Download PDF
Prominent Museum in D.C. Enhances Security with Check Point's Consolidated Infinity Architecture
Technology Category
- Infrastructure as a Service (IaaS) - Hybrid Cloud
- Infrastructure as a Service (IaaS) - Public Cloud
Applicable Industries
- Glass
- National Security & Defense
Applicable Functions
- Human Resources
- Maintenance
Use Cases
- Inventory Management
- Tamper Detection
Services
- Cloud Planning, Design & Implementation Services
The Challenge
The prominent Museum in D.C., which documents, studies, and interprets history, faced a significant challenge in preserving and protecting irreplaceable documentation, photographs, videos, and recordings. The museum, which has welcomed over 40 million visitors, including 99 heads of state and more than ten million school-age children, was under constant threat from fifth-generation cyber-attacks. The museum's systems were barraged by hate emails, vicious social media posts, and increasingly sophisticated cyber-attacks from around the world. The museum also needed to protect user identities and credentials against account hijackings and secure SaaS and hosted applications across a multi-vendor hybrid cloud environment. The security team's first challenge was to manage and protect user identities across the entire infrastructure, with employees and partners located around the world with varying levels of online access to institutional assets.
About The Customer
The customer in this case study is a prominent Museum in D.C. that documents, studies, and interprets history. The museum has welcomed more than 40 million visitors, including 99 heads of state and more than ten million school-age children. It keeps one of the world's largest archives of significant historical events, focused on their digital preservation and storage. More than 16.5 million people from over 200 countries visit the site annually, which is available in 16 languages. The museum's systems are barraged by hate emails, vicious social media posts, and increasingly sophisticated 5th generation cyber-attacks from around the world.
The Solution
To address these challenges, the museum turned to the Check Point Infinity Architecture. This included Check Point CloudGuard SaaS, Check Point CloudGuard IaaS, Check Point SandBlast Network, and Check Point R80 Security Management. The museum chose SaaS applications, including Microsoft Office 365, Google Suite, file-sharing, and operations solutions, each hosted in its respective vendor's cloud and protected by Check Point CloudGuard SaaS. This provided zero-day threat, identity, and data protection while preventing employee account breaches. The museum also utilized Check Point CloudGuard IaaS to protect its applications that had been moved to public clouds. Check Point CloudGuard IaaS extended the same protection as the Check Point firewalls to the museum's applications in these public cloud environments. Check Point SandBlast provided multi-layered protection from known threats and zero-day attacks using Threat Emulation technology, as well as identity awareness, content awareness, antivirus, anti-bot, intrusion prevention, application control, and URL filtering capabilities.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Discrete Manufacturing Industries (Fiberglass Pipe)
The implementation of ERP software in a Discrete Manufacturing organization needs to be strategic, irrespective of its size and capacity. The client had already implemented an ERP system which fulfilled their requirements but was not efficient enough. Efficiency here meant Synchronized Planning, Updating and Multisite Planning. Planning at client’s place was done outside the ERP system. Lack of proper synchronization to the ERP system paved way to huge delays in the changes getting updated in the system. These delays caused disruption in achieving delivery schedules. Multisite Planning is a solution to an organization which has multiple production units (may or may not be geographically separated) and thus needs planning across these units to synchronize production activities within them. The client also has multiple factories and hence Production Planning control is very essential in their case. Since Multisite planning was not possible with Baan ERP system, this was another bottleneck for the client.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.
Case Study
Asia Airfreight Terminal Enhances Operational Efficiency with CommScope's RUCKUS Solutions
Asia Airfreight Terminal (AAT), a leading cargo handling company based out of Hong Kong International Airport, was facing challenges with its Wi-Fi network, which was critical for the functioning of its automated Material Handling System (MHS) within the warehouse. Any interference or lost signals could directly impact their operational efficiency. AAT also had separate networks for their office and CCTV cameras, which made the job of their data center challenging. The company was in search of a Wi-Fi network configuration that could streamline their networks and reduce its network management workload. AAT was already running on equipment from a competing vendor, and the new solution needed to prove its worth in scalability and reliability.