Download PDF
CheckPoint Software > Case Studies > Regina Miracle Enhances Security with Check Point Harmony
CheckPoint Software Logo

Regina Miracle Enhances Security with Check Point Harmony

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Malware Protection
Applicable Industries
  • Equipment & Machinery
  • National Security & Defense
Applicable Functions
  • Product Research & Development
Use Cases
  • Inventory Management
  • Tamper Detection
The Challenge
Regina Miracle, a leading manufacturer of intimate wear, sportswear, and personal protective equipment, was facing a significant challenge in terms of cybersecurity. The company was experiencing an increasing number of phishing and malware attacks on its Office 365 users. The company's IT team was responsible for managing and securing more than 7000 endpoints and users, which was becoming increasingly difficult due to the rising number of attacks. The company had previously relied on Microsoft protection for its Office 365 Email solution and Trend Micro for endpoint security. However, these solutions were not keeping pace with the rapid increase in email phishing and malware attacks. The situation was further exacerbated by the pandemic, with phishing campaigns targeting webmail and SaaS applications becoming the most significant threat to the company.
About The Customer
Regina Miracle International Holdings Limited Group is a leading manufacturer of intimate wear, sportswear, and personal protective equipment. Founded in 1998, the company is globally recognized for its strong research and development capabilities. As an Innovative Design Manufacturer, Regina Miracle provides integrated services ranging from product concept design, material development, technology development, and specification design to production. The company is headquartered in Hong Kong, with research and development operations in Shenzhen, China, and production facilities in both China (Shenzhen) and Vietnam (Hai Phong and Hung Yen).
The Solution
In response to the escalating security threats, Regina Miracle evaluated potential solutions and decided to implement Check Point Harmony. The company was impressed by the capabilities of Check Point Harmony Email & Collaboration, which detects and blocks advanced phishing attacks across inbound and internal communications before they reach users. The solution also provides a high catch rate for malware and delivers clean files to users within 1.5 seconds. Additionally, it analyzes all historical emails to determine prior trust relations between senders and receivers, increasing the likelihood of identifying user impersonation or fraud. The company also implemented Check Point Harmony Endpoint, a complete security solution that protects users' PCs and laptops from threats including ransomware, phishing, and malware attacks. Both solutions are built on Check Point Infinity architecture, which combines real-time threat prevention, shared intelligence, and advanced security across networks, clouds, endpoints, and mobile devices.
Operational Impact
  • The implementation of Check Point Harmony has significantly improved Regina Miracle's security posture. The solution has effectively protected users from cyber threats across all attack vectors, including phishing attempts, malicious email attachments, and zero-day ransomware. The Infinity Portal, part of the Check Point solution, has greatly simplified day-to-day operations for the IT team by providing a single-pane view of all activity for proactive visibility across the environment. The team can now easily share policies, monitor endpoints and email activity, and access logs or security events. Furthermore, the solution's automated forensics capability monitors and records endpoint events, providing detailed forensic reports. As a result, the company is now confident that their security defenses can evolve with the ever-changing threat landscape.
Quantitative Benefit
  • Stopped threats from affecting over 7000 endpoints and users
  • Reduced time spent on security management and response
  • Delivers clean files to users within 1.5 seconds

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.