实例探究.

我们的案例数据库覆盖了全球物联网生态系统中的 19,090 家解决方案供应商。
您可以通过筛选条件进行快速浏览。

筛选条件
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • 查看全部
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • 查看全部
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • 查看全部
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • 查看全部
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • 查看全部
  • 查看全部 15 技术
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • 查看全部 42 行业
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • 查看全部 13 功能区
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • 查看全部 127 用例
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • 查看全部 9 服务
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • 查看全部 732 供应商
Selected Filters
19,090 实例探究
降低 TCO 并实现 100% 可视性
NETSCOUT
该能源公司正在其客户群中实施智能电表,并高度重视性能,特别是在防止停电和客户服务质量下降方面。然而,高级计量基础设施 (AMI) 服务(即智能电表)严重依赖网络通信,这使得公司的后端基础设施和应用程序容易出现性能问题。IT 团队需要对公司的虚拟服务器、企业服务总线 (ESB) 和跨分布式数据中心的收集引擎有关键的可视性,而无需在不同工具之间移动。实施 AMI 项目后,IT 面临着提高其他几项业务应用程序服务的故障排除能力的压力,包括 Microsoft Office 365、停电管理系统 (OMS) 和机组管理系统。该公司需要确保高质量的 VoIP 服务 - 尤其是来自远程站点和面向客户的联系中心的服务。
制药公司利用 NETSCOUT 智能可视性改善最终用户体验
NETSCOUT
这家制药公司面临着网络可视性盲点,这影响了跨业务 IT 的成功。他们在统一通信和 Cisco UCS 性能透明度方面存在问题。该公司已做出部署开放计算技术的战略决策,该技术为其组织提供了更高的部署灵活性,并降低了资本支出 (CAPEX) 和运营支出 (OPEX)。管理层还制定了一个组织目标,即部署一个通用的性能分析平台,供其众多信息技术 (IT) 团队使用。是时候更新他们的服务保证和数据包代理硬件了。为此,该公司通过提前选择 NETSCOUT®“智能数据、更智能的分析”方法实现了其开放计算平台技术目标,该方法考虑了基于软件的设备而不是传统硬件解决方案。
大型交通运输管理局使用 NETSCOUT 跟踪火车票价处理问题
NETSCOUT
北美交通局面临票价处理问题,影响乘客在车站自助服务终端自动“重新充值”票价支付卡的能力。这个问题给乘客带来了不便,也影响了交通局的声誉。由于缺乏对票价系统的财务应用程序和底层技术的可见性,IT 团队无法确定问题的根本原因。IT 团队正在寻找一种解决方案,以改善网络可见性和实时应用程序监控,同时扩展其传统 IT 工具集的价值。
金融领导者借助 NETSCOUT 无缝迁移到 Azure
NETSCOUT
该金融服务提供商将 Microsoft Azure 确定为其组织云服务平台。该项目是 IT 的一项重要任务,涉及将业务服务和应用程序从三个地理区域的众多数据中心迁移到 Azure 云服务。IT 领导团队希望增强此解决方案的安全性,因此他们使用了 Microsoft Azure ExpressRoute,它使用私有连接将公司的本地网络段扩展到 Azure 云服务。当 IT 团队努力建立高带宽路由器以支持将大规模、业务关键型工作负载迁移到 Azure ExpressRoute 的安全网络连接时,他们开始发现该公司的一个数据中心出现性能问题。
3xLOGIC and Sonitrol Great Lakes Team Up with Flint Boys and Girls Club to Improve Safety and Security
3xLOGIC
The Flint Boys and Girls Club was in need of a new video surveillance system. Their previous system was aging and lacked the image quality and zoom capabilities they desired. The club serves a large number of children daily, making it crucial to have a reliable surveillance system to ensure their safety. The club had expanded their old system to 16 cameras, covering more areas, but the quality was not up to par.
3xLOGIC and Sonitrol of Fort Lauderdale Partner on Security System Upgrade for Junior Achievement of South Florida
3xLOGIC
Junior Achievement of South Florida’s (JASF) JA World is the largest Junior Achievement facility in the world. Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of volunteers, staff, and guests is of utmost concern to JASF. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. However, with time it was clear JASF needed to bring more areas inside and outside the building under surveillance, they wanted more cutting-edge IP camera technology, and to have all cameras under one Video Management System.
