Case Studies.

Our Case Study database tracks 8,303 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (16)
    • (6)
    • (6)
    • (4)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (2)
    • (1)
    • (1)
  • (2)
    • (1)
    • (1)
  • (1)
    • (1)
  • (1)
    • (1)
    • (1)
  • View all 8 Technologies
  • (5)
  • (4)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 7 Industries
  • (4)
  • (1)
  • (1)
  • (5)
  • (1)
  • (1)
  • (1)
  • (4)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 14 Suppliers
Selected Filters
21 case studies
SCADA Cyber Security Vulnerability Assessment
Honeywell
A U.S. power company employed regularly-recurring audits of various controls, systems and programs. However, when it came to a SCADA-based cyber security vulnerability assessment, the in-house audit team did not possess the specific combination of process control experience and cyber security risks. They realized they required a third-party expert with a unique combination of knowledge of the two worlds.
Carmaker Holds the Keys to Network Security
Huawei
FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.
Security for Edge Computing and Mesh Network
An enterprise security client wanted to develop a security product to address decentralized IoT security. Numerous reports and articles have been written on the security vulnerability of Industrial Internet of Things (IoT), smart cities, smart buildings, smart home automation, and healthcare. The standard best practices and solutions for cloud security and application security do not adequately address the specific nuances of the Internet of Things, especially for edge-to-edge computing and networking.
Driving Digital Transformation: Mazak Corporation
Cisco
Mazak required a common, standards-based method to securely connect and derive value from the rich, raw data in its machine tools. An advanced security system suitable for IT and operations technology (OT) was necessary to protect from both internal and external attackers. The application needed to run on the network infrastructure on the factory floor, immediately transforming process, overall equipment effectiveness (OEE), and sensor data. The fog application needed to support the MTConnect specification for integration with existing systems and sensors. Real-time analytics were required to process high frequency vibration, temperature, coolant, and sound inputs to inform operator action and drive business support systems.
Enel Secures Italian Power Generation Network
Nozomi Networks
Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid. This grid:• Serves 31 million customers• Has a net installed energy capacity exceeding 31 gigawatts• Includes more than 500 power generation plants,including hydroelectric, thermoelectric, and wind• Is managed and monitored by Enel 24/7/365• Is operated by Terna, the Italian Transmission System Operator (TSO)Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.
CAD/CAM Dental Solutions from Sirona
WIBU-SYSTEMS
To protect intellectual property, prevent reverse engineering and avoid manipulation of appliances. To design customized appliances with low entry-level prices from software modules and license models. Precautions to prevent reverse engineering of .NET software include secure and high-performance protection methods. Medical appliances must be safeguarded from manipulation to comply with the directives of the MPG (the regulation body for medical appliances).
ALD Automotive
Zscaler
ALD Automotive's rapid growth in 39 countries has led to an exponential increase in IT infrastructure complexity. In order to provide cost effective and high performance access when needed, a mix of local and central Internet connectivity has been established rather than backhauling all traffic to a central site. With the evolution of the Web, content has become more dynamic and threats more sophisticated. Secure hacks are encrypted and require SSL inspection. ALD Automotive was looking for a full complete security solution.
Going Mobile: Business on the Go
Huawei
Haier is building a mobile application platform where all mobile applications running on this platform must be designed with unified security, architecture, management, and platform support capabilities. This new platform also must incorporate Haier's IT applications with smart devices.
COPA-DATA
WIBU-SYSTEMS
From as early as 1991 COPA-DATA realized a need to find a long-term solution for copy protection – one that encompassed its corporate philosophy of openness and flexibility. Requirements included compatibility with Windows and a trouble-free experience for the customer, who should be able to transfer the key to new or modified equipment, and who is supported with the difficulties that can be encountered in an industrial environment – such as network connections being unavailable or defective.
VMI Group
WIBU-SYSTEMS
With field engineers servicing sophisticated tire production machines around the globe, tire machine specialist VMI felt the need to secure access to the Programmed Logic Controllers on installations. This leading Dutch tire machine manufacturer realized that a centrally administered password key protection scheme would safeguard intellectual capital and machine investments for the future.
Data management as a part of your cybersecurity strategy
AUVESY-MDT
Coordinating data in the age of digitalisation presents a real challenge, especially where production facilities are concerned. The task of maintaining the many and varied components used in production also entails working with a wide variety of different software packages (editors) Each change that is made to the software results in a new version that has to be securely stored – versions need to be properly managed and there can only ever be one version that is the latest authorised version. But how can you make sure that all changes that were made to the software now running on the machine/device were authorised?
Redefines Data Mobility for Kremsmuller Industrieanlagenbau KG
“The demands made on modern IT environments that guarantee access to company data from any location, at any time, have risen dramatically within a few years,” says Gregor Kremsmüller, CMO and executive board member of Kremsmüller Industrieanlagenbau KG. The challenge was to share business data securely. High data mobility is necessary to transfer data between branches (Romania, Russia, Abu Dhabi, Turkey), suppliers and customers. Recognizing that data mobility is a critical success factor for business, Kremsmüller opted to continue its successful cooperation with Hitachi Data Systems to construct the solution.
Providing Secure and Reliable SAP Cloud and Hosting Services
SAP
