Case Studies.

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 732 Suppliers
Selected Filters
19,090 case studies
Man-Made Stars: Evaluating Structural Integrity in High Performance Nuclear Fusion Machines for Power Generation
Comsol
The primary challenge faced by the MIT Plasma Science and Fusion Center (PSFC) researchers was to design a compact nuclear fusion machine, the Advanced Divertor eXperiment (ADX), capable of sustaining reactor-level heat fluxes and magnetic fields. The ADX needed to simulate the conditions of a full-scale fusion reactor while being a research and development testbed. The design had to withstand high temperatures, magnetic fields, and plasma disruptions, which are significant sources of stress. Plasma disruptions, particularly vertical displacement events (VDE), pose a severe threat as they generate large eddy currents and Lorentz forces that can cause substantial stress and displacement in the vacuum vessel. The researchers needed to ensure that the ADX could survive these conditions without structural failure.
Shake, Rattle, and Roll
Comsol
Anyone who has slept near an airport will know the sensation — an early morning flight wakes you from sleep, not only because the engine is noisy but also because everything around you seems to be shaking. Likewise, people living near wind turbines, military sites, or hospitals with helicopter landing pads often complain that windows rattle and everyday objects buzz when there is external noise. More puzzling for them is the fact that even when they can discern no sound, they may still notice irritating vibrations. If the response of the sound is 20 vibrations per second (20 Hz) or less, it is described as infrasound, meaning that the original sound is not usually audible to the human ear. The effects, however, are very easy to detect. As waves hit windows, spread to the floor, and affect internal walls, they induce a noticeable indoor vibration. Low-frequency sound waves are notorious for their potential to create annoying disturbances. Noise is part of modern life and there are formal standards that use sound pressure level measurements to recognize high-frequency sound waves at levels of sensitivity, intrusion, and danger for humans. According to Finn Løvholt of the Norwegian Geotechnical Institute (NGI), the generation of building vibration due to infrasound is an area of research that has not been explored extensively. For this reason, NGI, an international center for research and consulting within the geosciences, has been running investigative programs for several years on behalf of the Norwegian Defence Estate Agency.
Improving Gas Pipeline Squeeze-Off Standards with Numerical Simulation
Comsol
Routine natural gas maintenance often requires digging into main roads, causing significant disruptions. GTI aimed to investigate the industry standards for squeeze-off length in gas pipelines to make the process more efficient and less invasive. The current ASTM standard requires a squeeze-off distance of either three pipe diameters or twelve inches from the next pipe fitting, whichever is greater. This large length requirement leads to more digging, rerouted roads, and increased time and costs. GTI researchers sought to determine if the twelve-inch distance is necessary for smaller pipes, aiming to reduce the minimum required distance without exceeding industry-accepted levels of strain and stress concentration.
Graphene Paves the Way for Next-Generation Plasmonics
Comsol
Graphene, a single-atom-thick film of graphite, has shown immense potential in various applications since its discovery in 2004. While its electrical and thermal conductivity made it attractive for electronics, its optoelectronic capabilities were initially overlooked. However, it soon became clear that graphene could serve as a transparent conducting electrode, offering comparable or better performance than indium tin oxide (ITO). Despite its potential, fabricating high-quality, large-area graphene films remains a challenge. This has hindered the practical application of graphene in optoelectronics and photonics, particularly in the field of plasmonics, which deals with the efficient excitation, control, and use of plasmons. The diffraction limit of light poses a fundamental challenge in photonics, but plasmonics helps address this by enabling light confinement at the nanoscale. Researchers at Purdue University, led by Alexander V. Kildishev, are leveraging simulation tools to overcome these challenges and bring graphene closer to practical applications.
Simulating Printhead Unimorph Actuators at FUJIFILM Dimatix
Comsol
The primary challenge faced by FUJIFILM Dimatix was to design unimorph diaphragm actuators for their newest ink deposition products. These actuators needed to be miniaturized to reduce costs while maximizing deflection and matching the actuator's impedance to the flow channels and nozzle. The goal was to generate a droplet meeting a target mass at a given velocity with a target maximum firing frequency for the available voltage. The complexity of the design required a deep understanding of the interactions between the piezoelectric materials and the surrounding components, necessitating a robust simulation approach to optimize the design parameters.
