实例探究.

我们的案例数据库覆盖了全球物联网生态系统中的 19,090 家解决方案供应商。
您可以通过筛选条件进行快速浏览。

筛选条件
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • 查看全部
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • 查看全部
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • 查看全部
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • 查看全部
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • 查看全部
  • 查看全部 15 技术
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • 查看全部 42 行业
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • 查看全部 13 功能区
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • 查看全部 127 用例
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • 查看全部 9 服务
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • 查看全部 733 供应商
Selected Filters
19,090 实例探究
Cheshire and Merseyside Commissioning Support Unit: Improving Service Delivery with Secure Remote Support
Cheshire and Merseyside Commissioning Support Unit (CMCSU) was formed through the merger of several previous organisations. It provides support for over 20,000 NHS staff across the region, including clinical staff at 12 CCG organisations, two area teams for the National Commissioning Board and a range of social care, public health and community care professionals. Overall, it is responsible for supporting 11,000 devices in 218 different locations. These mergers provided a great opportunity to re-evaluate approaches and strategies for support and service delivery. The CMCSU team decided to move over to a hybrid model for support where calls could be handled in volume while the amount of time spent on resolution could also be improved. This meant a change in approach, and a more strategic role for remote support. This involved commissioning a new remote support product as part of the change.
Brazil’s Credit Union SICREDI Selects BeyondTrust’s Retina Scanner to Tame its Network Security Issues
SICREDI, a credit union in Brazil, was facing a challenge in maintaining its network security. Despite having robust perimeter security, the credit union lacked advanced security tools. They needed to gain insight into specific security incidents, assess network and endpoint vulnerabilities, and determine which incidents and vulnerabilities were the most risky. They also needed to develop a deeper understanding of their changing network and the security needed to protect it. The credit union's internal network had grown from a few servers and workstations to a sprawling environment that IT had lost control over. They needed a solution that could help them regain control and automate some of the cumbersome IT tasks contributing to network sprawl, increasing vulnerabilities, and security blind spots.
Improving the End User Experience with Secure Remote Support
When Gene Glekel joined Cresa as National Director of Infrastructure, he wanted to improve security and the user experience throughout the company when it came to remote support. At that time, the company’s support representatives were using a cloud-based remote support tool. Glekel saw a number of disadvantages with this tool for both the support reps and the end users. The existing tool required installing a resident agent on the user’s machine before providing remote support. The support reps experienced difficulty managing the computer’s administrative rights to enable remote support. Establishing the remote support session required end users to perform a sequence of time-consuming tasks on their machine. Latency and instability in the connection were also frequent problems. Additionally, if a machine needed rebooting, the cumbersome process of working with the end user to establish a connection had to be performed all over again. Security was another concern. The resident agent used by the SaaS solution lacked adequate security because it was constantly in ‘listening mode’ and therefore vulnerable to brute force and social engineering attacks.
BeyondTrust Protects High School from Dangerous Computing Activities
Bishop Verot Catholic High School in Fort Myers, Florida provides students with a number of PCs that they can use to complete home work or conduct research. The trouble is that even in the controlled environments of the library and computer labs, students’ online activities can’t be that closely supervised. There aren’t an unlimited number of teachers to watch over their shoulders, after all. At the beginning of each year, students have to sign an acceptable use agreement, which says that they’ll only use computing resources for school purposes. But teens will be teens, and they’ll do their best to challenge authority. Antivirus and Web filtering software give the school some protection and control, but students are savvy and would prefer to have unfettered access to the Internet. “After we installed Web filtering, students began using proxies,” said Jason Castaldo, Bishop Verot’s systems administrator. “ We needed more sophisticated security just to keep up with their workarounds.” Bishop Verot also had to protect the network from malware. No matter how much security training you offer, every IT person knows that end users are still the weakest link in the security chain.