How Crowder College Found Simplicity and Security with Avanan
Avanan
In 2019, Crowder College, a community college in Neosho, Missouri, was hit by a ransomware attack that shut down the college’s email, website, and computer systems. The virus, likely introduced via email, had been dormant in the computer’s system for nearly a year. The college refused to pay the hackers $1.6 million demand, and set to work rebuilding and restoring their systems. Immediately after the ransomware incident, Crowder deployed AppRiver for their email security. However, AppRiver, a Secure Email Gateway (SEG), had limitations. It was not very granular and let a lot of phishing and spam through. Crowder needed a more efficacious solution that wasn’t passive, provided robust security, with better reporting and better customer service.
The Modern Way of Doing Email Security Works Better for this Credit Union
Avanan
Wildwood Credit Union had been using Proofpoint for several years and was becoming frustrated. Far too many malicious emails were getting into the inbox. Plus, they felt that the gateway setup was way out-of-date, necessitating a new approach to securing their email. Finally, since protecting personal identifying information is so critical, they needed a far more robust DLP solution. For years, the company used Proofpoint to protect its environment. But after a while, Proofpoint began to disappoint. For one, far too many phishing messages came through to the inbox. That was made worse since the pandemic, since, according to a report, 74% of banks and insurers have experienced a spike in cybercrime since the pandemic. In particular, there has been a 35% increase in phishing, a 35% increase in ransomware, and a 29% increase in internal threats. Wildwood needed a solution that could combat this rise.
OB Design Mounts a Successful Defense Against DDoS Attacks with the Arbor Networks® APS
NETSCOUT
OB Design, a leading online fashion retailer in Taiwan, began experiencing invalid traffic flowing into the company’s network during peak hours every night, increasing server workload. This traffic appeared legal, leading the company to add more hosts to keep pace with the growing network demand. However, when it became clear that the increased traffic was not generating a corresponding rise in orders, OB Design realized it was under attack by hackers. The company's initial approach of reviewing the traffic history of each previous day, searching for suspicious IP traffic, and building a blacklist for the firewall proved too time-consuming and ineffective.
We Were Constantly Attacked, But None Found Their Way Through: Ife’s CIO
NETSCOUT
The Federal Electoral Institute (IFE) in Mexico faced constant cyber attacks during the 2012 Federal Elections. The attacks were primarily Distributed Denial of Service Attacks (DDoS), aimed at disabling the services of the IFE. The institute had prepared for such issues months in advance, increasing the dedicated bandwidth for the election process over 600Mbs, 300 times over the average Web connection in Mexico. Despite the constant attacks, none were successful in disabling the operation of the Preliminary Program of Electoral Results (PREP) or IFE infrastructure.
the Corero First Line of Defense Gives Hyve A Strategic Advantage Among UK Hosted Service Providers
Corero
Hyve, a leading UK IT service provider specializing in mission-critical cloud hosting, was looking to stand out among competitors in the large UK market. The company aimed to provide the utmost security to its customers while also ensuring continued availability through unhindered access to their systems. In today’s environment of increasingly sophisticated and common attacks, Hyve cannot deliver the performance and satisfaction its customers demand without addressing security threats that plague organizations the world over. To mitigate these risks and meet customer expectations, Hyve’s environment has multiple layers of defense, is ISO-27001 and PCI-DSS certified, and has been architected to prevent client cross-contamination if a problem does occur. Nevertheless, Hyve was still challenged by weaknesses in individual clients’ hosted environments. Being a proactive, security driven company, Hyve have looked for another line of defense to better protect the entire IT environment.
Jagex Drops the Warhammer Against Ddos with Corero
Corero
Jagex Games Studio, a Cambridge-based multi-award-winning games developer and publisher, was facing an increase in DDoS attacks for various reasons, including banning known DDoSers, attention-seeking purposes, and those looking for bragging rights. The company also faced extortion attempts, with bad actors threatening to take down the site unless Jagex paid their ransom requests. The company was also threatened with DDoS unless they made changes to the game itself. These instances posed a serious challenge to game availability, which is the lifeblood of the organisation. The company was using a legacy DDoS mitigation solution that was not performing to specifications and was based on time-consuming reactive policies in an industry that demands proactive defense measures.
