Download PDF
Huawei > Case Studies > Carmaker Holds the Keys to Network Security
Huawei Logo

Carmaker Holds the Keys to Network Security

 Carmaker Holds the Keys to Network Security - IoT ONE Case Study
Technology Category
  • Cybersecurity & Privacy - Network Security
  • Networks & Connectivity - Gateways
Applicable Industries
  • Automotive
The Challenge

FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.

The Customer
FAW-Volkswagen Automotive Company (FAW-VW)
About The Customer
FAW-Volkswagen Automotive Company (FAW-VW) is a Chinese joint venture between First Automobile Works (FAW) and Volkswagen Group. The enterprise has almost 20,000 employees working in three major production bases and 500,000 employees working along the veh
The Solution

The Terminal Security Management (TSM) system was installed to divide the intranet into several logical parts, enabling centralized system management and domain-based security protection. Key devices deployed in redundancy mode ensured service continuity. The TSM performed access control on the network, terminals, and network boundaries. Security protection measures, such as user authentication, security check, access control, operation monitoring, emergency response, and log audition, ensure network security. Hardware Components - HUAWEI Terminal Security Management (TSM) system - Security Access Control Gateway (SACG)

Data Collected
Access Control Status, Communication Performance, Data Security, Security and access
Operational Impact
  • [Data Management - Cyber Security]
    Unified security policy customization is enabled through the TSM system centrally manages FAW-VW’s terminals.
  • [Data Management - Data Security]
    Refining user rights management policies has ensured that users have the access rights to resources only required in their service of operation.
  • [Data Management - Data Analysis]
    Cloud solutions enable aggregation of 'big data' to enable more robust analysis and lower costs.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.