Download PDF
CheckPoint Software > Case Studies > Enhanced Global Inter-Office Connectivity and Security: Bentley Systems Case Study
CheckPoint Software Logo

Enhanced Global Inter-Office Connectivity and Security: Bentley Systems Case Study

Technology Category
  • Cybersecurity & Privacy - Intrusion Detection
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • Construction & Infrastructure
  • National Security & Defense
Applicable Functions
  • Product Research & Development
Use Cases
  • Indoor Positioning Systems
  • Tamper Detection
The Challenge
Bentley Systems, a global leader in the development of engineering, design, and CAD software, faced a significant challenge in maintaining global inter-office connectivity and internet access without compromising security. The company, which has invested over $1 billion in research, development, and acquisitions since 1995, needed to protect its global corporate network without impacting its day-to-day software development business. This was particularly challenging given the wide range of old and new machines and operating systems used by Bentley Systems' developers to replicate customer environments. The company needed to block malicious malware and worms from traversing the network, deploy security in remote areas of the world, provide broad coverage in protecting application vulnerabilities, and quickly implement security for the IT infrastructure of acquired companies.
About The Customer
Bentley Systems, Incorporated is a global leader in the development of engineering, design, and CAD software. The company has a significant investment in research, development, and acquisitions, with more than $1 billion spent since 1995. Bentley Systems operates on a global scale, with 3,000 employees protected by 103 firewalls. The company's developers use a wide range of old and new machines and operating systems to replicate customer environments, making network protection a complex task. Bentley Systems is committed to maintaining business uptime while integrating databases and machines into their core security infrastructure, particularly during the integration of acquired companies.
The Solution
Bentley Systems turned to Check Point's IPS solution to address its critical security needs. The solution provided dependable intrusion protection from malicious attacks, blocking 10,000 attacks a month. It also allowed Bentley Systems to implement security in far-reaching worldwide locations with a limited staff. By leveraging the integrated software blade architecture, the company was able to avoid replacing or adding additional equipment, thus overcoming logistical challenges in remote areas of the world. Furthermore, the IPS solution facilitated the timely integration of acquisitions. With the IPS blade, security implementation for acquisitions was reduced to a 3-4 day process. The solution also offered preemptive security updates, seamless deployment, and ease of management, with SmartView Monitor providing visibility into day-to-day operations in far-removed offices.
Operational Impact
  • The implementation of Check Point's IPS solution has brought about significant operational benefits for Bentley Systems. The company now enjoys strengthened defense against malware and worms, and has been able to leverage its existing software blade infrastructure to implement a new IPS protection solution. The solution's ease of management has been particularly beneficial, with SmartView Monitor providing visibility into day-to-day operations in far-removed offices. The IPS blade has also simplified the process of integrating the IT infrastructure of acquired companies into Bentley Systems' core security infrastructure. Furthermore, the solution's seamless deployment and the ability to deploy patches during the day without affecting the core infrastructure have contributed to maintaining business uptime.
Quantitative Benefit
  • The IPS blade blocks 10,000 attacks a month
  • Security implementation for acquisitions is reduced to a 3-4 day process
  • Saved at least $80,000 by leveraging existing equipment

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.