Case Studies.

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Selected Filters
19,090 case studies
3xLOGIC Deploys Video Verification to Secure 13 John Deere Dealerships
3xLOGIC
Hutson Inc., a John Deere dealership with 13 locations, faced a significant challenge in securing their large display lot and building in Paducah, KY. The outdoor area was particularly difficult to protect due to its size and the fact that customers often wanted to view the equipment after hours without being approached by a salesperson. Hutson needed a solution that would allow customers to freely explore the lot while ensuring the protection of their assets.
Harvest Health & Recreation Standardizes on 3xLOGIC Standardizes on 3xLOGIC infinias Access Control infinias Access Control
3xLOGIC
Harvest Health & Recreation, a multi-state cannabis operator and vertically integrated cannabis company, needed a robust access control system to manage and track personnel access across its facilities. The company wanted to control who goes where, regardless of the facility, and track who, when, and where. The system needed to grant access to specific doors and shut down access after hours. The company also needed to be sensitive to the many different state rules and regulations, requiring interoperability from state to state, as well as personnel trackability and clear audit trails for state regulators.
Canadian Metals Processor Deploys 3xLOGIC Thermal Imagers and HD Cameras
3xLOGIC
Dominion Nickel Alloys Ltd., a leading scrap metal recycling facility in North America, faced a significant security challenge at its 20-acre facility on the outskirts of Toronto. The facility, which specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys, was at risk of theft. The biggest risk for Dominion was someone entering the yard undetected and making off with tens, even hundreds of thousands of dollars of metal. The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification. However, this setup generated far too many false alarms to be effective.
Estill County EMS Successfully Deploys 3xLOGIC infinias Access Control to Meet Wide-Ranging Security Goals
3xLOGIC
Estill County EMS was looking to secure their building which operates 24/7/365. The main goals were to secure the medical room, as per DEA regulations, and to ensure the facility is safe for staff at all times, even when they need to leave at a moment's notice. The infinias system needed to manage a total of six doors at the main EMS building, two of which are internal, including the medical room where drugs are stored. Two more doors were added at a sub-station location.
Cash Saver Stores Using 3xLOGIC Video Surveillance to Successfully Combat Theft, Liability Claims
3xLOGIC
Cash Saver, a cost plus food outlet in Memphis, was looking for a video surveillance system for their stores. Their main motivations were safety and curtailing losses. Since Cash Saver advertises its lower prices compared to the competition, they are firmly committed to doing anything in their power to cut costs, including reducing product shrink and legal claims.
Panda Restaurant Group Improves Company-Wide Store Operations with 3xLOGIC VIGIL TRENDS Business Intelligence Software
3xLOGIC
Panda Express, the largest family-owned restaurant chain in America, was facing a significant challenge. The company, which has over 2,000 stores globally, 35,000 associates, and $3 billion in sales, needed a state-of-the-art business intelligence solution to provide actionable information. The company's culture sets an expectation of best-in-class results, and intelligence that could be acted upon was central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.
Las Vegas Marijuana Facility Relies on 3xLOGIC infinias Access Control to Provide Essential Security Peace of Mind
3xLOGIC
The legalization of marijuana in Nevada has led to the growth of businesses dealing with the cultivation and production of marijuana. These businesses, such as the one managed by Harris Tec, are largely cash-based and have high-value inventory on their premises, making security a top concern. The facility is divided into two separate parts for cultivation and production, each requiring different licenses, sets of employees, and operating procedures. The challenge was to ensure tight security control over the facility, especially given the high turnover rate in the marijuana business.
NLP Logix Implements 3xLOGIC Integrated Video and Access Security— an Innovative Software Solution Tailored to Any SMB Budget
3xLOGIC
NLP Logix, a company that automates repetitive tasks using AI, was facing a security challenge. During a hurricane, the CEO and several employees sheltered at their offices and became aware of potential looters around the building. However, they lacked visibility of the front door, the hallway leading to the office door, and the main entrance to the building. This lack of visibility raised concerns about their security situation and the safety of their employees. They needed a solution that would provide them with the necessary visibility to feel secure in their office building.
