Case Studies.

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 731 Suppliers
Selected Filters
19,090 case studies
Improving remote support for a first of its kind organisation
The IT support function for Birmingham Women’s and Children’s NHS Foundation Trust, a small team, needed to provide assistance in a quick, efficient, and secure way. They faced issues with providing support to remote staff that were connecting to the network from home via VPN, particularly on smart devices such as tablets. There was no mechanism in place to support these users, without having them return on-site to the Trust with their device to have their issue addressed. For many remote workers, some of whom were working long distances from the Trust, this just wasn’t a practical solution. A further problem was having the ability to accommodate third parties or contractors who required access to the Trust’s network. It was essential that Birmingham Women’s and Children’s NHS Foundation Trust maintained absolute control and oversight of third party access, only granting entry to the necessary systems and data.
Enhancing Security and Productivity with Robust Privileged Access Management
AMOCO Federal Credit Union, a regulated financial services organization, had the ongoing responsibility to ensure the security and integrity of the organization’s network, systems, and data. The Information Systems and Technology (IS&T) department had been using Bomgar Remote Support with an on-premises appliance deployment for several years. However, they saw the need to heighten the organization’s security even more. They needed a solution that could provide robust control over individual privileged user actions and fully control the rights given to internal users.
Greater Manchester Shared Services: Serving the Remote Support Needs of a Vital Healthcare System
NHS Greater Manchester Shared Services (GMSS) is a large healthcare support service provider in the United Kingdom. They work with 12 regional clinical commissioning groups (CCGs) serving a population of 2.8 million. Their clients include CCGs, local authorities, over 600 healthcare providers, and other public and private sector bodies, primarily across the Greater Manchester region in the UK. The organization was in need of a solution that was both flexible and secure, as they handle large volumes of sensitive patient data every day. The solution needed to be highly configurable to meet their specific support needs, without compromising on strong security.
Finding a Feature-Rich Remote Support Solution to Meet an Enterprise’s Varied Requirements
ANATEL, Brazil’s National Telecommunications Agency, was using Microsoft’s Lync collaboration and instant messaging application for remote desktop support. However, when ANATEL refreshed its workstation fleet in 2014, they needed a more robust remote support solution as the Lync tool did not support the operating system of the new workstations. Additionally, the organization adopted a new set of security policies that required a remote support solution with more advanced security features. The Service Desk wanted to expand its capabilities so that it could provide remote support for the organization’s increasing number of mobile devices and its full range of network assets.
Remote Support Capabilities That Meet The Evolving Needs Of A Major Health System
Northwell Health was initiating plans to replace its existing IT service management solution and wanted to ensure that its new approach to providing IT services included more robust remote support capabilities than the health system had at that time. It was also critical that the new solution comply with stringent data security regulations that Northwell must meet, such as HIPAA. Turpin researched a number of potential remote support solutions, but only Bomgar met all of Northwell’s requirements.
Major Retailer Achieves Compliance With the PCI Data Security Standard
A leading retail clothing company was operating multiple brick-and-mortar enterprises using a complex patchwork of systems for identity management across its Unix, Linux, and Windows systems. When the company created a new division to handle consolidated online sales for all its enterprises, the complexity of their systems came to a head. The online division was having difficulty complying with the Payment Card Industry (PCI) Data Security Standard. The problem was that the organizations has too many different operating systems, domains, and directory services made it impossible to manage user ID and passwords systematically. The company also needed to address issues of inefficiency. For the end users, engineers and developers, it’s very difficult to maintain continuity for their day-to-day work with multiple account IDs and passwords across the enterprise.
Technical College Reduces Malware and Extends Lifetime of PCs with PowerBroker
The technical college was experiencing increased demand on their network and seeing the opportunity for malware infiltration growing. Over the past several years, the Director of IT Services had been cleaning up the technical college’s PC environment: first locking down PCs in the labs, and then removing elevated privileges for faculty and staff. By allowing only the fewest or least rights actually needed by faculty and staff, the Director of IT Services hoped to prevent the installation and spread of malware. The Director also hoped that reining in unauthorized software installs would result in fewer resource-hogging components on college PCs. With less extraneous software, the PCs could provide acceptable performance for a longer period of time, therefore allowing the college to maximize the useful life of its PCs. Simply eliminating admin rights, however, would mean that any software install would require an IT Help Desk staff person to gain access to the PC and perform the installation. Deploying IT staff around the campuses for each install would introduce a frustrating delay for faculty and staff. And, the time involved simply to coordinate these sessions would continue to increase as the number of college-maintained PCs was also expanding.
