Download PDF
CheckPoint Software > Case Studies > Enhancing Endpoint Security at Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works
CheckPoint Software Logo

Enhancing Endpoint Security at Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Networks & Connectivity - 5G
Applicable Industries
  • Equipment & Machinery
  • National Security & Defense
Applicable Functions
  • Quality Assurance
Use Cases
  • Inventory Management
  • Tamper Detection
Services
  • System Integration
The Challenge
Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works, a manufacturer of heavy machinery that provides water and electricity, faced significant challenges in securing their network of 8,500 PCs against emerging security threats. The company was struggling to stop business disruption from attacks targeting OS vulnerabilities and protect its intellectual property from leaking through security gaps. The factory needed a unified solution that could provide automatic security updates, enforce compliance, maintain connectivity and business continuity while controlling endpoint access to the network, and protect the network against external infections and loss or theft of confidential intellectual property through unauthorized communication programs.
About The Customer
Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works is a manufacturer of heavy machinery that provides water and electricity. The company exports its products, including gas, thermal, and nuclear turbines, to 40 countries. It employs 3,700 people in Takasago-shi, Hyogo-ken, Japan. The company has a network of 8,500 PCs installed at the factory that needed protection against emerging security threats. The company was looking for a solution that could provide automatic security updates, enforce compliance, maintain connectivity and business continuity while controlling endpoint access to the network, and protect the network against external infections and loss or theft of confidential intellectual property.
The Solution
The company chose Check Point's Endpoint Security solution to address their security concerns. The solution offered comprehensive endpoint security with over 10 integrated security capabilities including Full Disk Encryption, Media Encryption and Port Protection, Firewall, and Anti-Virus. It provided superior endpoint protection against external threats and vulnerabilities, simplified OS updates execution, and had the ability to update and examine virus definition files for antivirus software. It also offered centralized management & central configuration policy and the ability to monitor and control communication programs to prevent confidential information loss. The solution was more cost-effective than a DCHP-server based solution and saved IT administrators over 360 hours per month.
Operational Impact
  • The implementation of Check Point's Endpoint Security solution significantly improved the security of Mitsubishi Heavy Industries, LTD. - Takasago Machinery Works. The solution provided automatic Windows security updates of virus definition files on all PCs, inspected and quarantined all unpatched PCs on the network until updates were made, and offered hard drive encryption and media encryption port protection. The solution also provided unified management, with all PCs operating under quarantine policy and Active Directory integration with Endpoint Security providing granitary control over a variety of user environments. The solution was more cost-effective than a DCHP-server based solution and saved IT administrators over 360 hours per month.
Quantitative Benefit
  • In the two years following solution deployment, approximately 30,000 communication programs were detected, and 250 unauthorized programs were eliminated.
  • Infected PCs were found before the delivery of definition files, and further spread of infection was prevented before causing network downtime.
  • IT administrators no longer have to check PCs one by one, saving more than 360 hours a month.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.