and shorten the time needed for investigation of security incidents. The company’s large remote workforce and high degree of travel create a complex security environment, necessitating vigilant detection of compromised credentials and unusual user behavior. The challenge is further compounded by the need to manage user risk in a distributed work environment where employees frequently perform in-store marketing evaluations using mobile devices.
|
|
|
![]() |
Rapid7 InsightVM and InsightIDR Integrate to Drive 60% Time Savings and Ease Compliance for Energie Suedbayern
One of Benjamin Nawrath’s biggest challenges is maintaining compliance with Germany’s IT Security Act (ITSG), which became law in 2015 but applies from July 2017 onward. The law requires all critical infrastructure providers to run an advanced cybersecurity program designed to ensure the availability, integrity, authenticity, and confidentiality of their IT infrastructure. It also demands that organizations regularly provide certification proving their compliance. Failure to do so could result in a fine of hundreds of thousands Euro. With a large and complex environment to monitor (including 2,000 IP addresses), limited IT staff resources, a growing compliance burden, and ever-determined hackers to keep at bay, Benjamin Nawrath needed robust technology solutions to help overcome these major challenges.
|
|
|
![]() |
Rapid7 Metasploit Changes the Security Mindset at AutomationDirect
AutomationDirect, a proactive company, wanted to change the security mindset of its IT staff to stay ahead of the latest threats. The company needed to ensure that its IT security practices were robust enough to prevent both internal and external threats. Tim Lawrence, IT security analyst at AutomationDirect, recognized that administrators often prioritize getting systems up and running over security, which could lead to vulnerabilities. After attending the Black Hat convention in July 2010, Lawrence devised a long-term security strategy to address these issues. The goal was to anticipate and thwart potential hackers and eliminate internal oversights that could create inadvertent vulnerabilities. AutomationDirect was not under any immediate known security threat, but the IT security team needed to promote overall security best practices to the entire IT staff to prevent any possible worst-case scenarios.
|
|
|
![]() |
Rapid7 Conducts a Penetration Test for Eyelock
Recently, Eyelock set out on a new project: making security airtight for logical access devices. They wanted an external team to take a very close look at their security architecture to implement a design that would allow for access to computers, websites, online banking, and the like. The RFP process kicked off, and the Eyelock team began evaluating various third-party vendors. The top three qualifications were extensive experience with embedded products, a high level of security expertise, and a strong overall reputation within the industry. Through a combination of these factors, Rapid7 won out.
|
|
|
![]() |
Nexpose Enables a Small IT Staff to Manage a Large IT Infrastructure at Norwich University
With a constantly growing network environment, Norwich University’s IT department found it increasingly difficult to have a clear view into all network equipment and servers—and their vulnerabilities—while still only conducting manual scans.
|
|
|
![]() |
Leveraging Dynamic Asset Groups in Rapid7 Nexpose
Identifying how many servers and systems were affected by Heartbleed and other OpenSSL vulnerabilities without having to scan every server manually. PNM Resources needed a way to quickly and accurately identify vulnerabilities across their extensive network of servers and systems. The manual process of scanning each server individually was time-consuming and inefficient, especially during critical incidents like Heartbleed. The challenge was to find a solution that could provide rapid, accurate, and comprehensive visibility into the security status of their assets, enabling timely remediation and risk reduction.
|
|
|
![]() |
Domino's Pizza 通过 Rapid7 的检测和响应研讨会增强安全运营
达美乐比萨是世界上最大的比萨饼公司,其在线订购和送货服务严重依赖技术。该公司的安全运营中心 24/7 全天候运营,他们面临的最大安全挑战之一是网络钓鱼。由于威胁行为者的狡猾,鱼叉式网络钓鱼尤其是一个重大威胁。由于其国内和国际市场,该公司还拥有广泛的攻击面,这使得威胁搜寻成为一项关键任务。该公司希望培训其安全运营中心 (SOC) 分析师像攻击者一样思考,因为许多分析师只专注于检测和响应,而缺乏对攻击者所使用策略的了解。
|
|
|
![]() |
InsightUBA on a University Campus
The University of Texas at Dallas faced significant challenges in managing vulnerabilities across its campus network. The primary goal was to reduce vulnerabilities, detect and investigate security incidents faster, and manage threat exposure effectively. The security team needed a solution that could provide comprehensive visibility into information security risks, correlate user behavior with events, and improve incident response times. Additionally, they wanted to ensure that new technology purchases underwent thorough security assessments before going into production.
|
|
|
![]() |
Rapid7 Nexpose Enhances PCI Compliance and Overall Network Security for Bob’s Stores
In 2008, Bob’s Stores faced the challenge of meeting new PCI compliance standards, particularly requirement 11 of the PCI DSS, which mandated regular tests of security systems and processes through internal and external scans. The IT department, led by Nick Sorgio, Assistant Vice President and technology manager, needed a vulnerability management system to meet these standards and protect customer data. The pressure to quickly comply with these new requirements was significant, and Bob’s Stores had no existing vulnerability management system in place. This made finding a suitable tool a top business priority. Bob’s Stores conducted a comprehensive assessment of various vulnerability management vendors, ultimately selecting Rapid7 due to its ability to identify vulnerabilities across networks, operating systems, databases, web applications, and a wide range of system platforms. Rapid7 Nexpose provided the necessary vulnerability assessment scanning and monitoring capabilities to meet PCI data security standards and offered sound vulnerability management practices as part of a comprehensive security program.
