Download PDF
Forcepoint > Case Studies > Global Telecom Giant deploys Next-Gen CASB
Forcepoint Logo

Global Telecom Giant deploys Next-Gen CASB

Technology Category
  • Cybersecurity & Privacy - Cloud Security
Applicable Industries
  • Telecommunications
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cloud Planning, Design & Implementation Services
  • Cybersecurity Services
The Challenge
The international telecom conglomerate was facing a pressing concern of data breaches despite having all the latest security gear. Their customers were finding breaches impossible to prevent and were looking to the telecom giant for help. The CTO and his team set out to evaluate the spectrum of early breach detection products on the marketplace. They first considered APT appliances, but quickly ruled them out as they could not scale to the high levels of traffic experienced by the firm’s clients. Next, the team considered various SIEM apps, but those required a huge amount of manual oversight from trained professionals to monitor the overwhelming number of alerts generated.
About The Customer
The customer is an international telecom conglomerate that offers managed network and security services worldwide to Global 2000 enterprises. As data breaches have become a pressing concern in the boardroom at every enterprise, the firm’s customers were looking to it for help. Despite having all the latest security gear, customers were finding breaches impossible to prevent. Hence the telecom giant went looking for security solutions capable of early detection.
The Solution
The team evaluated CASB discovery solutions which led them to Bitglass. The firm found many CASB vendors’ Shadow IT-focused discovery solutions to be inadequate, missing the greatest threats to data security. It quickly became clear that only Bitglass delivers a single solution that identified data breach risk from malware, TOR networks, anonymizers, phishing, and unauthorized cloud app usage. Bitglass Breach Discovery is an elastic, multi-tenant solution that can digest logs from any leading firewall to identify and rank high-risk outflows. The system uses over 60 threat feeds, combining both proprietary and open data sources for malware, TOR networks, anonymizers, phishing, and cloud applications.
Operational Impact
  • The firm was able to provide a solution to its customers that identified data breach risk from malware, TOR networks, anonymizers, phishing, and unauthorized cloud app usage.
  • The solution was able to digest logs from any leading firewall to identify and rank high-risk outflows.
  • The system uses over 60 threat feeds, combining both proprietary and open data sources for malware, TOR networks, anonymizers, phishing, and cloud applications.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.