Download PDF
CheckPoint Software > Case Studies > TopRx Ensures Business Continuity with Check Point Harmony Endpoint
CheckPoint Software Logo

TopRx Ensures Business Continuity with Check Point Harmony Endpoint

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Networks & Connectivity - Gateways
Applicable Industries
  • National Security & Defense
  • Pharmaceuticals
Use Cases
  • Supply Chain Visibility
  • Tamper Detection
Services
  • Cybersecurity Services
  • System Integration
The Challenge
TopRx, a leading national supplier of generic pharmaceuticals, over-the-counter drugs, vitamins, and home health products, faced a significant challenge in extending robust protection to remote endpoints. The company needed to enhance its security posture with better visibility into threats and simplify endpoint security management. The COVID-19 pandemic forced employees to work from home, and TopRx needed to extend protection to their systems. The company's priority was ensuring nonstop operations, and a strong security posture was integral to this goal. Until the pandemic, most of the company's users and endpoints were on premises, defended behind Check Point Next Generation Security Gateways. The challenge was to find a solution that could provide continuous protection for all endpoints, whether on or off the corporate network, and proactively detect, identify, and remediate threats.
About The Customer
TopRx is a leading national supplier of generic pharmaceuticals, over-the-counter drugs, vitamins, and home health products. The company distributes these products from 90 manufacturers to more than 7,000 pharmacies in 50 U.S. states. As an Authorized Distributor of Record (ADR), the company provides customized services and outstanding support for its customers and manufacturing partners. TopRx is based in Memphis, Tennessee with sales offices and remote employees across the U.S. The company's priority is ensuring nonstop operations, and a strong security posture is integral to this goal.
The Solution
TopRx chose Check Point Harmony Endpoint as the solution to their challenge. Harmony Endpoint is a complete endpoint security solution built to protect remote workforces from cyber threats. It prevents ransomware, phishing, and drive-by malware from affecting endpoints while minimizing breach impact with autonomous detection and response. The TopRx team reports that deployment was fast and easy. They packaged Harmony Endpoint capabilities to implement the specific protections needed for their desktop systems, laptops, and servers. Using the built-in deployment policies, the team protected all endpoints in about two days. Harmony Endpoint's powerful anti-ransomware features provide full attack containment and remediation to quickly restore any infected systems. Anti-ransomware capabilities create small backups of users' files as they work. If the software detects ransomware starting to encrypt files, it kills the encryption process and instantaneously recovers files that would have been lost.
Operational Impact
  • The implementation of Check Point Harmony Endpoint has resulted in several operational benefits for TopRx. The company's remote employees are staying safely connected to the resources they need for serving customers and partners. Harmony Endpoint's VPN and compliance features not only keep users protected, they also help ensure that threats don't enter the corporate network through endpoints. Daily threat hunting allows the team to proactively monitor traffic from endpoints to servers for unusual behaviors. Integration with the MITRE ATT&CK® Framework delivers additional visibility and guidance for mitigating any suspicious events. The solution's effectiveness and Check Point support have been key to strengthening the TopRx security posture. Cloud management makes upgrades and everyday use seamless. Integration with the Check Point Infinity architecture delivers fantastic visibility and advanced capabilities that TopRx couldn't find with other solutions.
Quantitative Benefit
  • Protected all endpoints in about two days
  • Continuous protection for all endpoints whether on or off the corporate network
  • Proactively detect, identify, and remediate threats with awareness of suspicious tactics, techniques, and procedures

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.