Download PDF
HRI Properties Real Estate Development Firm Uses Comodo’s Containment Technology to Protect and Secure Its Data
Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Malware Protection
- Cybersecurity & Privacy - Network Security
Applicable Functions
- Business Operation
Use Cases
- Intrusion Detection Systems
Services
- Cybersecurity Services
- System Integration
The Challenge
HRI Properties, a full-service real estate development company based in New Orleans, Louisiana, faced significant challenges in protecting its critical data. The company had a mixture of multiple antivirus solutions from different vendors, which led to occasional malware outbreaks and major interruptions. The lack of centralized management and visibility into each endpoint's antivirus software was extremely troubling, as it prevented HRI from proactively addressing new risks. HRI needed a new security solution that could manage multiple endpoints from a single console, provide reports on endpoint status and activity, and protect endpoints from new, unidentified, and unknown threats.
About The Customer
HRI Properties (HRI) is a full-service real estate development company based in New Orleans, Louisiana. The company is a national leader in the adaptive reuse of historic structures and has completed 70 large-scale projects with a total funding value of $2 billion. These projects include 5,114 apartment units, 4,116 hotel rooms, and over 1,300,000 square feet of office and retail space. HRI's mission is to revitalize cities by creating diverse, vibrant, and sustainable communities. The company keeps all its critical information online, including restricted information such as contracts, permits, zoning rules, regulations, ordinances, and budgets, which need to be protected and secured from malware and service interruptions.
The Solution
HRI Properties evaluated several security solutions, including Symantec, Kaspersky, McAfee, and Comodo. Ultimately, Comodo's endpoint security solution was selected due to its streamlined dashboard, implementation process, and multiple layers of defense. Comodo Endpoint Security Manager (ESM) 3.4 software offers seven layers of defense, including antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation, and virus scope (behavioral analyzer). Comodo's patent-pending automatic containment technology eliminates malware outbreaks by running untrusted processes in a secure environment. The Comodo ESM dashboard provides panoramic insight and control over all aspects of endpoint protection and management, displaying 14 critical metrics at hundreds of endpoints. This facilitates rapid alerting and remediation of issues, allowing administrators to terminate processes, stop or start services, uninstall applications, and delete unwanted files without interfering with end users.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Protecting a Stadium from Hazardous Materials Using IoT2cell's Mobility Platform
There was a need for higher security at the AT&T Stadium during the NFL draft. There was a need to ensure that nuclear radiation material was not smuggled inside the stadium. Hazmat materials could often be missed in a standard checkpoint when gaining entry into a stadium.
Case Study
Visual Management on Gas Tankers
Gas tankers are massive ships with a limited crew, making them extremely difficult to monitor. Video surveillance systems, which use a large number of widely distributed devices, and fire prevention systems are both crucial elements of a gas tanker monitoring system.The system used for this application is a legacy analog CCTV surveillance system that is completely independent from the main monitor and control SCADA system. With this system, the administrator responds to an event by first using the SCADA system to locate the event, and then accesses the appropriate surveillance camera from the CCTV system to view the location. The goal is to upgrade the system so that only one step is required. This is done by integrating the CCTV surveillance system into the SCADA system, in which case the surveillance system becomes a SCADA sub-system, making centralized control and monitoring possible.System Requirements- Upgrade to an IP video surveillance system for integration with the existing SCADA system- Live video display (through the SCADA system)- Enable events in the SCADA system to automatically trigger live video display- All the devices need to be of rugged design and have an anti-explosion defense
Case Study
EMC's Transition to SMS for Real-Time IT Alerts
EMC, a global leader in cloud computing, data storage, and data virtualization, was struggling with an inefficient and slow method of alerting its 68,000 employees about IT system updates. The traditional method involved drafting an email, proofing it, getting approval from several stakeholders, and finally sending it. This process was not only labor-intensive but also unreliable as it depended on the user's email being unaffected and the user actually opening and reading the email. After sending 1.2 million alert emails in a single month, EMC decided to find a more efficient and immediate way to alert employees. The challenge was to find a solution that was not only faster and less labor-intensive but also globally available and scalable to EMC's needs.
Case Study
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.
Case Study
Data and Technology Company Acxiom Enhances Customer Data Protection with Fortinet
Acxiom, a company that designs and delivers customer intelligence solutions, is heavily invested in digital technology. With a business built on the ethical use of data, Acxiom faces the challenge of constantly evolving security threats. The company needed to ensure the protection of its customer data and insights into customer behavior. The challenge was to find a partner that could provide cutting-edge and next-generation technologies to keep up with the ever-changing threat landscape. Acxiom required a solution that could not only defend against attacks but also align with the different changes in the threat landscape.
Case Study
Experity's Security Operations Scaling with Rapid7 Managed Services
Experity, a dynamic Health Information Technology company, was formed from the merger of the two largest urgent care Electronic Medical Records (EMR) companies in the country. The merger led to a rapid expansion of personnel, office locations, software, and services, creating unique challenges for the security team. The team was tasked with protecting the company from loss events of any kind, requiring business continuity and standardization. The small security team was overwhelmed with the task of managing security operations and building resilience in their security program. The company's growth also meant that the security team needed a platform to vet alerts from the increasing number of employees and contractors. The existing Managed Detection and Response (MDR) platform was inadequate as it only monitored network and server activity and not endpoint activity.