Medtronic Advances Ablation Technology with Multiphysics Simulation
Comsol
Physicians rate predictability as their number one concern with ablation performance. The higher the level of predictability, the easier it is for a physician to plan a treatment procedure that will be safer, more effective, and less time-consuming. RF ablation procedures face challenges due to varying electrical conductivities of tissues and the rapid decrease in electrical conductivity as tissue temperature approaches 100°C. This makes it difficult to generate temperatures high enough to cause cell breakdown. MW ablation technology attempts to overcome these limitations by using an EM field radiated into the tissue. However, tissue type and vaporization of water during ablation cause the size and shape of the EM field to vary, affecting predictability.
From Spreadsheets to Multiphysics Applications, ABB Continues to Power Up the Transformer Industry
Comsol
Companies developing new and improved power transformer equipment incur costs for prototyping and testing as they work to reduce transformer hum. At ABB, a team of engineers develops multiphysics simulations and custom-built applications to offer insight into their designs. Transformer noise often comes from several sources, such as vibrations in the transformer core or auxiliary fans and pumps used in the cooling system. Each of these sources needs to be addressed differently to reduce noise. ABB’s transformers comprise a metal core with coils of wire wound around different sections, an enclosure or tank to protect these components, and an insulating oil inside the tank. Passing alternating current through the windings of one coil creates a magnetic flux that induces current in an adjacent coil. The voltage adjustment is achieved through different numbers of coil turns. Because the core is made of steel, a magnetostrictive material, these magnetic fluxes — which alternate direction — cause mechanical strains. This generates vibrations from the quick growing and shrinking of the metal. These vibrations travel to the tank walls through the oil and the clamping points that hold the inner core in place, creating an audible hum known as core noise. In addition to the core noise, the alternating current in the coil produces Lorentz forces in the individual windings, causing vibrations known as load noise that add to the mechanical energy transferred to the tank.
Capacitively Coupled Plasma Analysis
Comsol
The multiphysics nature of plasmas presents enormous challenges for numerical simulations; analysis of the CCP process presents added difficulty due to the existence of a plasma sheath, the dynamic behavior of the plasma, and the large number of RF cycles required to reach a periodic steady state. Power deposition into the plasma is highly non-linear and the strong gradient of the electric field in the plasma sheath may lead to numerical instabilities unless a sufficiently fine mesh is applied. Typical CCP reactors may also contain sharp geometric corners that can cause a substantial local electric field that provide unphysical ion fluxes.
Giving Furniture Testing a Leg Up
Comsol
The furniture industry requires rigorous testing to ensure products meet safety and quality standards. This process is costly and time-consuming, often resulting in significant expenses for manufacturers when designs fail. An independent test house aimed to reduce this burden by providing a virtual testing tool to predict whether chair designs would pass or fail before physical testing.
WiTricity Leverages Magnetic Resonance for Flexible Wireless Charging
Comsol
Other options for wireless energy transfer require precise device positioning on a pad or holder, very close proximity to the charging source, and the source can only charge a single device with a single coil. WiTricity engineers aimed to overcome these limitations by leveraging magnetic resonance to enable more flexible and efficient wireless power transfer. They needed to design a system that could charge multiple devices simultaneously, over distances, and through various materials, while maintaining high efficiency and low power losses. Additionally, they faced the challenge of making the technology scalable for a wide range of devices, from smartphones to electric vehicles, and ensuring that the system met safety regulations for electromagnetic fields.
The Sweet Side of Simulation Behind the Scenes at Nestlé
Comsol
Ensuring the consistency and quality of chocolate bars, wafers, and cereals is a significant challenge for Nestlé. For chocolate bars, the flow rate and pressure of the chocolate exiting each nozzle must be consistent to ensure uniform weight and nutritional content. For wafers, uneven heating during baking can cause different moisture concentrations, affecting texture and potentially causing spontaneous snapping. For cereals, the high-temperature extruder must maintain consistent pressure and friction to cook the dough evenly, and the viscometer housing must withstand high pressure to ensure consistent dough quality.