Gap Inc. Direct, Utilizes Red Hat & PowerBroker Identity Services “AD Bridge”
In late 2003, Gap Inc. Direct needed to revamp its entire end-to-end business technology platform — from the customer-facing front-end system, to the back-end order management application, to the business tools that supported the company’s long-term growth strategy. Previously, Gap Direct’s e-commerce platform was largely built on Microsoft Windows. The need for new features — as well as concerns about the platform’s ability to scale given the retailer’s ambitious growth plans drove Gap Inc. Direct to evaluate alternative solutions to the Microsoft platform. Gap Inc. Direct uses Microsoft’s Active Directory (AD) for administrative tools to grant and control end-user permission, but AD by itself doesn’t support Linux or Unix, this resulted in the need for several systems administrators and analysts to analyze all of the logs of hundreds of servers every time an audit needed to be performed — a task that took IT employees away from their day-to-day responsibilities.
A Smooth Road to Compliance for a Large Health Plan
The company was faced with upgrading its aging risk and compliance infrastructure, which previously relied on a disparate group of point products to scan for vulnerabilities and assess different operating systems for Sarbanes-Oxley and other types of compliance. Status data from the disparate solutions was imported into a SQL database onto which the IT department had built some limited dashboarding and reporting capabilities. However, IT personnel were still required to spend time writing custom code in order to extend the point solutions and enable them to interact with the database. In fact, the lack of integration among the various systems was creating inefficiencies that hampered the company’s ability to prepare for and pass compliance audits. The company sought a comprehensive and cost effective model for risk and compliance that would not only be easier to use and maintain, but provide a truly unified view into the status of all systems. As a UNIX shop, the company also needed a solution that could perform the deep, credentialed scans required for real protection from vulnerabilities, while also protecting the system’s root password.
Off shore Call Center Locks Down Thousands of Linux Desktops
The customer service division’s offshore call center had grown to over 5,000 Linux desktops that needed to be better managed and secured. Because authentication was being handled locally on the Linux machines, there was no easy way for the IT department to verify that any security policies were being followed. The company lacked the kind of central user account management for its Linux fleet that Active Directory typically provides for a Windows shop. In addition, the management of new hires, departures, and changing job roles had become a challenge. High turnover rates at the call center just made the problem worse.
Major Telecom company Migrates from niS to active directory with beyondTrust®
The telecom company had just completed an internal security audit and found that their NIS directories were not compliant with Sarbanes-Oxley (SOX), and they needed to find a modern solution. Microsoft® Active Directory was their ideal choice, but they needed to migrate their existing NIS user accounts and groups into Active Directory, as well as manage a vast array of non-windows infrastructure. In its main datacenters, the telecom carrier had in excess of 4,000 Unix servers and 1,000 Unix and Linux workstations that were currently being administered with NIS. They also had over 137,000 user accounts, of which less than 40,000 accounts were active users in the company. In addition to the complexity of the Unix infrastructure and the large number of user accounts, the telecom company also managed the Unix attributes of each user in NIS. Each Unix attribute (e.g., password policy) corresponded to an individual NIS domain. In total the company had 155 unique NIS domains, meaning that for each of the 137,000 user accounts, there were up to 155 additional attributes to manage.
Case Study: Bomgar Extends IT Service Provider’s Reach Across Platforms
PlumChoice, a fee-for-service online support company, was using Citrix’s GoToAssist™ as their remote access tool. However, as the popularity of Mac systems increased and the market for mobile devices such as smart phones, digital cameras and MP3 players exploded, PlumChoice realized their remote support solution no longer met their needs. GoToAssist did not support any systems beyond the Windows platform and failed to provide the security measures PlumChoice needed to be compliant with its customers’ industry standards. PlumChoice started to receive requests from their partners to extend beyond the Windows platform and began reevaluating GoToAssist™ as their remote support solution. They needed a solution that would record every support session and agent interaction.
Zappos: Internal Support That Is “Powered By Service”
Zappos.com's dispatch & helpdesk teams faced the challenge of supporting approximately 1,600 employees located in two different time zones and merchandisers who travel globally. Traditional tools, such as VPNs, were used but with sporadic and limited success. The challenge was further complicated by the need to support a multi-platform environment that includes Windows, Linux, and Mac. The IT team also saw the evolving requirement to support mobile devices internally. The rapid expansion of the company's headcount over the last few years has put more pressure on IT for support and training.
Helping a National Memorial Manage Its Critical Operation Systems
The National September 11 Memorial Museum, located at the World Trade Center site, is a significant institution documenting the events of September 11, 2001. The museum relies on numerous operation systems for its functioning, and the IT staff needed a robust and secure remote support solution to ensure 100 percent uptime for these systems. The team of technicians in the Memorial’s IT department work in a virtual environment and knew it was necessary to deploy a remote support solution that enabled them to meet the demanding requirement of constant uptime while ensuring security.