PersonalizationMall.com Ensures Fast, Reliable Remote Access with BIG‑IP Edge Gateway
F5
PersonalizationMall.com, an online retailer, was facing challenges with its existing VPN solution. As more employees required remote access, the Cisco technology they were using no longer delivered acceptable performance. This was especially evident after the company migrated to Windows 7. Mobile users needed the 64‑bit operating system but were unable to connect to the VPN. Another concern was the slow connection speed between office and home, which was limited by the older VPN technology. Users were also experiencing difficulties with dropped calls on VoIP, which was frustrating and negatively affected the business.
Education Solution Provider Helps Customers Do More with Less Using F5 Solutions
F5
Hobsons, an education solution provider, delivers a suite of education-oriented Software as a Service (SaaS)-based applications to colleges and universities. These include web-based course and career planning, recruiting, enrollment, and retention tools. The company's application delivery infrastructure is mission-critical, and it has to manage significant increases in web traffic that coincide with student application and enrollment deadlines. Hobsons also has to support a range of users, including prospective students completing online applications and administrators needing access to the same systems for recruitment efforts and application reviews. The company needed a solution that could easily direct different types of traffic to different pools of servers and manage users’ authorization and access to various applications, without requiring modifications or adjustments on the customer's end.
No Down-time for Orange County Teachers Federal Union Online Banking Services with Radware’s Application Front End Solution
Radware
The Orange County Teachers Federal Credit Union (OCTFCU) offers retail banking services online, at ATMs and in 24 branches spread across the southern-California county. With concurrent sessions as high as 6,000 users per day with $150,000 changing hands every hour, the credit union’s online portal had to be fast, secure, reliable and available around the clock. Simple load balancing between its Web servers became inadequate to this task; seamless failover was needed. The credit union’s server farm had needed load balancers for its backend servers and initially, it had used Cisco’s Local Director and Content Services Switches. That went some way toward keeping applications responsive, but when its banking services went online to the public, the credit union needed something far more reliable: It needed to be able to detect a server’s imminent failure and divert traffic to another server while the faulty server was taken out of the farm for scrutiny. All this had to be done without interruption to its online service, and without customers feeling any “glitch.”
A Top European Bank Partners with Radware for DDoS Mitigation and SSL Attack Protection
Radware
The financial services company was facing an increased rate of cyberattacks and required a new on-premise DDoS mitigation platform at its primary data centers in addition to protection from encrypted network attacks to protect web applications. In recent years, financial services has become one of the industries most targeted by cyberattacks. In addition to facing an array of attack vectors and threats, including hacktivist-backed campaigns and ransom-motivated assaults, it is also overcoming a hodgepodge of various network and application security challenges, including migration to the cloud, application exploits and encrypted traffic management. The bank required a new on-premise DDoS mitigation platform at its primary data centers that could protect them from DDoS attacks without negatively impacting legitimate traffic. In addition, with the percentage of encrypted network traffic increasing, the bank required a solution that could protect their web applications from encrypted floods.
Xand Offers DDoS Protection Services for Cloud and Colocation Infrastructure with Attack Mitigation System
Radware
As a provider of data center managed services and technology solutions, Xand’s customers require secure, high performance, highly-available infrastructures for its mission-critical environments. Since, distributed denial of service (DDoS) attacks can inflict costly and destructive downtime on hosted applications and resources, Xand needed a solution to protect its customers cloud systems and comprehensively guard against user data breaches.
Convergys Load Balances over One Million Voice Calls per Day with Radware’s Application Delivery Controllers
Radware
Convergys, a global customer management firm, was facing a challenge in maintaining customer satisfaction and VoIP availability, which are critical to its success. With over 150 call centers in 31 countries and 90 VoIP recorders in its call system, Convergys needed a solution that could load balance over a million voice calls per day across multiple recordings. Any scenario where recordings were lost could result in customer dissatisfaction. To eliminate downtime from regular maintenance of its recorders, Convergys searched for a load balancing solution to support call recording for all of its call centers.