Support for Remote Clients Raising the Bar at CSC
CSC, a global leader in providing technology-enabled business solutions and services, faced several challenges in its help desk operations. The company's clients are geographically dispersed, leading to language and cultural barriers. The company also had to support multiple platforms and comply with various federal security and privacy regulations due to its clients being in highly-regulated industries such as government, healthcare, and banking. Previously, CSC used a combination of applications to access certain client desktops. However, many of these tools did not provide the required encryption needed to connect securely, and they either did not have sufficient logging and reporting capabilities for auditing or created disconnected silos of reporting data.
Central Florida Educators Federal Credit Union Switches to PowerBroker Endpoint Protection Platform
The Central Florida Educators Federal Credit Union (CFE) was having problems with its endpoint security. Their existing endpoint security from Symantec was causing problems. First, CFE end users noticed that their machines were increasingly slow. A quick check of the Task Manager showed high CPU usage tied to Symantec. Next, when the software was updated, old installations often failed to uninstall and created software conflicts, with many unrelated applications failing to work. Finally, Symantec burdened end users with alerts and false alarms. For a small IT staff, these constant problems took too much time away from other IT projects. For instance, CFE is in the process of rolling out a desktop virtualization effort. At one of CFE’s smaller branches, they have already installed dumb terminals connected back to hosted desktops, but constant security troubleshooting has kept them from being as far along on this project as they would like.
Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants
Comprehensive Computer Solutions, Inc. (CCS) provides computing solutions for industrial applications, with a significant customer segment in the energy sector. After the 9/11 attacks, CCS was asked by its customers to evaluate security. Prior to this, most of their customers relied solely on perimeter security and proprietary communications channels, which were deemed insufficient post 9/11. CCS's main offering for the energy sector is software that controls the various systems and equipment that generate and deliver electricity. They needed to find a security solution that they could package with their own offerings. The solution needed to be flexible enough to work with Human-Machine Interfaces (HMIs), cost-effective, easy to use, and have a customizable front-end to match the specific needs of power plant IT personnel.
Assuring Security and Better Customer Support for Every Environment
Eat’n Park Hospitality Group, a franchise with 75 locations and operating in 150 locations with approximately 10,000 employees, was seeking a solution to improve IT support for users and address growing concerns about data security in the payment card industry (PCI). The company wanted to centralize support for the company’s users, provide high level security with multiple authentication mechanisms and enable the IT support team to establish connections with and monitor devices 24 hours a day. The company also wanted a solution that would integrate within the company’s data center and network infrastructure.
Mobile Knowledge Stretches Their Security Budget with PowerBroker Endpoint Protection Platform
Mobile Knowledge was in search of a new security solution that could provide comprehensive protection without breaking the bank. They were dissatisfied with large security suites, such as those from McAfee and Symantec, as they found them to be more focused on profit than privacy. These suites often segmented different types of protection and sold them separately, forcing users to purchase multiple products to ensure complete protection. This was not only costly but also forced companies to prioritize their risks and protect against only the most immediate threats. The company was also looking for a solution that offered superior protection against zero-day attacks.
Healthcare POS Vendor Writes Prescription for Secure Support with Appliance-Based Remote Support Solution
Emporos Systems’ support team faced a dual challenge. Firstly, they required a remote support system that could provide the highest level of security. As a technology vendor to pharmacies and other healthcare sites, Emporos’ support infrastructure had to be fully compliant with patient privacy regulations like HIPAA and credit card data regulations (e.g. PCI DSS). Their previous remote support solution and many of the solutions they evaluated only offered static password capabilities. This wasn’t acceptable as a majority of Emporos’ support is delivered while client business transactions are happening. To meet security standards, Emporos needed a solution that could support its RSA security technology, which updated passwords every minute. Secondly, the Emporos Systems support team required a solution that would provide access to support systems from home or work, as well as the ability to manage multiple support sessions. With a team supporting multiple time zones and receiving dozens of support calls a day, this level of flexibility was required to keep support costs low and service levels high.