Ted’s Pawn More Effectively Protects Customer Assets with Verified Video Surveillance from Sonitrol and 3xLOGIC
3xLOGIC
Ted’s Pawn, a pawn shop located in Norwood, OH, had been using analog video surveillance for about 8 years, and audio verification of alarms for the inside of the store. However, the outdoor lot, filled with high-value items such as cars, motorcycles, and boats, presented a different challenge. The company wanted to implement video verification for the lot, but faced several challenges including complicated installation, connectivity issues, reliability concerns, and the need to eliminate false alarms.
E-470 Public Highway Authority Implements 3xLOGIC’s infinias Access Control
3xLOGIC
The E-470 Public Highway Authority, a political subdivision of the State of Colorado, operates a toll highway that runs along the eastern perimeter of the Denver metropolitan area. The 47-mile beltway extends from south of Denver, around the city, and terminates at the north end of the metropolitan area. The Authority’s extensive network of far-flung facilities and toll booths needed to be integrated into a single, centralized access control system. In late 2014, E-470 Public Highway Authority staff assessed their existing access control system with an eye toward upgrading overall capabilities.
Orchard Place Relies on 3xLOGIC Access Control to Manage 450+ Users Across Several Locations
3xLOGIC
Orchard Place, a provider of children’s mental health services, was facing challenges with their standard lock and key system. Keys were routinely being lost or not returned, resulting in the need to reissue keys for many of the buildings to a lot of employees. The organization operates across several locations with multiple providers, making a high-performing access control system essential for patient and staff safety. The organization also needed a better system to meet the accreditation requirements of The Joint Commission in terms of safety and security standards.
Silktown Roofing Successfully Deploys 3xLOGIC Thermal Cameras to Stop Rash of Parking Lot Thefts
3xLOGIC
Silktown Roofing, a full-service roofing contractor, was facing a challenge with thefts in their expansive outdoor parking and storage lot. The company has a large inventory of high-value vehicles that are stored overnight, or longer, in this lot. Despite having video surveillance technology installed, the company was unable to curtail robberies of vehicle catalytic converters. After several such thefts, the costs were rising steeply, creating a significant financial burden for the company.
Field of Dreams Movie Site Installs 3xLOGIC Video Surveillance System After Vandalism Incident
3xLOGIC
The Field of Dreams movie site, a popular tourist attraction in Iowa, was the victim of a senseless act of vandalism in April 2018. The damage was extensive and included the destruction of expensive irrigation equipment. The site, which attracts more than 110,000 visitors annually, was left vulnerable and in need of a security solution to prevent future incidents. The challenge was to find a cost-effective solution that could provide comprehensive coverage of the site, including the retail sales area and the field itself, and could be monitored remotely.
Ocean Blue Car Wash Locations Standardize on 3xLOGIC Video Surveillance
3xLOGIC
Ocean Blue Car Wash, a fast-growing enterprise in Arizona, faced the challenge of protecting itself against false claims of liability to its customers’ cars. With four locations and thousands of customers a day, the company experienced a variety of claims, including slip and fall incidents. The company needed a robust and reliable surveillance system that could provide clear and indisputable evidence in case of any disputes or claims. The system also needed to be standardized across all locations for consistency and ease of management.
Dayton Church Catches the Bad Guys with Verified Video Surveillance from Sonitrol and 3xLOGIC
3xLOGIC
Bold Believers Church of Christ, located in a tough neighborhood with a large homeless population, needed a robust security system to protect their assets. During recent renovations, a door was accidentally left unlocked, providing an opportunity for someone to break in. The church is a sprawling facility, and the staff felt they needed a comprehensive security solution to prevent such incidents.
Murphy USA Standardizes on 3xLOGIC Retail Business Intelligence Solution
3xLOGIC
Murphy USA, a large-scale convenience store chain with over 1,400 locations across 26 states, was in need of a robust surveillance system that could provide tracking capabilities to reduce shrinkage and offer mobile access for their district managers. The company had been searching for a solution for over a year, but midway through the process, they changed their deployment requirement to a chain-wide rollout over about 7 months, rather than an incremental site-by-site approach. This new requirement necessitated a solution that could handle such a massive rollout and meet the business intelligence needs of a large organization.