Simulations for Solar
Comsol
The semiconductor industry relies heavily on silicon wafers, which are also crucial for photovoltaic (PV) applications. However, the cost per unit of power generated by solar cells needs to be reduced to make solar energy competitive with fossil fuels. EMIX's challenge was to optimize their continuous cold crucible casting (4C) process to produce high-purity silicon efficiently. This process involves numerous variables, including cooling methods, pull rates, and electromagnetic fields, which need to be optimized to improve production efficiency and reduce costs.
The Thermal Management of Li-ion Battery Packs
Comsol
Given the long development cycle for vehicles, automobile manufacturers must plan their upcoming lines far in advance. With growing emission regulations and the rising cost of gas, full electric and hybrid vehicles are becoming more attractive and growing in market share. At the Fiat Research Center in Orbassano, the focus is on developing electric and hybrid vehicles using lithium and lead-acid batteries as well as supercapacitors. Fiat currently has several light trucks that run on electric drives, and the next application will be an electric version of the Fiat 500, which has been announced for the US market. The challenge lies in combining as many as 100 lithium-ion battery pouch cells into battery packs that generate the 350V needed while providing sufficient cooling and keeping the packs as small and light as possible. The maximum temperature differential among all the cells in a pack must not exceed 5 °C. If the temperature of the pack is too low, it limits the charge you can extract; if it is too high, it risks thermal runaway, leading to electrolyte emission, smoke, or fire.
Virtual Material Design in 3D Printing Makes Headway with Multiscale Modeling
Comsol
Anisotropic materials behave differently depending on the direction they are loaded, but current methods of material production offer limited control over anisotropy. This limitation makes it difficult to exploit the advantages of anisotropic materials for product design. Researchers at TNO aimed to develop a procedure for designing manufacturable anisotropic structures using stiffness and topology optimization techniques. They sought to create materials with specific properties, such as twice the stiffness in one planar direction compared to another, and to extend these capabilities to multimaterial structures. The challenge was to optimize the local distribution and orientation of materials at the microlevel and then scale these optimizations to larger devices while maintaining feasible computation times.
Optimizing 3D Printing Techniques with Simulation Apps
Comsol
One of the challenges of shaped metal deposition (SMD) is that thermal expansion of the molten metal can deform the cladding as it cools, resulting in a final product that is different than what was anticipated. To predict the outcome of a proposed design, it is necessary to either minimize the deformations or alter the design to account for them. This requires solving a time-dependent coupled thermomechanical analysis that predicts residual thermal stresses and deformation, which arise from SMD thermal cycles.
Using Multiphysics Simulation to Prevent Building Damage
Comsol
In extreme climates, moisture and temperature changes can damage building foundations. Vahanen Group, a company specializing in building services, analyzes the potential for frost damage in buildings being considered for renovation. Their work is especially vital in cases where renovations are necessary due to existing damage, such as when heating systems and pipes need to be replaced. The challenge is to determine whether certain renovations to foundations or heating systems would require adding external frost insulation, which, if added unnecessarily, would waste valuable money, time, and work.
Arctic Wolf Helps Southern US-Based Construction Company Stay Protected and Reduce Cyber Risk as It Moves to the Cloud
As more organizations leverage digital technology, processes become more efficient, and the speed of doing business accelerates. However, digitization expands the attack surface, particularly for companies in the supply chain. A southern US-based construction company recognized the growing threats and the need to bolster its defenses. The company had limited visibility with former security solutions and vendors and needed to strengthen its security posture following a cyberattack. The leadership was initially concerned about the cost of new security solutions but changed their stance after frequent reports of increasing attacks in their industry.
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Charleston Southern Puts Trust in Arctic Wolf for 24x7 Protection from Growing Cyberthreats
Data breaches are steadily rising at universities, costing an average of $4.77 million per breach, according to a recent report by the Ponemon Institute and IBM Security. The report also revealed that higher education ranked seventh on the list of 17 industries that face increasing cyberthreats. That’s because hacking into university networks can be quite lucrative for cyber thieves. Universities routinely store a large amount of data, including personal identifiable information (PII) such as social security numbers and financial information that—in the wrong hands—is typically used for identity theft and to open fraudulent accounts. The potential for data breaches kept Charleston Southern University Technical Director Shannon Phillips up at night. There hadn’t been a significant cybersecurity incident at the university, but Phillips knew that threats were mounting throughout higher education. Plus, recent ransomware attacks were increasing in their tri-county area—one target was located right behind the university. For two years, Phillips lobbied to add a security position to his team, which included just himself and two technical staff. However, the university couldn’t compete with the higher-paying firms in the area that attract top security talent. Phillips decided the university needed a managed solution that would alert the team to security threats they could investigate internally—and a partner that could take over and respond to cyberthreats when the situation warranted. Included among its needs were 24x7 security monitoring to assure its environment was always being evaluated for cyberthreats. Given the typically tight budgets in smaller universities, it also needed a solution that wouldn’t require a large financial investment.