Sallie B. Howard School for the Arts Removes the Risk Behind Internet Browsing
The Sallie B. Howard School for the Arts and Education (SBH) was struggling to keep up with the integration of technology in education. As students relied more heavily on computers and the Internet, teachers and administrators noticed much of the activity wasn’t school-related. The existing security was not keeping in lock step with the way students were using the Internet. Viruses had slipped through, and non-education related sites were seeing heavy traffic. Even with URL blocking in place, a supposedly trusted site could be compromised and contain malicious code. A new and inappropriate site could fall through the cracks, not yet blacklisted. Technically-savvy students had already found ways to bypass the school’s defenses.
Fidessa: Enhancing Customer Service Across the Globe
Fidessa, a provider of trading and investment technology and services, was facing challenges in supporting its global customers. The company's support technicians had to rely on the user's description of the issue and screen shots of the user's computer screen to diagnose and solve issues. This process was often cumbersome and could lead to extended support calls due to the complex nature of Fidessa’s trading platforms. The company was in need of a solution that could introduce efficiency and improve customer experience while ensuring total platform security.
The Washington Savings Bank Cuts Recurring Costs with PowerBroker Endpoint Protection Platform
The Washington Savings Bank (TWSB) was facing challenges with its endpoint security. The bank, with five branches and approximately 130 employees, was using Symantec Enterprise Antivirus. However, the renewal price for the license was steadily increasing, leading the bank to consider other options. Additionally, the bank was required to meet stringent compliance standards, including the use of an intrusion prevention system to guard against malicious internal network activity. The hardware-based IPS systems offered by other companies were beyond the bank's budget. The bank also had multiple layers of security, none of which were integrated. The end-user PCs had separate antivirus and antispyware, while they lacked other features such as endpoint firewalls, intrusion prevention, and policy control. The bank had a perimeter firewall, but more and more employees wanted to work from home or as they travelled.
IT Outsourcer Virtualizes Support Staff and Lowers Travel Costs with Remote Support Appliance
Fiserv, a Fortune 500 company providing technology solutions for the banking industry, had a team of 50-100 employees dedicated to providing remote support. However, staff often spent up to two weeks a month traveling to client sites for training and software installation. The company started offering 'vTrips' (virtual trips) to clients for software upgrades, which were well-received and identified as a potential new service channel. However, for this service to be effective, Fiserv needed a solution that could 'virtualize' its staff and ensure greater productivity. The solution also needed to meet the stringent security and audit needs of both Fiserv and its clients. The company's previous solution had a 'pay by the drink' licensing structure, which became costly as the use of clientless remote support expanded.
SecureIIS Protects Iowa Department for the Blind from Worms and other Threats
The Iowa Department for the Blind had its main website defaced several years ago, disrupting its services to the blind and visually impaired citizens. The department realized the need for a security solution that could protect against both known and unknown threats. Additionally, the solution had to ensure high performance of the department's range of web applications without causing intrusive security that could undermine the department's goal of accessibility. The department serves approximately 7,000 blind or visually impaired Iowans, offering a variety of services, including library, vocational rehabilitation, independent living services and public education, as well as adjustment and orientation services for the newly blind. Therefore, any disruption to these services was unacceptable.
Enhancing Collaboration and End-User Satisfaction by Consolidating Remote Support
Flinders University, a well-established institution in Adelaide, South Australia, was facing challenges with its IT support system. The university's multiple IT departments were using a variety of remote support solutions, depending on the type of device or operating system the user had. This required the support technicians to be familiar with all these tools and to ask users several questions to determine which remote support tool to use to solve the problem. The technical support teams also operated in a siloed fashion, resulting in inefficiencies and slower response times to users. Additionally, there was no tracking or reporting for remote support activities. The university needed a solution that would consolidate their remote support system, improve efficiency, and enhance collaboration.
RWE Supply & Trading Secures Against User and Asset-Based Risks
RWE Supply & Trading, a leading energy trading house and a key player in the European energy sector, was facing a challenge of reducing the attack surface while meeting budgetary and regulatory constraints. The European energy sector is undergoing fundamental changes, with subsidised expansion of renewables causing margins and utilisation of conventional power stations to decline, thereby requiring energy providers to reduce costs. But against this cost reduction, energy providers such as RWE Supply & Trading cannot sacrifice security. As the IT Security Architect for RWE Supply & Trading, Loucas Parikos needed to protect the infrastructure while meeting these cost and regulatory constraints. “We wanted to reduce the attack surface and minimise our chances of being exploited.” In taking a phased approach, RWE addressed individual problems separately and then brought the solutions together under a common reporting and management platform.