|
|
|
![]() |
Nexpose Busts Security Violations at Redflex Traffic Systems
When Eric Nooden joined Redflex as Information Security Specialist, he found many out-of-date server operating systems. Because system stability was a priority with Redflex proprietary solutions, no one wanted to risk outages. The systems administrators were nervous about patching servers, fearing they might break them. The Redflex team had multilayer security in place, with firewalls, anti-virus software, and other technologies, but no dedicated security personnel to manage them. The undermanaged security posture was more reactive than proactive, and Nooden joined Redflex to change that. Additionally, because Redflex passes financial transactions to processing institutions, its systems must pass SAS 70 audits and comply with data protection standards such as Payment Card Industry Data Security Standard (PCI DSS) to avoid fines.
|
|
|
![]() |
Italian University Gains a “Panorama” View of Overall Risk with Rapid7 InsightIDR
The University of Palermo faced significant challenges in managing and securing a vast number of assets with a small IT team. They needed a solution that could provide comprehensive visibility into vulnerabilities and overall risk, as well as streamline the process of querying and analyzing log data. The university also required a secure method for log retention to meet compliance requirements and sought flexible visibility across a range of operating systems, including Windows, Mac, Linux, iOS, Android, and Windows phones. Prior to adopting Rapid7's solutions, the university relied on Snort and AlienVault OSSIM for incident detection and response, which proved to be less efficient and intuitive.
|
|
|
![]() |
Modine Manufacturing 利用 Rapid7 的安全服务和解决方案组合增强网络安全
Modine Manufacturing Company 是热管理技术和解决方案的全球领导者,在保护其数字资产及其客户的数字资产方面面临着重大挑战。随着业务的增长,风险也随之增加。该公司的小型安全团队发现自己监控的事件源从几百个增加到数千个。他们需要一个能够帮助他们改进安全计划各个部分、满足主动和被动安全需求的合作伙伴。这需要一个拥有多个卓越产品和服务中心的战略合作伙伴。
|
|
|
![]() |
Pearl Data Direct 利用 Rapid7 Insight 平台增强安全性和合规性
Pearl Data Direct LLC (PDD) 是一家金融科技公司,也是 LuLu Financial Holdings 的子公司,面临两大安全挑战。首先,作为一家通过其应用程序管理数百万美元的公司,它们是网络攻击者的一个有吸引力的目标。其次,他们的业务在受到严格监管的金融领域运营,需要严格遵守央行的规定。该公司需要确保每秒流经其系统的数千笔交易的安全,同时还要遵守严格的网络安全法规。他们还必须保护客户的个人身份信息 (PII),这些信息是他们出于合规目的而收集的。此外,他们的核心银行系统与多家银行相连,增加了安全挑战的复杂性。
|
|
|
![]() |
Nexpose Identifies Vulnerabilities, Assists Remediation at LoneStar College System
Before 2008, LSCS supported separate campus IT operations at each of its five campuses with distributed IT support services. Then a new CIO joined the college, and within a month, the Lone Star College System had completely centralized its IT services to support a new vision. Associate Vice Chancellor of Technology Services Link Alander explains, “Through that process we had a series of changes and challenges that had to be achieved to improve reliability and security.” While the college had so far avoided any significant security incident or data breach, it understood the need for a proactive security posture that would maintain user trust. It also needed tools to help prove compliance with regulations such as the Family Educational Rights and Privacy Act (FERPA), the Health Insurance Portability and Accountability Act (HIPAA), and other regulations. The LSCS security initiatives are part of 11 strategic technology initiatives, incorporated into the overall LSCS strategic plan for 2009 through 2011. One of its primary security goals is to use ISO 27000 standards as a framework.
|
|
|
![]() |
Vulnerability Management at Diebold: Automation, Prioritization, Remediation
Diebold needed an effective threat exposure management solution that would offer scalability and visibility. Given the pivotal role vulnerability management plays at Diebold, selecting a vulnerability management solution was an important task which the team did not undertake lightly. A main priority for them was the effectiveness of the vulnerability scanner. Diebold needed accurate, up-to-date, real-time data. Scalability was also an important factor; being a global company, they needed the ability to reach around the world without adding administrative overhead.
|
|
|
![]() |
Essentia Health Reduces Risk with Nexpose and Metasploit
Securing the Essentia Health network is a complex task due to its multi-billion dollar integrated health system that spans multiple states and roughly one hundred facilities in the Midwest. The network includes fifty thousand IPs, from facilities to medical device equipment. The security team must locate and resolve high-risk vulnerabilities to safeguard patient data and other critical information. Compliance with HIPAA, HITECH, and PCI DSS adds another layer of complexity. Despite compliance, security holes such as weak credentials and improper patches were prevalent. The team needed a solution to perform thorough testing against all active systems and demonstrate risk to secure necessary resources for a vulnerability management program.