Specializing in cloud-hosting and cloud recovery services, Bluelock works to mitigate risk and ensure mission-critical applications, such as SAP and SAP HANA, are always available to keep its clients’ businesses running. Bluelock tailors its solutions to meet the unique needs of every client, providing numerous certifications to securely handle Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), Health Information Technology for Economic and Clinical Health (HITECH), and other sensitive workloads for clients in finance, healthcare, and other industries with sensitive data.
IT Simplification to Improve the Healthcare Computing Environment
IBM
Increasingly sophisticated malware attacks can leave healthcare providers in a vulnerable position as they confront the critical need to improve security while also keeping IT costs under control. Concord Hospital has worked hard to cultivate a reputation for clinical and patient service excellence.As an example of its progressive approach to automating health service delivery, Hospitals & Health Networks magazine has named Concord one of the United States’ “Most Wired Hospitals” for several consecutive years. In order to maintain this level of operational excellence, Concord Hospital needed a solution to save time and resources while also improving results for software licensing, patch management, asset inventory and security configuration.
GenoSpace Boosts Population Analytics and Application Performance
Intel
Since maintaining the confidentiality of human genetic data is of paramount importance to GenoSpace, the company has made security a top priority. In an environment where breaches involving healthcare data have reached alarming levels, GenoSpace understands the costly business impact of noncompliance with HIPAA patient privacy regulations and industry-leading data security practices. For example, the Identity Theft Resource Center’s 2014 annual list of security breaches points out that the medical/healthcare sector accounted for more than 42.5% of all the breaches listed, topping all other categories. Since reporting requirements began, the US Department of Health and Human Services has tracked 944 incidents involving approximately 30 million individuals. Along with the persistence and enormity of this problem comes financial fallout. For example, in its study, 2014 Cost of Data Breach Study: Global Analysis, the Ponemon Institute estimated that the average cost of a data breach in 2014 was $3.5 million, an increase of 15% over 2013. Additionally, the average cost per record across all sectors also increased, from $188 to $201—and the per capita cost for healthcare was the highest across all industries at $316 per patient. And the typical fine for a data breach runs up to $1.5 million per incident. The cost of breaches to the healthcare sector overall is estimated at $5.6 billion annually.
Keeping Patient Information Secure for SCL Health
RSA (DELL)
SCL Health’s IT department faced unique challenges when planning their security. In addition to securing thousands of endpoints spread across three states, they also have to be compliant with HIPAA regulations. HIPAA, Health Insurance Portability and Accountability Act, sets rules for keeping patient information secure. If a healthcare organisation fails to secure sensitive patient information, they can face large fines and legal action. A major security goal was to make sure there were no malicious threats operating in their network. A singular locally installed anti-virus programme cannot protect against all threats. Advanced threats are smart enough to lie dormant for long periods of time and can bypass a specific antivirus engine’s vulnerabilities. SCL needed a solution that would provide stronger assurance of detecting all types of threats and that would help them show their efforts to maintain compliance with HIPAA.
Arkessa | Enabling IoT Security
Arkessa
The assumption of trust which accompanied the early days of the internet is gone and replaced by privacy and security concerns accompanied with attitudes to risk which rise and fall across different sector and application scenarios. IoT covers a diverse range of services and products deployed in both managed and unmanaged use-cases with varying network topologies which bring different security challenges and new potential for attack.
Boosting visibility and insights with RSA Security Analytics, Archer and SecurID®
RSA (DELL)
– Partners HealthCare holds patient data, intellectual property and employee personal information, all of which must be protected – Security is an increasingly important priority for the board, so clear visibility and reporting on security status is essential – The organization needed to boost automation and standardize processes to enhance its security posture and compliance
Solution Integrator Partner with OpenDNS Strengthen Client Security
OpenDNS (Cisco)
Hacking is no longer a question of if, but when and how often. To Core’s 15 locations, this represents the point at which the IT industry’s long-running conversation around information security reached critical mass.Core Business Technology Solution has challenges in growing business by helping mid-level commercial clients with varying degrees of technical resources understand and reduce risk through the quick and easy deployment of a highly effective security solution.
Protection and Licensing in Chemical Analytics
WIBU-SYSTEMS
For the launch of its new OMNIS product line, a titration platform for chemical laboratories, Swiss Metrohm AG required a protection system to safeguard the know-how invested in its software and a flexible licensing system that would allow for the creation of customized software licensing models for its laboratory instruments. One specific requirement posed by the company was the necessity to integrate the licensing and entitlement solution seamlessly with the company’s existing back office systems.
Secure Email Signature Management
Microsoft Azure
Every day enterprises send out thousands of emails but can struggle to maintain visual and legal consistency in email signatures and many don't seize the opportunity to include marketing campaigns in company email signatures. With a rapidly accelerating number of emails being sent from mobile devices and websites, email signature management has entered a new level of complexity and is now also a matter of enterprise security on emails.

    Contact us

    Let's talk!

    * Required
    * Required
    * Required
    * Invalid email address
    By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
    No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
    Submit

    Thank you for your message!
    We will contact you soon.