Case Studies.

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 733 Suppliers
Selected Filters
19,090 case studies
Home services provider raises cybersecurity bar for global businesses
The company, a U.K.-based global home repair and improvement services provider with 8.4 million residential customers, was seeking to standardize cybersecurity capabilities and centralize visibility across the infrastructure for its federated businesses in Europe, North America, and Asia. To address these objectives, the company standardized its cybersecurity environment on Bitdefender Managed Detection & Response (MDR) Enterprise.
Cybersecurity posture ranks high at university
When security software slows down endpoint performance to the point that it must be disabled, the solution no longer has any value. That’s what happened at a large university when its Sophos security software required significant computing resources, preventing virtual servers from functioning properly. Sophos was running on user workstations but reduced performance during scans and hampered user productivity. In addition, the solution burdened IT staff since it was painful to manage and deploy to endpoints and was often unsuccessful with blocking infections. The university’s IT team evaluated security solutions from Bitdefender, Trend Micro, and Cylance, and selected Bitdefender GravityZone Business Security Enterprise.
INglass redesigns cybersecurity strategy for better protection
In computer-aided design, advances in graphics rendering and modeling have demanded increasingly powerful computers. When a security solution at INglass, a plastics industry manufacturer, slowed down performance of workstations used by design engineers, complaints from users began to mount. The security software also generated frequent false positives, disrupting user productivity, and burdening the IT staff. In response, INglass considered cybersecurity solutions from Bitdefender, CrowdStrike, Cylance, Symantec, F-Secure, and Kaspersky. Bitdefender GravityZone stood out as the superior option for the company’s requirements.
Unified security solution drives growth for Virtual Vision
As cybersecurity threats have increased in volume and variety, Virtual Vision (V2), a cloud and managed service provider in Saudi Arabia, sought to provide customers with a unified endpoint security solution that addressed a broad range of requirements. In addition, V2’s existing endpoint security solutions were complex to use, as well as consumed significant compute resources, causing workstations and servers to run more slowly. After evaluating and testing several endpoint security solutions, V2 added Bitdefender GravityZone Cloud MSP Security to its offerings.
Close partnership drives business success at Pragma Computers
In the early years of business operations, Pragma Computers did not steer customers to a particular security solution. That all changed when the company formed a strategic partnership with Bitdefender about ten years ago. By joining forces with Bitdefender, Pragma Computers gained access to new growth opportunities in the cybersecurity world, as well as new technical skills and abilities. As a result, Pragma Computers capitalized on the newly acquired advantages, and business development exceeded expectations in a short period of time.
Leading Australian property group leverages Bitdefender’s reporting to improve security strategy
Over more than 25 years, Charter Hall has grown to become one of Australia’s leading property groups, and listed on the Australian Securities Exchange in 2005. With a distributed workforce of approximately 50 locations, and a remote working model to manage, Platforms and Infrastructure Manager Josh Carter, was looking for a security solution to protect 200 Virtual Servers and over 500 endpoints. Their incumbent solution was disparate, with different protection on the server and endpoints, inefficient reporting abilities, no hypervisor protection and generally felt “outdated, inadequate and not suited to virtualization” and therefore increased their business risk.
Magic Cloud takes security performance to new heights
As a service provider, Magic Cloud has more than its own operations to worry about. The company also has hundreds of customers running their businesses from its cloud-based infrastructure. That demands reliable, high-performing, secure operations. But Magic Cloud’s previous security solution was creating performance and manageability problems. For example, when antivirus scans kicked in, application performance dropped. Quite often, their previous solution consumed too much CPU power when updating a client server. And more than once, antivirus would find false positives and remove critical files that shut down several virtual machines (VMs) at a time. In addition, the management server provided limited insight, forcing IT to spend hours of painstaking manual effort to recover a deleted file.
Northstar elevates quality of IT services with cybersecurity
When you’re in the business of helping organizations manage their IT environments, security needs to be a top priority. Yet Northstar Services Ltd., a major IT services provider in the U.K., found that even with well-known security solutions, infections were attacking clients’ systems almost weekly and endpoints were running slowly. To address these shortcomings, Northstar’s engineers were consumed with labor-intensive infection cleanup, and operating system reinstallations. To reduce overhead and improve protection, Northstar conducted a market analysis of all the major security vendors and concluded the Bitdefender Cloud Security for Managed Service Providers (MSPs) offered the best solution.