NowNerd and NerdDeck: Remote Support Capabilities to Build a Business On
NowNerd, an IT technical support provider, faced challenges when it contracted with a national retailer to provide remote support. The company experienced difficulties with its existing system and decided to develop a proprietary support dashboard, NerdDeck, to offer a white label remote support interface that could be branded for each individual client. The company needed a reliable, user-friendly, and secure platform for remote support that could handle retail transactions. After months of testing and evaluating different solutions, Bomgar emerged as the clear choice.
Bomgar Enables World-class Service for Chili Security
Chili Security, a Denmark-based company providing technology support to private users and small businesses, was facing scalability issues with its existing remote support assistance tool, TeamViewer. The tool was slow and required manual processes, such as copying and pasting customers’ passwords and session IDs. Additionally, there were concerns with TeamViewer’s security measures. As the company was growing rapidly, it needed a solution that could scale with its expanding customer base and offer advanced features with a high-level focus on security.
Robust Remote Support Keeps Core Point of Sale Systems (POS) in Compliance
Murphy Oil USA, Inc., a subsidiary of Murphy Oil Corporation, operates nearly 1,200 retail gasoline stations across 23 states in the United States. The company's national support center provides remote technical support for the computers and point of sale (POS) systems at each of its retail locations. Prior to Bomgar, the company used a number of different remote support tools that it found to be inefficient and cumbersome. The IT team wanted to standardize on a single remote support solution that could troubleshoot all of its retail systems. Additionally, once the Payment Card Industry Data Security Standard (PCI DSS) was formalized, a PCI compliant remote support solution became a requirement.
Meeting Its “Students First” Initiative With Real-Time Visibility, Chat Capabilities And Robust Remote Support
When a new chief information officer joined Boise State University, he recognized the need to provide broader support for the university community, particularly the student body. This was in line with Boise State’s growing emphasis on the student experience. The university was in need of a remote support solution that could support users with Windows or Mac OS X operating systems and serve users outside the university network. The remote support tool in use at the time was cumbersome for the support technicians to use and only allowed them to support devices on the university’s network. The IT support department could not fully assist faculty, staff and students working off campus.
Achieving Best-in-Class Security and Productivity with BeyondTrust
Before BeyondTrust, Bechtle AG used various remote support tools that the team was not completely satisfied with. They lacked integration with their company ITSM solution, ServiceNow. In addition to increased IT productivity, Bechtle also wanted to achieve a higher level of data protection and IT security. They wanted a guarantee that their data would not go through foreign servers.
Norton Healthcare Achieves HIPAA Compliance and Scales Telehealth Offerings with BeyondTrust
Norton Healthcare, a leading healthcare provider in Louisville, Kentucky, was in search of a remote support tool that could help them lower costs, increase first-call resolution, reduce incident handling times, decrease call escalations, and reduce on-site visits. Additionally, the tool needed to be secure and meet HIPAA compliance standards, including data encryption and session recording. The demand for mHealth and telehealth services was increasing exponentially, and the number of mobile devices used amongst its workforce was continually increasing. The team needed a solution that could support all these endpoints securely. Furthermore, due to the COVID-19 pandemic, Norton Healthcare had to support a significantly increased number of remote workers, many of whom were using personal devices. The team needed to ensure that remote support and remote sign-in services were able to support BYOD in a secure fashion.
Embracing Technical & Business Leadership to Bolster Enterprise-Wide Security
The article discusses the challenges faced by organizations in securing their infrastructure from cyber threats. These threats can come from various sources, including criminals infecting networks with ransomware, hacktivists making political statements, careless mistakes by insiders, or ethical hackers compromising poorly defended infrastructure. Many companies take a lax approach to cybersecurity, either thinking they will never be breached or worrying that it's too expensive and will slow down their operations. Resistance to change associated with additional security controls and monitoring is common. Another hurdle is integration, with organizations often dealing with third-party apps, in-house customizations and software, on-site operating systems like UNIX, Linux, Windows, and OSX, and off-prem cloud-based apps that run on AWS and Google Cloud.
Managing Passwords & Local Administration Rights: a Two-Step Approach to a Secure Workflow
The company was facing a significant challenge in managing password vulnerabilities and local administration rights, which were identified as the two biggest security holes. The company's InfoSec team was constantly putting out fires, dealing with security issues as they arose, but there was no strategic approach to preventing these issues from occurring in the first place. The company needed a solution that would allow them to take a proactive approach to security, reducing the attack surface within their infrastructure and preventing breaches before they happened.
