Download PDF
CyberArk > Case Studies > Securing Sensitive Legal Information: A Case Study on TRT8's Use of CyberArk
CyberArk Logo

Securing Sensitive Legal Information: A Case Study on TRT8's Use of CyberArk

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Malware Protection
Applicable Industries
  • Cement
  • National Security & Defense
Applicable Functions
  • Maintenance
  • Quality Assurance
Use Cases
  • Cybersecurity
  • Tamper Detection
Services
  • Cybersecurity Services
  • System Integration
The Challenge
Tribunal Regional do Trabalho da 8ª Região (TRT8), a judiciary body in Northern Brazil, was facing a surge in cyber attacks, a situation that was particularly concerning given the sensitive nature of the data they handle. The organization had recently digitized its court case management system, making all information related to court procedures, including highly sensitive personal information about individuals involved in employment disputes, digital. Despite having a robust security strategy, TRT8 had little control over users and passwords with access to this information, and privileged access was decentralized. Enforcing security information policies such as regularly changing and updating passwords was a manual and time-consuming process. Endpoint protection relied on a basic anti-virus tool, leaving the organization vulnerable to viruses or malicious attacks that could disseminate throughout the network and harm court operations.
About The Customer
Tribunal Regional do Trabalho da 8ª Região (TRT8) is a judiciary body located in Northern Brazil. It is tasked with resolving employer and worker employment relationships in the states of Pará and Amapá. The organization is based in Belém, the capital of Pará state. TRT8 adjudicates on issues related to employment such as workers’ rights, disputes, and unions. The organization has 1,800 employees and is responsible for a significant amount of highly sensitive personal and legal information, particularly as it has recently digitized its court case management system.
The Solution
TRT8 turned to CyberArk to build a strong Identity Security infrastructure. Using CyberArk Endpoint Privilege Manager and CyberArk Privileged Access Manager (PAM) Self-Hosted, TRT8 was able to centralize and automate control over access to over 200 servers by centrally managing privileged accounts and rotating passwords. CyberArk integrates seamlessly with Microsoft Active Directory to automatically monitor users mapped to TRT8 multifactor authentication servers. CyberArk Endpoint Privilege Manager was deployed on all 2,500 endpoints, providing a solid endpoint security foundation. This Defense-In-Depth approach allowed TRT8 to enforce least privilege on the endpoints, actively defend credentials stored within the operating system and third-party applications, provide reliable protection from ransomware, and maintain visibility and control over the entire endpoint infrastructure. The solution was deployed using CyberArk Customer Success Manager and CyberArk Consulting Services, with support from IT Protect, CyberArk’s business partner.
Operational Impact
  • The implementation of CyberArk has made TRT8 one of the least vulnerable to attacks and one of the best protected regional justice organizations in Brazil. The number of incidents dropped dramatically, freeing up staff to work on more important, productive and added-value work. The organization is now better positioned to meet and comply with tough government data and identity protection regulations. Access to the CyberArk ecosystem has also been beneficial, providing TRT8 with monthly support and access to the knowledge, experiences, and expertise that CyberArk offers. With CyberArk in place, TRT8 is better poised to operate safely and protect the community and employees it serves.
Quantitative Benefit
  • Centralized and automated control over access to over 200 servers
  • Deployed CyberArk Endpoint Privilege Manager on all 2,500 endpoints
  • Significant reduction in time and effort spent firefighting security incidents

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.