BROMIUM CASE STUDY INTERPOL Washington
INTERPOL Washington faced significant security challenges including malvertising, email attachments, drive-by attacks, spear phishing, downloads, ransomware, and preventing data loss. They evaluated several vendors such as Cylance, Invincea, and SentinelOne before choosing Bromium. The primary drivers for selecting Bromium were to reduce the workload for their teams, eliminate crisis patch management, secure a mobile workforce, and protect business assets such as brand reputation and intellectual property.
Mosaic: Bromium’s Complete Endpoint Security Elevates Risk Posture
Paul Hershberger, director of security, risk and compliance at Mosaic, aimed to improve the company's overall risk posture by modernizing the computing environment and optimizing endpoint security. Mosaic faced advanced threats from state-sponsored bad actors, hactivists, external cybercriminals, and internal bad actors. Hershberger conducted a thorough risk assessment of Mosaic's existing security infrastructure, which included traditional threat-mitigation technologies like IDS, IPS, Web and email filters, desktop firewalls, antivirus, anti-malware, and anti-spam. Despite these measures, the residual risk was almost equal to the inherent risk, indicating that the current solutions were ineffective. Hershberger sought a more effective endpoint security solution and was introduced to Bromium's unique approach by a channel partner.
Bromium Case Study: National Membership Organization
The business faced significant security challenges before implementing Bromium, including zero-day threats, malvertising, email attachments, unauthorized file transfers, drive-by-attacks, watering holes, (spear) phishing, ransomware, persistent attacks, preventing data loss, and targeted attacks. The top purchasing drivers for Bromium were to secure a mobile workforce and protect business assets such as brand reputation and intellectual property.
Bromium Case Study: Masonicare Corporation
Masonicare faced significant security challenges including zero-day threats, email attachments, drive-by attacks, and ransomware. They evaluated Carbon Black before choosing Bromium. The primary driver for selecting Bromium was to reduce the workload for their security teams, particularly in terms of time spent investigating threats.
Nahdi Medical - Customer Success Story
Nahdi Medical Company faced the challenge of analyzing a vast amount of feedback from both employees and patients, which included comments on various topics such as employee salaries, vacation time, online pharmacy orders, delivery & pricing, and appointments. The primary issue was finding an error-free, accurate system that could analyze all the comments from patient voice data and surveys in Arabic without losing the nuances of the language. Existing text analytics solutions that translated non-English text into English first for sentiment analysis were not effective, as they diluted the nuances of Arabic text. Nahdi needed a solution that could seamlessly understand Arabic and its dialects, classify and categorize valuable feedback, and provide insights for strategic and focused decision-making.
Health-Links Success Story: Arabic Sentiment Analysis Solution
Health-Links faced several challenges in analyzing patient and employee feedback. The primary issue was the need for a robust, cloud-based sentiment analysis solution that could natively understand Arabic and handle mixed Arabic-English responses. The client needed to analyze a massive amount of unstructured text from over 12 million surveys annually. Manual interpretation was prone to human bias and errors, leading to inaccurate insights. The client required a solution that could provide sentiment scores for themes specified in the Saudi Complaints Taxonomy, enabling healthcare organizations to understand the pros and cons of their operations.
WakeUp! How a leading architecture firm boosted its patch success rates by 55%
Prior to their engagement with 1E, Sheppard Robson faced two major challenges. Firstly, the architecture sector is a regular target of cyberattacks, making it essential to keep software updated. However, the specialist software required by the firm’s employees was often enormous, causing updates to take an extremely long time. This necessitated managing updates outside of working hours, but they had no way of doing so with certainty. Secondly, the firm had sustainability targets to meet and a broader IT commitment to greater automation. The need to stay current with software updates and deploy the latest versions of highly technical tools caused Sheppard Robson to embrace Windows 10 and its servicing. However, the demanding update cadence created more trouble for end users, often resulting in chaotic Monday mornings where employees had to wait up to an hour and a half to log in. Additionally, the firm aimed to do more with less staff, focusing on automation to cover more bases with fewer people, making their operations quicker, simpler, and more effective.