Multinational Bank Requires SSL Offloading and Application Protection to Stay in Business
Radware
The bank faced a number of challenges, including network expansion, increased dependency on web applications and an increase in the number of cyberattacks. With 400 million users dependent on the bank’s applications to access accounts and related services, the bank must provide high application performance 24x7 for over 180 applications to keep customers satisfied. Due to high network traffic volumes, its existing load balancing solution couldn’t handle the connections per second. Another challenge for this bank is scaling its network to manage international business. Internet banking spans various individual banking divisions, including retail, corporate and consumer, each of which has its own applications and requirements. The bank, which also has to handle large traffic loads from consumer and enterprise customers, was looking for a scalable solution to manage traffic and applications for more than a dozen departments across two data centers. The third challenge for the bank is application security to maintain service availability. Protection of mission-critical application is critical to stay in business. The majority of network traffic that the bank receives is encrypted, which necessitated having the ability to inspect that traffic for attacks.
Floods Remind CCS That Even the Best Network Needs a Lifeboat for When Disaster Strikes
Radware
CCS, a major provider of data access cards in the Czech market, needed to ensure its network was continuously available to service several thousand transactions daily. The company's profits are derived from the number of transactions completed, so uninterrupted access to data is integral to its business relationship as a service provider to its partners and customers. In 2002, floods in Karlín revealed a weakness in its existing Internet connection: Availability. CCS decided it must have two Internet providers to handle unexpected events and interruptions caused by natural disasters. The company created two pipelines for service: One at 34 Mb/s and the other at 7 Mb/s. These pipelines would provide availability for essential services such as customer service, e-mail communication with customers and partners, and communications with partners from other business chains to exchange transaction files and payment card blacklists.
Excellent user experience, but not for fraudsters
Sift
SEOClerks, a marketplace for SEO and other web-related services, was facing a significant challenge with fraud. Their approach to fraud prevention was largely reactionary, with fraudulent accounts being banned after a chargeback was received. However, these users would often return and create new accounts to continue their fraudulent activities. Despite having an IP-based fraud-detection tool, SEOClerks was still experiencing various types of fraudulent activity, including money laundering, referral fraud, account abuse, and friendly fraud. The main issue was money laundering using stolen credit card or PayPal information. They were unable to identify clear relationships between multiple bad users, and their existing fraud tool didn't provide any intelligence for spotting fraud rings or repeat abusers.
How Carousell keeps fraudulent listings off of their platform
Sift
As Carousell began to scale, they started to see fraudsters posting fake and spammy product listings for products that either arrived to the buyer not as described or never got delivered to the buyer at all. Carousell didn’t have a way of proactively preventing these listings and relied on user flags to spot and remove them. This meant that these listings not only posed a threat to good users until they were eventually removed but threatened to sully the reputation of the platform, as well. Repeat fraudsters were also finding ways to get back onto the platform even after Carousell deleted their accounts, and continued to post abusive, fake listings with their new accounts. Carousell limits the number of accounts a user may have to a maximum of two, but fraudsters were creating multiple accounts and Carousell was finding it difficult to keep track of them all. Carousell was using a rules-based fraud solution, but it was time-consuming to have to jump in and change rules every time fraudsters changed their tactics.
How Zirtue keeps relationship-based lending honest and safe
Sift
Zirtue, a mobile relationship-based lending application, was facing a growing issue of friendly fraud where users were disputing their loan payments falsely claiming they had not authorized the transactions. This was compounded by the fact that Zirtue had access to a very limited amount of user data, preventing them from proactively recognizing suspicious behaviors and stopping the fraud before it happened. Additionally, the vetting process for taking out a loan was lengthy and required tedious and time-consuming email exchanges between Zirtue and the borrower, to ensure the borrower could confirm their identity. This manual work frequently delayed loans, creating headaches for the Data Analytics team and borrowers alike, and it was looking as though another team member would need to be hired to help handle the workload.
