Download PDF
CheckPoint Software > Case Studies > Ultima Enhances Mobile Security with Check Point Capsule Cloud
CheckPoint Software Logo

Ultima Enhances Mobile Security with Check Point Capsule Cloud

Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Malware Protection
Applicable Industries
  • Equipment & Machinery
  • National Security & Defense
Use Cases
  • Supply Chain Visibility
  • Tamper Detection
Services
  • Cloud Planning, Design & Implementation Services
  • System Integration
The Challenge
Ultima Business Solutions, a UK-based IT services provider, faced a significant challenge in protecting its employee laptops from zero-day malware and suspicious sites and applications when used outside the company's security perimeter. The company had a 'cloud-first' secure cloud migration program, but lacked comprehensive visibility into threats on laptops used outside the perimeter. The challenge was further compounded when employees were in the field, as the security team had no visibility into these devices. Moreover, users were often unaware if their devices were under attack, as there were few obvious symptoms.
About The Customer
Ultima Business Solutions is a UK-based company that provides end-to-end IT services and solutions to customers. The company has a 'cloud-first' focus, helping customers securely migrate to the cloud with best-of-breed technologies, consulting, and managed services. This allows their customers to focus on their core businesses. Ultima uses new solutions and technologies itself before recommending them to its customers, a strategy that has paid off over the past 25 years as customers repeatedly turn to Ultima as their trusted advisor. Ultima is also a Check Point partner and uses Check Point firewalls, endpoint security solutions, and other technologies to secure its own business, as well as its customers’ organizations.
The Solution
To address this challenge, Ultima's Chief Technology Officer, Colin Prime-Moore, and the security team chose Check Point Capsule Cloud to extend their existing on-premises Check Point capabilities to all Windows and Mac devices not attached to internal systems. Check Point Capsule Cloud provides network perimeter security as a cloud service, inspecting laptop traffic for zero-day malware, filtering for inappropriate sites and content, and enforcing and logging policies. This solution gave Ultima always-on, always-updated protection for users off the company network. After conducting a proof of concept with Capsule Cloud, Ultima immediately found viruses, began blocking malicious sites, and analyzing suspicious files on the company’s mobile devices. It deployed Capsule Cloud through Microsoft System Center Configuration Manager and gained immediate, centralized visibility into all covered devices.
Operational Impact
  • The implementation of Check Point Capsule Cloud has brought significant operational benefits to Ultima. The solution has been integrated with Ultima's existing Check Point solutions, centralizing management and providing complete visibility into devices when they are outside of the office security perimeter. A single security policy now seamlessly protects both on-premises and mobile devices. Capsule Cloud prevents mobile devices from downloading suspicious files, blocks access to malicious websites, and keeps bots from damaging laptops. Alerts notify the security team when it identifies a high-risk file or event. Furthermore, Ultima is implementing an internal initiative to unify workspaces, applications, and teams to further empower users. With Capsule Cloud and other mobile security and rights management solutions, Ultima is embracing greater openness while significantly reducing risk.
Quantitative Benefit
  • Ultima immediately found viruses on mobile devices during the proof of concept with Capsule Cloud.
  • Ultima began blocking malicious sites on mobile devices after deploying Capsule Cloud.
  • Ultima gained immediate, centralized visibility into all covered devices after deploying Capsule Cloud.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.