Fullsteam Employees Ramp up Compliance and Security Hygiene with Arctic Wolf Managed Security Awareness
Security awareness and compliance are always top of mind in the payment card industry. At least they should be. Unfortunately, too many companies still fail to uphold to the benchmarks of the industry’s data security standard (PCI DSS), which states businesses must “implement a formal security awareness program to make all personnel aware of the importance of cardholder data security,” as well as educating personnel “upon hire and at least annually.” In fact, the percentage of fully compliant firms has sunk in recent years to 28 percent, according to Verizon’s 2020 Payment Security Report. Not only does this mean costly fines for many, but it puts them at greater risk of a data breach, which can lead to consequences that are far worse. For Fullsteam™, a leading software and payments provider with more than 35 companies under its umbrella, security and compliance are an even greater ongoing concern because failure to comply could affect the viability of the FullsteamPay payments platform and its payment processing capabilities. It could suffer reputational damages and rising insurance rates, and hinder its ability to win over new merchants—in effect, many of the same costs incurred by businesses that suffer an actual breach. So, Fullsteam is hardwired in its attention to the cybersecurity landscape and its determination to always meet the payment industry’s regulatory obligations. Security Awareness Needed to Be Fully Effective, Not Simply Check a Box Even with the right mindset and strategic planning, however, Fullsteam faced significant challenges in delivering a security awareness program that could get its ever-growing number of employees from continuous acquisitions up to speed quickly. In the words of Jon Armstrong, Fullsteam’s Director of IT & Security, “Generally speaking, annual security awareness training is completely ineffective because it is never timely, and it is always the same because no one bothers to update it.” What’s more, Fullsteam sought a centralized, highly automated solution that wouldn’t require its IT team to direct countless hours in developing and maintaining the program. Armstrong and his team need to focus on business initiatives that grow the success of the company and are busy enough without having to add security awareness training to their to-do list. It’s unrealistic and ultimately unproductive for them to have to curate and deliver content on a regular basis to ensure it’s up to date and keeps employees focused on cyber hygiene. Ultimately, Armstrong sought to find a provider that would do more than help the company be PCI compliant organization wide. He also wanted to ensure all employees understood that they were expected to be responsible individually and collectively for demonstrating and maintaining proper cybersecurity behavior based on best practices to continually raise Fullsteam’s IT security posture—and that Fullsteam would provide the solution for them to meet those expectations.
Planters Bank Grows Securely With Arctic Wolf for Security Operations
Planters Bank faced significant challenges in managing and securing its diverse and distributed network infrastructure. The bank needed to fulfill audit and regulatory compliance requirements, particularly those outlined by the Federal Financial Institution Examination Council (FFIEC) and overseen by the Federal Deposit Insurance Corporation (FDIC). Additionally, the bank's IT team lacked the resources to achieve 24/7 monitoring, which left them vulnerable to potential threats and compliance issues. The existing piecemeal systems were insufficient for comprehensive monitoring, and the bank risked missing dangerous threats due to the lack of visibility and real-time insights.