How 1E and Tableau spun up a 5000-machine company in one week
The Tableau Conference 2016 presented significant logistical and technical challenges. With a record-breaking attendance of around 12,000 delegates and 5,000 laptops to manage, the event required a robust infrastructure to ensure smooth operations. The conference was spread across seven venues in Austin, Texas, adding to the complexity. Ensuring that all laptops were pre-loaded with the correct version of Tableau Desktop and ready for use in over 100 hands-on training sessions was a monumental task. The need for responsiveness and agility was paramount, as any small issue could disrupt the entire event. The traditional method of manually managing each machine was not feasible given the scale and time constraints.
US Bank Holding Company Achieves Federal Compliance Requirements Thanks to Nomad, Shopping and AppClarity
The company needed to build and migrate banking deployment systems quickly and efficiently. Additionally, a government bailout meant that the company was required to comply with federal mandates for migration – criteria it would be unable to meet using IBM’s manual migration processes. It also faced the challenge of manually identifying and installing applications once the OS was migrated.
From F to A: How 1E helped the US Department of Veteran Affairs (VA) make the grade
The US Department of Veteran Affairs (VA) faced significant challenges in managing one of the largest and most complex IT environments globally. With over 500,000 unique computing resources, including mobile devices, medical devices, workstations, BYOD systems, servers, and clustered environments, the VA struggled with software discovery, deployment, and usage calculations. The complexity was further compounded by the need to handle virtualized and clustered environments, making software licensing and compliance a daunting task. The VA's goal was to achieve a consolidated, de-duplicated, and normalized view of their entire IT environment, which required managing at least 300 million records of input data from multiple sources. Conventional inventory and management tools were inadequate for the scale and complexity of the VA's environment, leading to fragmented data and inefficiencies.
Multinational Engineering Firm Slashes Software Spend and Frees Up IT Team for Core Tasks
The company’s process to request and install software on end-users’ PCs was lengthy and resource intensive, hampering productivity and damaging the employees’ relationship with the IT department. The firm was spending too much on software outside of its enterprise agreement, as users were unaware of the cost implications. To resolve these issues, the company wanted an automated solution where users could choose, download and install software themselves quickly and easily, whilst being fully informed of the cost implications.
Cherokee County School District: Why Microsoft plus 1E is the best way to get to Windows 10
The Cherokee County School District (CCSD) faced significant challenges in managing approximately 40,000 PCs, all running Windows software. The primary issues included ensuring a strong network connection during Windows 10 upgrades, avoiding disruptions during critical tasks like registrations and test submissions, and managing the aggressive update schedule of the Windows 10 Servicing Model. The IT team needed a solution that could handle these challenges efficiently without causing interruptions to the educational process.
1E & Bacardi: a perfect cocktail for the Windows 10 era
In 2010, Bacardi decided to create a standard desktop lifecycle within the organization. The goal was to achieve a uniform environment for software deployment, security, and user experience across its 130 locations worldwide. However, the global dispersal of Bacardi's footprint presented several challenges in implementation. Initially, Bacardi's IT infrastructure was managed by a service provider using 1E solutions like Nomad and Shopping in conjunction with Microsoft's Configuration Manager (SCCM). Over time, Bacardi's IT team saw potential benefits in bringing the control of this infrastructure in-house, aiming for cost savings and increased agility, especially with the upcoming Windows 10 rollout.
PC Power Management: Claiming a Premium Environmental Footprint
On average, 60% of PCs were being left on after work on weekdays and over the weekend at Aviva. A key carbon efficiency measure implemented by the sustainable IT taskforce was a PC power management project with 1E.
US Brokerage Company Achieves Rapid Windows Migration, Meeting Federal Deadline
Having missed the transition from Windows XP to Windows 7, the company was determined to become an early adopter of Windows 8. It was prepared to meet its migration deadline by any means necessary, and had prepared for an army of on-the-ground technical resources to complete the migration manually. Although the company was open to an automated approach, the alternatives it looked at centered around native SCCM and only offered minimal time and cost savings.