|
|
|
![]() |
Vulnerability Management assists with compliance for Hillsborough County
Before Hillsborough County acquired a vulnerability management solution, ensuring that their over 250 servers were secure and compliant proved difficult for ITS’ team of three security engineers. The County’s process was to contract with outside vendors to run periodic vulnerability assessment scans. With new security requirements increasing the need for more frequent auditing, they needed an in-house solution. The County’s security engineers required detailed reports that identified vulnerabilities to be remedied before they could pose substantial risk to the network environment. To evaluate vulnerability management solutions, ITS defined a set of technical requirements against which to measure selected vulnerability assessment scanners. The desired solution would need the ability to perform stealth scans, schedule routine scans, support multiple platforms including Windows and Linux, scan multiple platforms, applications and devices, support unauthenticated and authenticated scans, scan all systems without installing an agent, perform incremental scans, and provide future support for wireless protocols.
|
|
|
![]() |
MCPHS University Saves Time and Effort with Nexpose
When Allen Basey joined MCPHS University over two and a half years ago, he was tasked with developing new security procedures and policies, including comprehensive vulnerability scanning. As the sole person dedicated to maintaining security, he needed to improve the University's overall security posture without being overburdened. Initially, he opted for Tenable's Nessus due to its low cost, but found it required manual scans and lacked critical context for prioritizing vulnerabilities. This made it difficult to get IT support teams to take action, and researching how to patch vulnerabilities consumed valuable time, leading to crucial patches being neglected.
|
|
|
![]() |
Permission Interactive Turns to Rapid7 for Help Enhancing its Security with Comprehensive Vulnerability Management
Permission Interactive, an e-commerce company handling sensitive customer information, faced challenges in meeting PCI compliance standards. Their existing McAfee vulnerability management solution was only helping them 'check the box' for PCI compliance without improving their overall security landscape. A full audit revealed significant gaps in security best practices and overall compliance, prompting the company to seek a more robust solution.
|
|
|
![]() |
Weill Cornell Medical College Relies on Rapid7 Nexpose for a Secure Environment
Weill Cornell Medical College, located separate from the main university campus, serves as an academic medical center requiring HIPAA compliance. They have complex IT security needs and needed a solution to prioritize and protect from threats as well as grow with the college.
|
|
|
![]() |
WildTangent's Successful Implementation of Mobilisafe for BYOD Security
WildTangent, an online games service company, faced significant security challenges due to its bring-your-own-device (BYOD) policy. The company had a highly mobile and geographically dispersed workforce, which necessitated the use of personal mobile devices for work purposes. While this approach increased productivity and employee satisfaction, it also introduced security risks. The initial mobile device management (MDM) solution implemented by WildTangent was difficult to configure, had a non-intuitive user interface, and required frequent manual updates. Additionally, not all features were available on every mobile platform, making it an inefficient solution for the company's needs.
|
|
|
![]() |
Specialized Security Service, Inc. Discusses Their Strategic Partnership with Rapid7
As a Managed Security Service Provider, S3 needs to offer clients a security portfolio with the best tools and provide great value, all while maintaining a trusting relationship with the vendor. With attackers becoming more sophisticated, IT environments growing increasingly complex, and a shortage of skilled cybersecurity professionals, it’s no wonder that businesses are increasingly turning to Managed Security Service Providers (MSSPs) to ensure their security program stays current with industry best practices. The MSSP relationship offers a cost-efficient way to mitigate risk, combat threats, and keep pace with compliance regulations.
|
|
|
![]() |
US Naval Academy Alumni Association & Foundation Relies on Rapid7 UserInsight for Identifying Compromise and Risky User Behavior
In a non-profit organization, cost-effectiveness is essential. The USNA Alumni Association & Foundation needed to build a security architecture to protect personal information of alumni. Ken Kurz, the Director of Information Services, faced the challenge of managing an infrastructure that supports 70,000 living alumni without leveraging government resources. The primary concern was to ensure the security of personal information while operating within the constraints of a non-profit budget. Ken's extensive background in information assurance and high-level security engineering made him well-suited for the task, but the challenge remained significant due to the unique constraints of the non-profit sector.
|
|
|
![]() |
Rapid7 Nexpose Meets Carnegie Mellon University’s Requirements for Vulnerability Management, Co-Development and Higher Education Expertise
Carnegie Mellon University needed a vulnerability management solution that would scan its assets broadly and offer centralized control for close monitoring and analysis of security threats, as well as the ability to create and export customized reports.
|
|
|
![]() |
American Chemical Society Lauds Rapid7 Customer Support, Nexpose® Reporting Features
Shackerah, the primary user of Rapid7 Nexpose at the American Chemical Society (ACS), faced challenges in ensuring security holes were quickly plugged and handling PCI DSS compliance requirements. Initially using Qualys, the ACS team sought a new solution due to dissatisfaction with customer service. They needed a vulnerability management solution with robust reporting features, comprehensive vulnerability coverage, and excellent customer support.
|
|