Download PDF
Forcepoint > Case Studies > Freight Giant Uncovers Breach with Next-Gen CASB
Forcepoint Logo

Freight Giant Uncovers Breach with Next-Gen CASB

Technology Category
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • Transportation
Applicable Functions
  • Logistics & Transportation
Use Cases
  • Cybersecurity
Services
  • Cybersecurity Services
The Challenge
The multi-national transportation company was undergoing their annual audit when they decided to use Bitglass to catalog Shadow IT cloud apps on their network for their annual compliance report. The auditors uploaded two weeks of firewall logs, approximately 2M log lines per day, for Bitglass to analyze. The Bitglass Breach Discovery Engine identified four high-risk cloud apps widely used on the network: YouTube, MSN, Facebook, Dropbox, and Evernote. The company had previously blocked Gmail and Yahoo due to security concerns. These cloud apps were a compliance risk and merited mention in the annual audit. However, the Bitglass Breach Discovery Engine also uncovered a TOR (The Onion Router) node operating within the corporate network, which was a significant security concern.
About The Customer
The customer is a multi-national transportation company. They are a large enterprise with a significant network that handles millions of log lines per day. The company has a robust security system in place, including firewalls and blocked access to certain high-risk apps like Gmail and Yahoo. However, they were unaware of the presence of other high-risk apps on their network, including YouTube, MSN, Facebook, Dropbox, and Evernote. Furthermore, they were unaware of a TOR node operating within their network, which posed a significant security risk. The company conducts annual audits to ensure compliance and identify potential security risks.
The Solution
The solution provided by Bitglass was their Breach Discovery Engine. This tool was able to analyze the company's firewall logs and identify high-risk cloud apps being used on the network. These apps were a compliance risk and were included in the annual audit report. More importantly, the Breach Discovery Engine uncovered a TOR node operating within the corporate network. This was a significant security risk, as TOR is often used for criminal enterprise. Once the TOR node was identified, the company was able to take swift action to remediate the issue. They used the diagnostics from the Bitglass Breach Discovery report to track down the breached device. The company also upgraded to next-gen firewalls to improve visibility and security.
Operational Impact
  • The company was able to identify and block high-risk cloud apps on their network.
  • The company discovered a TOR node operating within their network and was able to remove it.
  • The company upgraded to next-gen firewalls to improve network visibility and security.
Quantitative Benefit
  • The company was able to reduce their compliance risk by identifying and blocking high-risk cloud apps.
  • The company was able to improve their network security by identifying and removing a TOR node.
  • The company was able to improve their network visibility by upgrading to next-gen firewalls.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.