Download PDF
Check Point Power-1 Provides Robust Protection and Unrivalled Manageability for CSL Limited
Technology Category
- Cybersecurity & Privacy - Intrusion Detection
- Robots - Wheeled Robots
Applicable Industries
- National Security & Defense
- Telecommunications
Use Cases
- Intrusion Detection Systems
- Tamper Detection
The Challenge
CSL Limited, a leading mobile network operator in Hong Kong, faced a significant challenge in maintaining robust security protection for its services. As the first mobile phone operator in Hong Kong, CSL has a reputation to uphold among its 2.6 million customers. Any amount of service downtime could severely impact the company's image and reputation. The company operates in a highly competitive market with more than seven mobile service providers and around 11 million mobile subscribers. Given the 24x7 uptime requirement of a mobile service provider in such a competitive environment, attentive support and quick turnaround time from vendors was crucial. The challenge was to find a solution that could provide comprehensive protection against threats, offer one-stop deployment and service support, and ensure secure and continuous uptime.
About The Customer
CSL Limited is Hong Kong’s first mobile phone operator, established in 1983. As a leading mobile network operator in Hong Kong, the company has 2.6 million customers. CSL operates a world-class GSM / WCDMA network through which it offers comprehensive post and pre-paid mobile services to both local and international customers. CSL is also the leading roaming operator in Hong Kong and it is able to provide unmatched international multi-media connectivity with more than 260 destinations around the world. CSL is a subsidiary of Telstra Corporation Limited, Australia’s leading telecommunications and information services company.
The Solution
CSL Limited chose the Check Point Power-1 9070 appliance to address its security challenges. The company was impressed with Check Point’s new appliance solution, which offered a single vendor solution. The key decision factors for CSL were the ease of management, robustness, and scalability offered by the Check Point solution. The trade-in option offered by Check Point also helped to justify the price/performance of using the Check Point appliance. The Check Point Power-1 9070 combines firewall, IPSec, VPN, and intrusion prevention with advanced acceleration technologies, delivering a high-performance security platform for multi-Gbps environments. It delivers gateway throughput up to 14 Gbps and intrusion prevention throughput of 6.1 Gbps. The solution also streamlines the deployment of enterprise security with a hardware/software solution from a single vendor and centrally manages security policy for all sites with a single management console. With the SmartDefense™ Services subscription, the appliance can protect against emerging threats.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.