Download PDF
Goulston & Storrs Enhances Client Data Security with Zscaler Workload Segmentation
Technology Category
- Analytics & Modeling - Machine Learning
- Cybersecurity & Privacy - Network Security
Applicable Industries
- National Security & Defense
- Telecommunications
Applicable Functions
- Maintenance
Use Cases
- Inventory Management
- Tamper Detection
Services
- Cloud Planning, Design & Implementation Services
- Data Science Services
The Challenge
Goulston & Storrs, an Am Law 200 law firm, faced several challenges in securing its client data. The firm needed to continually increase its level of protection to keep up with evolving threats. Operational inefficiencies due to outdated security mechanisms that did not align with modern applications were also a concern. The firm's security measures were complicated by policy management issues. The firm's private and public clouds, which are data-rich targets for cybercriminals, were often secured with firewall-based controls. These controls allowed malicious communications to piggyback on permitted network policies due to a lack of visibility beyond primitive network attributes. The firm needed a solution that could provide application-level enforcement and continuous trust assessments for gap-free security coverage.
About The Customer
Goulston & Storrs is an Am Law 200 law firm with offices in Boston, New York, and Washington, DC. The firm has more than 200 lawyers across multiple disciplines and is well known as a real estate powerhouse with leading-edge corporate, capital markets and finance, litigation, and private client and trust practices. The firm has been facing challenges in securing its client data due to evolving threats and outdated security mechanisms. Since partnering with Zscaler, the firm has been able to keep pace with the demands of its modern application environment and secure its network beyond the visibility and control offered by traditional firewalls.
The Solution
Goulston & Storrs partnered with Zscaler to secure its network beyond the visibility and control offered by traditional firewalls. Zscaler Workload Segmentation provided a level of security sophistication that was previously unavailable. Unlike perimeter defense security mechanisms, Zscaler Workload Segmentation modernized network security by using Trusted Application Networking to protect the cloud and data center where traditional methods were ineffective. The solution reduced the attack surface and mitigated two major risks—exposure of credentials and penetration of the network perimeter. Zscaler Workload Segmentation's topology mapping provided an accurate representation of the ever-changing environment and eliminated potential attack paths. The solution also safeguarded the firm's most valuable applications and financial software with a new trust model that approves communications based on the trustworthiness of software, hosts, and users.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.