Myanmar’s RedLink Communications Selects A10 CGNs to Improve Network Services
RedLink Communications faced significant challenges with IPv4 address scaling and exhaustion, which is a common issue for many Internet service providers. Traditional Network Address Translation (NAT) methods were breaking many applications, leading to a suboptimal user experience. The company needed a solution that could not only address the immediate IPv4 scaling concerns but also prepare the network for future connectivity demands, including the transition to IPv6. Additionally, RedLink required a solution that could provide high connection reliability and maintain established sessions during failover, all while being cost-effective and meeting service level agreements (SLAs).
Deutsche Telekom TeraStream: A Network Functions Virtualization (NFV) Using OpenStack Case Study
Deutsche Telekom faced the challenge of building a new, elastically scalable model for their core central-office data center optimized for performance, low latency, and cost. They needed to deliver IPv4 services to customers in a native IPv6 network and automatically provision IPv4 and other L4-7 services quickly and efficiently. The architecture had to comply with core ETSI NFV documents while maintaining simplicity and openness. The demand for broadband had exploded, and customers wanted always-on connectivity without paying a premium, driving average revenue per user (ARPU) lower. Traditional service delivery times were no longer competitive, requiring weeks or months to configure using conventional networking technologies.
Capgemini Solves Multi-Tenancy, Load Balancing and Virtual Context Problems with Thunder Series from A10 Networks
Capgemini had built out a multi-tenant data center to serve its customers. Using VLANs, Virtual Routing and Forwarding (VRF), firewall rules and application delivery controller (ADC) partitions, Capgemini ensures that each customer’s environment is secure and isolated. Capgemini had deployed Cisco ACE load balancers to load balance web, mail and other applications in the multi-tenant data center. However, the existing Cisco ACE load balancer hardware was running out of available virtual context, couldn’t be upgraded and was having issues – so another solution was needed fast.
Installation of AX Series Achieves Virtualization of Server Load Balancer Environment and Consolidation of Equipment
The game industry demands rapid service cycles, especially for mobile and web-based games. As the use of private and public cloud technologies has increased, the time to shape and release new game ideas has contracted significantly. This has placed more demanding requests on the Infrastructure Team, often requiring immediate preparation of load balancers towards the end of a development stage. Previously, procuring and configuring load balancers took several months, which was not sustainable for the fast-paced game industry. GameOn sought to improve this situation by installing a load balancer with virtualization features during a support contract termination.
Higher Education Institution in Need of Architecture Redesign to Support Network Growth
As the college grew rapidly, expanding globally with additional students, its incumbent IT infrastructure suffered, unable to meet the challenges brought by this growth. St. Petersburg College needed an advanced Application Delivery Controller (ADC) with multi-tenancy features in order to manage the diverse and rapidly increasing plethora of applications, spanning from classroom campus-wide applications such as Blackboard Learn+ to Enterprise Resource Planning (ERP) software such as Oracle PeopleSoft, in addition to Microsoft applications such as SharePoint, Lync and Exchange. St. Petersburg College’s major concern was to find a platform that could accommodate growth and significantly increase data center bandwidth. The solution needed to run efficiently and flawlessly, with no traffic impact during failover.
Box Scales Infrastructure with A10 Thunder ADC
Box, a rapidly expanding company, needed to manage explosive growth and increased customer demands on its network. The company required predictable scalability, reliability, and high throughput to manage its production environment’s high volume of application connections. Box had been using A10’s AX2100 ADCs but needed to add more capacity and features to support its growth strategy, which included increasing its customer base globally, expanding its presence with existing customers, targeting industry verticals, extending its sales reach through channel/strategic partners, and expanding its platform ecosystem.
A10 CGN Enables Reliable Carrier Grade NAT (CGN) Services
Wi2 faced the challenge of global IPv4 address exhaustion while experiencing a rapidly increasing number of users. The company used to assign public IPv4 addresses to client devices, but with the depletion of available IPv4 addresses and the expected surge in connecting devices, effective utilization and preservation of IPv4 addresses became critical. The need for a solution that could expand the capacity of each IPv4 address and maintain high application transparency and stability was imperative.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.