Download PDF
Invitalia Leverages IoT to Secure Perimeters and Drive Economic Growth
Technology Category
- Cybersecurity & Privacy - Network Security
- Infrastructure as a Service (IaaS) - Public Cloud
Applicable Industries
- National Security & Defense
- Telecommunications
Applicable Functions
- Procurement
- Product Research & Development
Use Cases
- Cybersecurity
- Tamper Detection
Services
- Cloud Planning, Design & Implementation Services
- Cybersecurity Services
The Challenge
Invitalia, Italy’s national agency for inward investment and economic development, was faced with the challenge of securing critical data and assets as it pursued a cloud-first strategy. The agency, which is responsible for coordinating investment and development across the country, manages the tender process for national infrastructure projects and helps find funding for start-ups. As a critical piece of national infrastructure, Invitalia is a target for cyber criminals. The agency needed to be agile, secure, and flexible, without sitting on great swathes of unused IT resources. The cloud allowed the business to consume resources as needed, but with sensitive funding and commercial data at the center of Invitalia’s portfolio, the agency was under constant threat. Additionally, the agency was also looking to reduce the strain on its in-house cybersecurity team in the face of an escalating number of attacks.
About The Customer
Invitalia is Italy’s national agency for inward investment and economic development. It is responsible for coordinating investment and development across the country. Invitalia manages the tender process for national infrastructure projects and helps find funding for start-ups. The agency's work impacts at a national and personal level. Invitalia is a critical piece of national infrastructure and an offshoot of the Italian Ministry of the Economy. It is charged with boosting economic activity, helping start-ups find financial support, and driving regional growth. It acts as a bank, an insurance company, and a data analysis unit.
The Solution
To address these challenges, Invitalia turned to Check Point Infinity Total Protection, Check Point Harmony Endpoint, Check Point Harmony Mobile, Check Point CloudGuard Network Security, and Check Point CloudGuard Posture Management. Check Point Infinity paired with Check Point CloudGuard IaaS delivered automated and flexible public cloud network security to keep Invitalia’s assets and data protected while staying aligned to the dynamic needs of the public cloud environments of Microsoft Azure. Check Point SandBlast™ Mobile kept mobile devices protected against threats to the apps, OS and network without impacting device performance while Check Point SandBlast™ Agent protected Invitalia’s environment against zero-day malware. The engagement also included Check Point Dome9 which provided visibility, control, and compliance across all cloud assets allowing Invitalia to visualize and assess their security position and configuration. Infinity SOC completed the infrastructure enabling a quick response to the most severe threats with automated triage and a single click remediation across Cloud, End Point and Mobile.
Operational Impact
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.