Texas Health Huguley Hospital Continues to Roll Out 3xLOGIC Access Control System Expansion
3xLOGIC
Texas Health Huguley Hospital, part of the Adventist Health System, was facing a significant challenge in managing security for its complex operations. The hospital was dealing with life and death situations on a daily basis, and ensuring the security of staff, patients, newborns, and emergency room patients was a massive task. In addition to the day-to-day security concerns, the hospital also had to comply with heavy regulations in meeting HIPAA requirements to protect patient information and privacy. The hospital had experience with other access control systems, but found them to be highly proprietary. They wanted an open system that they could have better control over, and could work more closely with their integrator during installation and programming.
Sonitrol of Lexington, Bates Security, and 3xLOGIC Lend Helping Hand to Upgrade Vital Non-Profit’s Security Capabilities
3xLOGIC
The Nest, a non-profit organization located in a rough part of Lexington, KY, provides needy families with free essential items, offers counseling for domestic violence issues, and has daycare services onsite. The center had been equipped with a four-camera analog system complete with alarm capabilities, so staff were very aware of the importance of verified alarms in providing a higher degree of safety and security. However, problems arose when the upgraded system integrator staff knew they needed, was a system The Nest could not afford.
Smiling Bright: How Avanan Put This Insurance Company At Ease
Clean Teeth, a small dental insurance company, was looking for a comprehensive security solution. They were particularly concerned about securing Personally Identifiable Information (PII) and staying HIPAA compliant. The company holds a vast amount of PII, including Social Security numbers, job information, and medical records, making it a target for hackers. The company was experiencing common malware and phishing attacks, and data leaks were a significant concern. Nick Schmidt, who runs the IT department for Clean Teeth, was tasked with finding a high-quality security solution to prevent data breaches and keep client information secure. He tried several products, from traditional security like Secure Email Gateways to more modern, API-based solutions, but none met his needs.
How This Distribution Company Went from 15 Hours a Week to 15 Minutes a Week Managing the Email Threat
Dawson Distributors had been using GreatHorn for their email security for two years. However, they found that the solution was not as effective as promised, leading to a significant amount of time spent on remediation and investigation of emails. The company was spending 12-15 hours a week in the admin console, reviewing release requests. The 'Report Phishing' button provided by GreatHorn was supposed to automatically pull reported emails from all inboxes, but this was not happening, leading to a significant amount of time spent sifting through emails. The company was constantly inundated with phishing emails reported by colleagues, leading to a significant drain on resources. The company needed a solution with far better efficacy against phishing, so they could spend less time reviewing emails and more time on other IT tasks.
AVANAN CASE STUDY: Capital Caring: Cloud Security for Healthcare Providers
Capital Caring, a healthcare organization, was facing a significant challenge with email security. Their employee inboxes were flooded with hundreds of phishing and other malicious messages each day, potentially putting patient data at risk. Despite aggressive training, it was difficult for employees and volunteers to filter out the increasingly sophisticated attacks. A recent survey revealed that 78% of healthcare providers experienced a ransomware or malware attack in the last year, with email being the number-one source of a potential data breach. The regulatory issues of exposing patient information meant that a compromised account could lead to expensive compliance fines, even after the initial threat has passed.
Consulting Firm Secures Office 365 Mail with Avanan
The consulting firm was facing security issues with their Office 365 mail, especially after migrating from Exchange in 2016. The company's CFO was receiving spearphishing attacks on a weekly basis, which posed a significant risk to the company's intellectual property. The firm's chief security architect, Jim, was aware of the vulnerabilities inherent with Microsoft Office 365 and was concerned about the potential for their data to be leaked or exposed. He recognized the need for additional layers of security to protect against hackers and bad actors.
ALEX Secures Office 365 with Avanan
Jeff Madsen, CTO of ALEX (Alternative Experts, LLC), was tasked with complying with Executive Order 13587 from the National Counterintelligence and Security Center’s National Insider Threat Policy. This policy required federal contractors to establish a program to detect, deter and mitigate insider threats. Jeff needed to protect the company’s Office 365 email and OneDrive file sharing beyond Microsoft’s native security capabilities. He was looking for protection against malware, ransomware, phishing, and compromised credentials for mailboxes; and for OneDrive, he needed a way to ensure that sensitive information wasn’t being used inappropriately by his employees or getting leaked externally. Jeff initially considered Microsoft’s own Advanced Threat Protection (ATP), but it failed to detect the zero-day malware he tested it with. ATP also lacked malware protection for OneDrive, and its data leakage policies were very basic and were not compatible with his current DLP tools.
