Customer type
A manufacturing company operating in the field of light engineering and a service network of nine branches in the Czech Republic and Slovakia, with more than 200 employees and an annual turnover of over 500 million CZK.
What situation did he deal with
The customer is currently using our Anti DDoS management services and is looking for a suitable solution to protect endpoint devices across the company. The variety of accesses via fixed and mobile devices have repeatedly caused holding attacks on endpoint devices despite anti-virus and anti-spam security. It was therefore looking for a tool to unify the different levels of protection used at headquarters and on the branch network applicable to employees’ PCs, laptops and mobile phones.
What we helped with
We mapped the current settings and proposed a structure of measures that meet the customer’s expectations, including the design of the implementation of security for fixed and mobile devices. The customer then implemented a solution with central management and features beyond the originally required antispam and antivirus. Within two months, we then implemented the new solution throughout the organization, including employee training.
What the solution brought
By securing employee endpoints with a combination of central management and individual device protection, the incidence of known and unknown malware on the corporate network has dropped dramatically. Web traffic is continuously monitored and so are downloads. Sensitive company data is significantly protected, even in the event of infiltration, loss or theft of sub-devices.
Benefits of implementing information risk management
- Set up central management of device protection in offices, branches and the field
- Secure endpoint access to sensitive corporate data
- Protect against attacks on endpoints, including mobile devices
- Clear monitoring of your organisation’s protection against phishing, malware and ransomware
- Prevention of zero-day attacks via employee email communications
- Unification of sub-levels of security under a single monitoring of traffic and status of endpoint devices