Arctic Wolf Helps Howard, LLP Strengthen Its Security Posture Amid Growing Cyberthreats in the Accounting Industry
Despite billions invested annually in cybersecurity products to reduce business threats, data breaches still occur far too often. Since 2014, data breaches reported by CPA firms increased by more than 80 percent, as the cost of outside counsel for litigation can run as high as $300,000. Factoring in additional costs for state and federal monitoring after a breach, firms like Howard have made cybersecurity a high priority. With growth on the horizon, Howard knew it would take on increased cybersecurity risk. Professionals at the firm routinely worked from their own devices, which led to a BYOD culture with more devices to secure. Email communications were particularly risky—to both Howard and the thousands of clients it serves. Howard has an IT team of less than five full-time employees. The firm had logs that recorded security threats, but the limited staff had little time to monitor threats, and staff members were suffering from alert fatigue. Thankfully, no significant threat had occurred at Howard, but the firm knew it was just a matter of time. Howard’s Chief Technology Officer Chris Barnes set out to evaluate the various cybersecurity offerings on the market to strengthen the firm’s security posture. He wanted a solution that provided greater visibility into the firm’s network, along with 24x7 monitoring and the ability to quickly identify and respond to security threats—all without requiring additional in-house IT staff or an astronomical financial investment.
Arctic Wolf Helps Bay Area City Stay Protected and Reduce Cyber Risk
Cyberattacks on local governments are increasing at an alarming rate. In recent years, there have been major attacks on Atlanta and Baltimore, other large metro government agencies, and smaller locales. Atlanta’s recovery stretched out for more than a year to the tune of approximately $7.2 million. These cyberattacks can potentially disrupt critical infrastructure like utilities upon which residents rely. Because utilities are so critical, they are now high-value targets for malware, ransomware, and denial-of-service attacks. And hackers often have a false perception that cities can simply print money to quickly get their vital systems up and running again. As attacks on cities made increasing headlines, one city government in the San Francisco Bay Area knew they needed to fortify its network and systems. As a first step, it joined government-sponsored organizations related to cybersecurity such as the Multi-State Information Sharing and Analysis Center® (MS-ISAC) that releases frequent bulletins on potential zero-day attacks and critical patches. The city shared this and other information with their IT staff, but knew there was more it needed to do.
Arctic Wolf® Supports City of Monroe as Extension of Their Internal Team
Seated in northeast Louisiana, the City of Monroe oversees a variety of departments and services with a staff of over 1,000 employees. While the city operations may be large, the IT department only has eight employees. They are also in the cross hairs of threat actors. Schools near Monroe found themselves attacked by ransomware, and phishing is a consistent threat finding its way into the city employees’ email accounts. According to the Verizon Data Breach Investigations Report, social engineering is the top attack vector for local governments, and the public sector was the second most-attacked sector. In Louisiana, the National Guard was called in prior to the 2020 election due to a series of attacks on local governments across the state. Those threats have the IT staff on high alert, and since they are managing multiple solutions, alert fatigue, which could lead to the small team missing a major threat, is also on their minds. While the city prides themselves on a proactive approach to cybersecurity, even hosting a statewide summit, for local governments and municipalities like Monroe, budget is a major barrier when it comes to improving cybersecurity. Technology is expensive, not to mention the staff needed to onboard, maintain, and monitor those solutions. Attracting and retaining talent is difficult, and even when a town or city has the financial means to build a security operations function in-house, scaling staffing levels to achieve round-the-clock coverage remains a challenge. The City of Monroe knew that an external security option, one that could integrate with their solutions while offering expertise, was the best route to improve their security posture and thwart future threats.
Arctic Wolf® Gives Scott Equipment ‘Peace of Mind’ While Helping Company Improve Security Maturity
Many organizations that were previously analog-only and brick-and-mortar first have found themselves digitizing more and more as technologies and business needs change. This digitization helps the business grow and thrive, but it also widens an attack surface and creates new cyber threats that weren’t previously present. Many organizations in this position find themselves behind the curve when it comes to cybersecurity, IT staffing, and proactive security measures. They are innovating when it comes to their business model, but struggling to stay ahead when it comes securing and expanding their IT environment. Scott Equipment is a perfect example of that kind of organization. The construction equipment company has been providing the best heavy-duty construction equipment, working with world-class manufacturers, and providing equipment servicing since before cyber threats were a common problem. But as Scott Equipment has grown over the decades, so has their digital footprint. Now the company relies just as much on emails, networks, and digital assets as it does bulldozers and cranes. Keeping their networks and IT systems protected is now as critical for their business continuity as their ability to provide great equipment and customer service. But with a lean IT team, the organization has not been able to meet the security demands of a changing business landscape. Five years ago, Scott did not have multi-factor authentication for their Microsoft Office accounts. That oversight resulted in accounts being compromised through phishing attacks. For the small IT team, it was a lot to clean up and a major wake-up call about their cybersecurity and lack of control. They immediately implemented new security measures, including MFA, and started re-prioritizing security efforts. But as that incident lived in their memory, another threat started looming on the horizon: ransomware.
