Download PDF
Christian Motorcyclists Association Organization Trusts Comodo’s Advanced Endpoint Protection Technology to Stay Malware Free
Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Malware Protection
- Cybersecurity & Privacy - Network Security
Applicable Industries
- Professional Service
Applicable Functions
- Business Operation
Services
- Software Design & Engineering Services
- System Integration
- Training
The Challenge
In an age of cyber criminals where social security numbers, financial records, and personal and business information all need to be protected and secured, companies and organizations are looking at new cybersecurity alternatives that focus on the prevention of attack, not just the detection when a virus or malware attack has happened. Fears of unknown malware attacks, such as zero-day and advanced persistent threats, have become some of the real-world challenges for the System IT Administrators at CMA. CMA’s main data center, which houses its critical information and business applications, was using a mixture of multiple antivirus and IT security detection solutions from various companies but was still experiencing frequent infections and viruses. The IT team was encountering rogue malware, Trojans, and viruses across its network, and clearing an average of three major IT security infections per week. On top of what the IT team was finding, they lived with the reality that an unknown rogue piece of malware might be lurking in their network, one they had yet to find, one which no antivirus or security system they had in place could find – until it might be too late.
About The Customer
Globally headquartered in Mena, Arkansas, the Christian Motorcyclists Association (CMA) is a non-profit, evangelistic organization which outreaches primarily, but not exclusively, to the motorcycling community. CMA’s vision is “Changing the world, one heart at a time,” a vision carried out with a servant’s attitude to the world and to its members saying they are here if you need them. CMA celebrated its 40-year anniversary in 2015. What started in 1975 as one man on a motorcycle with a willingness to obey God has grown into a worldwide ministry with thousands of members and chapters across the USA and outreaches in more than 30 countries worldwide. Like most organizations and companies across the world today, CMA keeps all of its critical information in the cyber world, through its network and computer systems. This includes confidential and restricted information like global and regional memberships, donation records, accounts receivable and payable, and additional confidential information only intended for the eyes of its members and affiliates. CMA members and leadership are continuously using email, web portals and social media across landline, Ethernet and WiFi hotspots. All of this key information is utilized and leveraged by the leadership and IT team across its networks where it can be shared, collaborated on, and maximized by the teams, in the spirit of CMA’s mission.
The Solution
With various endpoints and disparate IT security systems in place, CMA researched alternative cybersecurity companies that could deliver on two core needs for the Association: manageability of endpoints from a single console and the ability to protect endpoints from infection – both from known and new, unidentified threats. Against these criteria, CMA evaluated Symantec, Kaspersky, McAfee, Bitdefender, Trend Micro, Avast, and Comodo based on their own internal research to try and understand what would be the best option for their needs. In the end, Comodo Advanced Endpoint Protection was selected as the choice for CMA. Comodo Advanced Endpoint Protection provides total protection against zero-day and advanced persistent threats while having no impact on CMA’s end-user experience or any of their workflows. Any untrusted or unknown applications that are started by CMA’s users are automatically contained in a secure environment, allowing all safe applications the freedom to run while denying all malware access to the system which they require to deliver their payloads, and attack an IT environment. The Comodo Advanced Endpoint Protection solution is built upon a next generation, Default Deny platform which blocks and isolates unknown, zero day attacks of malware, spyware, Trojans and other harmful executables - and renders those attacks useless against endpoints and networks. Comodo has unified its endpoint security solution and enterprise class device management - including Comodo Endpoint Security Manager and Comodo Device Manager – into Comodo Advanced Endpoint Protection. The foundation of Comodo Advanced Endpoint Protection is Comodo Client, which includes antivirus, firewall, web URL filtering, host intrusion prevention, containment and file reputation, and Comodo ITSM, which allows for the configuration of the security policies and visibility into the security infrastructure of enterprise endpoints through solutions such as mobile device management and remote monitoring and management.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
UBM plc: Taking the pulse of the business and engaging employees with a far-reaching strategic transformation
UBM, a leading global events business, was undergoing a significant strategic transformation named 'Events First'. As part of this transformation, the company was preparing to complete the largest acquisition in its history - Advanstar, a US-based events and marketing services business valued at more than USD970m. The company faced the risk of human capital flight if it was unable to effectively engage top talent with the new strategic direction. UBM needed to make significant structural, process and systems changes, uniting its previously autonomous regional businesses. The challenge was to ensure all of its employees were engaged and aligned with the new future vision.
Case Study
Wittmann EDV-Systeme launches IT monitoring services
Small and medium-sized businesses often lack the know-how and resources required for thorough IT system monitoring. Wittmann EDV-Systeme wanted to launch a solution to plug the gap – enabling it to improve its own competitiveness and that of its customers. IT landscapes are becoming ever more complex and outsourcing is gaining popularity, IT systems must nonetheless remain easy-to-use and extremely reliable at all times. Automated, round-the-clock system monitoring therefore represents an immensely valuable proposition for companies: downtime for business-critical applications can be avoided, and IT systems remain available at all times.
Case Study
Uncovering behavioral insight to help reward and retain the best employees
The HR services company, an IBM client, was facing the challenge of understanding the factors underlying personal employment choices. They wanted to offer their clients unprecedented insight into what motivates employees and prospective job candidates. However, their existing systems were not capable of handling the surging data volumes collected from a wide range of different data sources. With the total volume likely to keep on growing, the firm looked for a solution that could meet current needs and scale to meet tomorrow’s demands.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Flex Contact Center: Supporting rapid business growth with IBM Connections Cloud and IBM Verse
Flex Contact Center, a professional services company offering telesales, call-center, anti-attrition, back-office, helpdesk and collection services, has grown rapidly since its establishment in 2009. With operations in 12 sites across two states and four cities in Brazil, the company employs more than 11,000 people. However, the company realized that to prevent barriers to future expansion, it was essential to make it as easy as possible for its people to work together effectively—even if they were based in separate geographical locations. Traditional approaches to collaboration—based on email and phone calls—threatened to reduce productivity. Flex Contact Center wanted to enable better collaboration and communication across its workforce, but did not want to make large investments in infrastructure.
Case Study
PureFluent: Connecting to partners and customers through the cloud for enhanced productivity
PureFluent, a translation services company, was facing challenges in managing its translation and document review processes. The company often received files in uneditable formats from customers, which required staff members to transfer text to word processing or spreadsheet documents. During the translation process, maintaining version control was a challenge because PureFluent sent work to hundreds of translators in multiple geographic locations. It was also time-consuming for staff to manage the large volume of emails and FTP transactions required to submit translations for customer review and ensure the integration of requested changes. Furthermore, staff were spending significant time hunting through their emails for specific attachments.