Hoosier Energy: Transforming Remote Support with Capabilities that Exceed Expectations
Hoosier Energy, a generation and transmission cooperative providing wholesale electric power and services, was using an antiquated remote support solution to connect to and fix employees’ computers. The existing solution had very limited capabilities and was difficult to use. It could only connect to computers if they were turned on and there were a number of steps that needed to be completed before the connection could be made to provide remote support. The success rate of connecting to a computer was only fifty percent as it depended on many factors. The help desk lead, Monty Dine, found it easier to drive thirty minutes to fix issues on-site than trying to use the existing tool. The company needed a better way to provide remote support.
ICE Systems Case Study
ICE Systems, a systems integrator based in Sydney, Australia, was facing several challenges. They needed an additional customer support channel other than phone and a robust audit trail to meet customer requirements. They also required a remote support solution that allowed access to unattended remote systems due to data center monitoring services for many customers. With a limited five-person support staff, ICE Systems needed to provide support to their customers without traveling on-site, while still being able to support multiple platforms. Many of their customers are in highly regulated industries with strict audit requirements, so ICE Systems needed to be able to trace the path of individual reps and their actions during remote support sessions.
DCI Exceeds Compliance Requirements for Privilege & Password Management
In 2010, DCI expanded the scope of their internal auditing requirements to include access related areas such as user privileges, password rotation policies, review of access sessions, and access history. To address compliance requirements, the team also decided to lock down the development, test and internal business servers to protect vast amounts of sensitive data. This meant that they had to fully restrict root access, reset all passwords after each use, and periodically rotate them — whether they were used or not. Even SSH access had to be limited. To fulfill these needs, DCI required a procedure to delegate and authorize specific limited functions on each server, when access was required. They also wanted different login IDs for different functions on each server, plus a workflow whereby two managers could grant access to specific functions at particular times. Activity on the servers also had to be tracked by ID, including the functions allowed by each ID.
JMC IT: Providing Superior Service to a Dispersed Customer Base
JMC IT, a company that provides IT support and expertise to companies and organizations across the UK, was looking to expand its remote support solution. The company's clients are primarily located within the North of England, but often have remote or satellite offices around the UK, Europe, US and Asia. Changes in IT, like greater calls for staff flexibility, the evolution of remote working and Bring Your Own Device (BYOD) initiatives, have all had an impact on IT support requirements. Keeping pace with these dynamic IT changes means that JMC is continually looking at its own support services and how they meet customer requirements. Prior to implementing Bomgar, remote access to customer devices was undertaken on an ad-hoc basis and via a wide variety of different technologies. While access was always secure and conducted via VPN or Citrix Access Gateway, the ability to conduct all sessions in the same way was not possible.
Johns Hopkins University Applied Physics Lab Improves IT Support with Bomgar
The Johns Hopkins University Applied Physics Laboratory (APL) was facing challenges with its IT remote support solutions. The existing solutions were not meeting the organization's rigorous security standards and were unreliable, leading to session-connect failures 25% of the time. This was causing frustration among users and resulting in unnecessary onsite visits. The annual downstream costs due to these failures were estimated to be $100,000, equivalent to the cost of two full-time employees. The ITSD team at the lab decided to improve their IT services in terms of security, reliability, and cost.
Johns Hopkins Bloomberg School of Public Health: Bomgar Critical for Health Researchers in the Field
The IT support team at Johns Hopkins Bloomberg School of Public Health was struggling to provide high-quality support to the growing number of students and faculty conducting research in remote locations around the world. Traditional support delivery methods were proving inadequate, particularly for researchers in areas with slow and inconsistent network connections and limited phone access. The team was also grappling with the challenge of supporting researchers' access to data stored on secure portals on the university's network via Microsoft SharePoint. The existing remote control capabilities included with Windows and their systems management solution were insufficient to meet the increasing demand for support.