Accounting Firm Secures Office 365 with Avanan
The accounting firm had moved much of its IT to the cloud, most significantly, to Office 365’s core applications and email. However, the firm had fallen victim to a number of phishing attacks, including an aggressive ransomware attack, even with Office 365’s Advanced Threat Protection enabled. They had paid extra for Microsoft’s best security, but it was not enough. The company’s IT manager knew they needed additional layers of security beyond Office 365’s native solution.
ServiceSource Secures the Cloud with Avanan
ServiceSource, a revenue lifecycle company, migrated to the cloud and started using a variety of cloud storage resources and SaaS applications. As a public company with many compliance requirements, ServiceSource had been using best-of-breed security products to secure information in its data center. However, with its recent cloud migration, the company quickly discovered the limitations of its data center security products in protecting information in the cloud. The company needed a way to apply the same levels of security to its cloud infrastructure as it did in its data center.
Protecting students, teachers, and administrators from phishing and malware with Avanan
Bethel School District in Washington state realized the need for a proactive security solution after two major phishing attacks on nearby districts resulted in significant losses. One attack led to the theft of $50,000 worth of computer equipment, while another resulted in a breach of personally identifiable information from all finance department employees. While Bethel Schools had not experienced breaches of this magnitude, they had endured some phishing attacks in the past. After learning of these events, a breach of that nature seemed increasingly possible.
City and County of San Francisco
The City Cybersecurity team within the Department of Technology must provide protection for 50 City and County departments subject to widely varying risks and requirements. For example, the Department of Elections must be protected from state-sponsored cyber attacks while also being transparent to public oversight. Health Care and Human Services, Finance and the Courts all fall under multiple regulatory requirements, from HIPAA to PCI to California State and Federal regulations. Needs vary widely. Some organizations have over 10,000 staff members with their own IT staff. Others may only have 50, with elected leaders that change every election cycle. Makstman partners with all to protect their data and services. Whether safeguarding water, power and transportation systems, or supporting health and human services for vulnerable populations, Makstman is tasked with protecting critical municipal services for the one million people who work and live in San Francisco.
Why This Benefits Administration Company Finally Gave up on Mimecast
TPA America, a national benefits administration company, was facing issues with their email security solution, Mimecast. The company had moved to Office 365 and wanted a security solution that was easy and low maintenance. However, after deployment, they started facing problems. The first issue was the number of false positives which disrupted the business. Emails would disappear until a user would ask about it the next day or spend time looking through quarantine. This led to a helpdesk ticket or an urgent call from a department head. The interface was also confusing and difficult to navigate. It was hard to find a message or understand why it was blocked. The lost time, both on the IT team and for company employees, became an expensive burden. Email-related tickets are often time-sensitive and because they can lead to a breach, potentially critical, forcing the helpdesk to grant each priority. It became necessary to add staff to manage the system.
Why This Biotech Research Firm Replaced Proofpoint to Protect Microsoft Office 365
CRO, a global contract research organization, was a highly-targeted organization for phishing attacks and intellectual espionage. It was subject to multiple regulatory laws including HIPAA and data leakage was a fundamental concern to its clients. The company had already deployed a secure email gateway from Proofpoint to protect its Office 365 environment, but it was not up to the task. Multiple times a week, the IT department had to manually send email warnings, instructing employees not to click on the malicious links that had recently reached their inbox. The constant need to monitor and react to missed attacks was both time-intensive and a high-profile reminder to everyone that IT had not yet solved the phishing problem. The old way of doing things wasn't working.
Securing Email and Reducing SOC Burnout for Fortune 500
A Fortune 500 company was inundated with phishing and other suspicious emails, with their end-users receiving more than 16,000 phishing emails per month. In addition to dealing with the actual phishing attacks, this company's Security Operations Center (SOC) was required to review each suspicious email report by the end-users. These were emails that end-users felt could be phishing and thus sent to the SOC for further analysis. On average, the SOC reviewed nearly 17,000 end-user email reports per month, causing them to be overwhelmed and quickly approaching burnout. A change was needed that first stopped the attacks from reaching the inbox while also reducing the overwhelming load on the SOC. In looking for a solution, they evaluated two different solutions and eventually selected Avanan to secure their enterprise email with Avanan Email Protection and Avanan IRaaS to achieve their objectives quickly.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.