Download PDF
CheckPoint Software > Case Studies > Beijing MTR Corporation Enhances Security with Check Point Solutions
CheckPoint Software Logo

Beijing MTR Corporation Enhances Security with Check Point Solutions

Technology Category
  • Cybersecurity & Privacy - Network Security
  • Networks & Connectivity - Gateways
Applicable Industries
  • National Security & Defense
  • Transportation
Applicable Functions
  • Logistics & Transportation
Use Cases
  • Inventory Management
  • Tamper Detection
Services
  • Cybersecurity Services
The Challenge
Beijing MTR Corporation, a joint venture between Beijing Infrastructure Co. Ltd, Beijing Capital Group, and MTR Corporation, operates the Beijing Metro Line 4. As a pivotal part of Beijing's transportation infrastructure, it was crucial for the company to uphold their security protection. The company faced several challenges including protecting business critical applications, securing remote access to internal assets for authorized users, managing 24 subway stations along with independent data and disaster recovery centers, and improving security across the organization. They needed to ensure uptime for services including exchange mail, client management servers, production and business services, and voice and video services. Additionally, they needed to safeguard their Internet, Intranet, and Application Data, protect network planning and OA office systems, and find a manageable solution covering all perimeter operations.
About The Customer
Beijing MTR Corporation is a joint venture between Beijing Infrastructure Co. Ltd, Beijing Capital Group, and MTR Corporation. The company owns and operates the MTR Metro Systems in Hong Kong and the Beijing Metro Line 4. As a property developer, it invests and builds railways. The company employs 1,800 people and is a crucial part of Beijing's transportation infrastructure. State-of-the-art IT systems are the cornerstone of modern subway operations, making it essential for the company to maintain high levels of security protection.
The Solution
Beijing MTR Corporation chose Check Point's comprehensive security solution to upgrade their protection. The solution provided protection across the Internet, Intranet, and Application Data. Check Point solutions were strategically deployed to protect the perimeters of the Internet and Applications/Data domain, the Internet DMZ double bastion host architecture, and also remote access for mobile workers. The company implemented a perimeter solution covering gateways, and allowing for secured access. With the SMART management architecture, they could centralize the management of all appliances and gateways, ensuring they could manage their security infrastructure as it expanded in the future. Two Check Point UTM-1 3070 appliances were clustered at the perimeter of the Internet domain with OSPF dynamic routing functionality, enabling real-time updates of network activity. At the Internet gateway, it offered SSL VPN protection to mobile users. In addition, its unified domain AD function module enabled unified authentication for users. The Power-1 5070 was clustered at the perimeter ensuring high-performance data access.
Operational Impact
  • The implementation of Check Point's comprehensive security solution has provided Beijing MTR Corporation with versatile and comprehensive security protection. It has strengthened their overall perimeter security and simplified their management processes. The solution has also prepared the company for future growth. The flexible SSL VPN remote access has simplified remote access processes and reduced costs. The excellent appliance performance, with the clustering of UTM-1 3070 appliances and Power-1 5070 cluster at the domain perimeter, has ensured high-performance data access and decreased downtime. The unified management has allowed for perimeter and network security to be centrally managed through a single console. The straightforward interface allows for security audits and SmartEvent analyzes and correlates events.
Quantitative Benefit
  • Flexible SSL VPN Remote Access allows remote workers and business partners access to the company’s internal network from any location
  • Clustering UTM-1 3070 appliances decreases down time
  • Appliance configuration and performance eliminates bottlenecks in the core network

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.