Global Software Developer Controlled Admin Privileges Across 5,000 User Endpoints
The software development company was required by a large customer within the banking sector to control excessive administrative privileges across approximately 5,000 user endpoints. The bank's requirement came after an annual onsite audit identified a risk in relation to endpoint privileges. The software developer committed to a timeline of only three months to implement and deploy an effective and secure solution. The challenge was to find a solution that could control access privilege without disrupting the day-to-day work of its many users (endpoints).
Privileged Access Management (PAM) Centralizes Access Management Across Multiple Properties & OT Networks
Oxford Properties Group, a leading global real estate investor, asset manager, and business builder, was facing a challenge in securing its operational technology (OT) and non-traditional endpoints. The company was looking to improve endpoint security for IoT, desktops, servers, and other devices. The IT team identified the need for a solution that would allow the many vendors that serviced the buildings access to what they required, but without installing any local software or VPNs. These tools can create security gaps, especially with regards to privileged access. The company was also looking for a solution that would not require the vendor to install any local applications—they simply request access and can connect to the network with any internet-enabled device.
License to Heal: Transitioning to Secure Remote Healthcare Services Across Wales
NHS Wales faced a significant challenge during the COVID-19 pandemic as they were forced to transition to remote work. The challenge was a combination of balancing logistical needs with maintaining quality of care. The NHS Wales Informatics Service, responsible for providing national IT systems and services to the Welsh NHS, had to adapt to this new situation. They provide direct IT service and desktop support to approximately 15,000 staff, with 12,000 of those staff members working in general practices in clinical or administrative staff roles, serving approximately three million citizens across Wales. The traditional approach of providing each user with a laptop and a VPN connection was not feasible due to the skyrocketing global demand for laptops. Therefore, they needed a solution that could provide remote access to the systems needed by the GPs.
Scaling Our Internal & External Help Desks with BeyondTrust Remote Support
The company, one of the world's largest payment and processing companies, has been aggressively expanding in the fintech space through acquisitions. This rapid growth has necessitated the scaling of all support systems and personnel to meet the increased demand for expertise. The company had accumulated seven different remote support websites and several data centers due to the acquisition of other companies and the launch of new products. The challenge was to streamline these systems and improve the efficiency and security of their support operations.
The Balance of Flexibility and Security with BeyondTrust
Ramboll, a Danish engineering, architecture, design, and consultancy firm, faced challenges in standardizing IT policies and procedures across its global offices due to its growth through mergers and acquisitions. The company had a high number of applications in use, with each country handling access privileges and admin rights differently. This resulted in an overburdened local IT team and a lack of visibility and control at the global level. The company also faced cybersecurity threats and needed to manage software licenses effectively. The challenge was to find a solution that would not only bolster and standardize application control and privileged management across the organization but also ensure license compliance and software standardization.
Just-In-Time: Privileged Access Management Is the Key to a Secure Network
The University of Utah faced a unique set of IT challenges due to its diverse blend of students, professors, contractors, staff, visitors, and IT personnel. Many individuals held multiple roles concurrently, and roles could change or pause over many years. The university's hospital environment added to the complexity, as some students were also employees with access to Protected Health Information. Managing all these permissions, privileges, and access was exponentially more difficult than in a more traditional organization. The university needed to increase visibility into its accounts and reduce its risk, specifically improving the way it handled privileged accounts.
An Agile Approach to Secure Remote Work in a Digital Era
In March 2020, all 30,000 employees for the state of Illinois were ordered to work from home in response to the spread of COVID-19. This posed a significant challenge for the state’s Department of Innovation and Technology (DoIT), which had to figure out a way to grant employees access to their workstations from their personal devices at home, while also meeting the state’s stringent compliance standards when granting access to critical state applications, systems and information. The state had previously used a variety of remote access solutions, including VPN, but these initiatives could only support up to 5,000 employees and could not scale to the level needed. The state needed a solution that it could implement quickly and with ease.
Privileged Remote Access Drives Security & Simplification
MANE, a leading flavor and fragrance group in France, was facing the challenge of preserving its business model and maintaining the secrecy of its formulas in a fast-evolving world where workplaces are experiencing accelerated digital transformation and relying more heavily on remote workers. The company needed to rethink its growth strategy and improve its IT infrastructure. They sought a secure solution to enable productivity for its modern work environment while ensuring its trade secrets stay secret. The company also needed to improve data and information system security by enhancing access controls, privilege management, and visibility over its numerous third-party suppliers and systems managers.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.