How Chicago Music Exchange achieved 13.7x ROI with Sift
Sift
Chicago Music Exchange (CME), a leading music equipment retailer, faced a significant challenge with fraudulent orders after switching their website platform provider. They encountered fraudsters placing small to medium-value orders to test the system before moving to higher-value items. Once a fraudulent order got through, it was easy for these cybercriminals to create fraudulent new accounts and multiply their gains. CME had particular difficulty with orders sent to freight forwarding companies, which required an added level of verification to authenticate the transactions and addresses. This meant that CME had to manually contact the customer or research the shipping address, which was time-consuming and not always effective. This was particularly true for more complicated overseas orders, and every time, CME was left to handle the loss.
How Paula’s Choice achieved 6x ROI and boosted brand reputation
Sift
Paula’s Choice, a multinational skincare company, was facing persistent fraud patterns on their platform, resulting in an influx of chargebacks. Fraudsters were ordering products in bulk at a discount and then shipping them to other countries to resell through eBay or Amazon for profit. To combat this, Paula’s Choice initially kept a spreadsheet and manually blocked suspicious orders, but soon discovered how challenging it was to manage and stay accurate. They turned to Sift as a solution. However, when they adopted a new payment processor, they switched from Sift Payment Protection to the payment processor’s revenue protection product, which was offered for free. This switch resulted in an immediate inundation with fraud, receiving hundreds of chargebacks—6x their normal volume.
How Coffee Meets Bagel safeguards its community for users truly looking for love
Sift
Coffee Meets Bagel (CMB) is a leading dating application that aims to provide a safe environment for its users to find real relationships. However, the integrity of its community was being compromised by fraudulent users creating fake profiles and engaging in romance scams. These fraudulent activities not only impacted the brand's integrity but also the trust users had in the platform. Fraudsters were sophisticated and quickly adapted to the rules-based systems and methodologies that CMB used to stop them. As the user base of CMB expanded, the company needed a solution that could adapt instantly, stay ahead of fraudsters, and scale as the business grew.
How PayMongo minimized fraud losses and scaled securely by 10-20x
Sift
During the early stages of the company, PayMongo encountered fraud attacks that resulted in financial losses, including an alarming 4% dispute rate. It was crucial for the startup company to prevent this fraudulent activity in order to enable their merchants’ success and scale their own business. In their search for the perfect fraud solution, PayMongo was introduced to Sift at a Y Combinator event and agreed to an assessment. Following the review, PayMongo concluded Sift Payment Protection was an ideal fit for what they were looking for in a fraud tool.
Managing Pierce Ab’s International Expansion with Local Delivery Solutions
Metapack
Pierce AB, an eCommerce operator in the motorcycle and snowmobile industry, was facing the challenge of presenting a local face to customers across 16 countries. The company was looking for a way to consolidate and streamline its logistics while providing exceptional customer service. The company was also looking to scale its business interests internationally. Before implementing MetaPack, Pierce AB was served by only four carriers, which was insufficient for its wide geographical range and growing customer base.
Rising to Challenges of International Expansion through Smart Delivery
Metapack
ASOS, an online fashion and beauty retailer, was facing complications in international delivery, particularly in documentation and data. The requirements for these vary by country of destination, adding to the complexity. The company’s international delivery processes required manual intervention to regularly contact carriers and update prices within the ASOS fulfilment systems, as well as paperwork for each order to meet necessary customs regulations. ASOS wanted to manage its increased volume in deliveries and destinations, minimise manual tasks and paperwork, and achieve the best price for carriers around the globe.
Automation through MetaPack Leads to significant cost Savings
Metapack
Childrensalon, one of the UK’s largest online retailers of children’s fashion, was running a manual despatch operation that used a number of different carriers. In order to process orders through the website, picking lists and invoices had to be printed manually. Although systems were automated as far as possible, there was pressure on staff to select the best carrier and to ensure that all necessary paperwork had been completed correctly. Once the goods were in transit, obtaining tracking information was a time-consuming task that placed an additional burden on customer service personnel. This inefficient use of time and resource combined with the lack of sufficient tracking information led to a procedure that would enable the company to maintain exceptional levels of service to customers.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.