Extending IT Support to Meet the Needs of a Growing University
La Salle University, a private Roman Catholic institution of higher learning, was facing challenges in providing IT support to its growing number of faculty, students, and staff across multiple campuses and online programs. The main campus was spread out and the university had recently acquired additional real estate, making it difficult for the IT support technicians to service classrooms that were a considerable distance away. The growing online and international programs presented another challenge as the university needed a way to support those remote users. The university's IT department was in need of a remote support solution that would allow them to expand their IT support capabilities affordably.
Improving remote support for a first of its kind organisation
The IT support function for Birmingham Women’s and Children’s NHS Foundation Trust, a small team, needed to provide assistance in a quick, efficient, and secure way. They faced issues with providing support to remote staff that were connecting to the network from home via VPN, particularly on smart devices such as tablets. There was no mechanism in place to support these users, without having them return on-site to the Trust with their device to have their issue addressed. For many remote workers, some of whom were working long distances from the Trust, this just wasn’t a practical solution. A further problem was having the ability to accommodate third parties or contractors who required access to the Trust’s network. It was essential that Birmingham Women’s and Children’s NHS Foundation Trust maintained absolute control and oversight of third party access, only granting entry to the necessary systems and data.
Enhancing Security and Productivity with Robust Privileged Access Management
AMOCO Federal Credit Union, a regulated financial services organization, had the ongoing responsibility to ensure the security and integrity of the organization’s network, systems, and data. The Information Systems and Technology (IS&T) department had been using Bomgar Remote Support with an on-premises appliance deployment for several years. However, they saw the need to heighten the organization’s security even more. They needed a solution that could provide robust control over individual privileged user actions and fully control the rights given to internal users.
Greater Manchester Shared Services: Serving the Remote Support Needs of a Vital Healthcare System
NHS Greater Manchester Shared Services (GMSS) is a large healthcare support service provider in the United Kingdom. They work with 12 regional clinical commissioning groups (CCGs) serving a population of 2.8 million. Their clients include CCGs, local authorities, over 600 healthcare providers, and other public and private sector bodies, primarily across the Greater Manchester region in the UK. The organization was in need of a solution that was both flexible and secure, as they handle large volumes of sensitive patient data every day. The solution needed to be highly configurable to meet their specific support needs, without compromising on strong security.
Finding a Feature-Rich Remote Support Solution to Meet an Enterprise’s Varied Requirements
ANATEL, Brazil’s National Telecommunications Agency, was using Microsoft’s Lync collaboration and instant messaging application for remote desktop support. However, when ANATEL refreshed its workstation fleet in 2014, they needed a more robust remote support solution as the Lync tool did not support the operating system of the new workstations. Additionally, the organization adopted a new set of security policies that required a remote support solution with more advanced security features. The Service Desk wanted to expand its capabilities so that it could provide remote support for the organization’s increasing number of mobile devices and its full range of network assets.
Remote Support Capabilities That Meet The Evolving Needs Of A Major Health System
Northwell Health was initiating plans to replace its existing IT service management solution and wanted to ensure that its new approach to providing IT services included more robust remote support capabilities than the health system had at that time. It was also critical that the new solution comply with stringent data security regulations that Northwell must meet, such as HIPAA. Turpin researched a number of potential remote support solutions, but only Bomgar met all of Northwell’s requirements.
Major Retailer Achieves Compliance With the PCI Data Security Standard
A leading retail clothing company was operating multiple brick-and-mortar enterprises using a complex patchwork of systems for identity management across its Unix, Linux, and Windows systems. When the company created a new division to handle consolidated online sales for all its enterprises, the complexity of their systems came to a head. The online division was having difficulty complying with the Payment Card Industry (PCI) Data Security Standard. The problem was that the organizations has too many different operating systems, domains, and directory services made it impossible to manage user ID and passwords systematically. The company also needed to address issues of inefficiency. For the end users, engineers and developers, it’s very difficult to maintain continuity for their day-to-day work with multiple account IDs and passwords across the enterprise.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.