Arctic Wolf Protects DNI Corp as It Ramps up Digital Marketing Solutions
DNI Corp faced several cybersecurity challenges as it expanded its digital marketing solutions. The company needed 24x7 monitoring to ensure round-the-clock protection and sought a security solution that could integrate seamlessly with Microsoft 365. Additionally, the IT team was overwhelmed by alert fatigue and false-positive alerts, which hindered their ability to focus on customer and revenue-generating activities. The increased reliance on online solutions expanded DNI's attack surface, making a robust cybersecurity defense imperative.
Sheridans Chooses Arctic Wolf® as One of Its Key Security Partners
Law firms hold and retain large amounts of sensitive client information that cybercriminals would love to get their hands on for exploitation. From corporate finances to business contracts, employment details, intellectual property, and more — critical data is at risk and the number of breaches is only increasing. Professional services firms accounted for 25 percent of all cyber attacks in 2022 according to Aon Insurance.\n\nSheridans specializes in legal services for the media and technology sectors, working with a wide range of commercial organizations from small businesses to household names in addition to market-leading work with media figures and well-known celebrities. Confidential details around earnings, real estate, and family disputes can make or break the reputation of these organizations and individuals, in addition to Sheridans’ reputation.\n\nUp until recently, this information would be stored and retained in on-premises infrastructure and only accessed from within the secure perimeter of the office by authorized staff. However, with the rapid shift to digital systems and an increasing need for on-demand access to data 24x7, a significant amount of information is now being stored and processed in cloud-based technologies and services. As such, law firms now must take serious steps to holistically improve their cybersecurity posture or risk having clients’ data exposed by bad actors.
Financial Institution Thwarts Penetration Test with Deception
The challenge facing the infosec team was that, like many security professionals, the volume of alerts generated by their current devices was not only overwhelming, but almost guaranteed that something malicious would slip through unnoticed. The impact to the team was that they were spending the majority of their time analyzing alerts rather than remediating threats in their system and thus were forced into being reactive to attacks once they were well underway. They recognized that they needed an accurate and efficient solution to detect attacks from all vectors and the ability to cut through the noise and generate only high-integrity alerts with zero false positives.
Major Entertainment Organization Deploys Deception for Insider Threat Visibility
The organization’s greatest challenges were driven by their large network and that they had multiple high-traffic locations with little to no visibility into activity that could be indicative of a stolen credential attack. Essentially, there was no way to distinguish between an employee using their credentials to access a project and a malicious actor using stolen credentials to steal intellectual property. This proved extremely troublesome for the organization because it forced the infosec team to patch their visibility gaps with multiple different products that generated a high volume of alerts with the majority being false positives. Moreover, the team had to spend their resources monitoring the devices and, given there was not enough bandwidth to research every alert that was generated, they were forced to escalate false positives because they did not have enough actionable information to decipher a real threat buried within the noise. The time burden of false positives had a palpable impact on the team’s ability to successfully protect their intellectual property and their bottom line. The infosec team needed a solution that would not only be able to monitor and thwart stolen credential attacks, but also be able to cut through the noise of their network with substantiated, actionable alerts.
Deception Technology Derails Ransomware Attack on Regional Healthcare Provider
The hospital’s existing security controls did not provide enough actionable intelligence or alerts to mitigate current and future attacks. The security team learned of attacks from end users or by seeing ransomware encrypting critical data on their network shares. Responding to this particular attack was very resource intensive as the team was forced to manually quarantine and remediate the individual endpoints and then check the local network shares for encrypted files. The team did not obtain the attack forensic information they needed to quickly analyze the malware and deal with its polymorphic nature. The security team found manual remediation extremely problematic because it required significant time to gather attack information and respond to the infected systems. The incident response approach was resource intensive and reactive, as opposed to a proactive response to an attack. The security team lacked confidence that when they mitigated an attack, it would not reoccur – they did not know if they had truly stopped it.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.