Case Studies.

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (2)
    • (2)
  • (1)
    • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (2)
  • (2)
  • (2)
  • (1)
  • (2)
Selected Filters
2 case studies
the Corero First Line of Defense Gives Hyve A Strategic Advantage Among UK Hosted Service Providers
Corero
Hyve, a leading UK IT service provider specializing in mission-critical cloud hosting, was looking to stand out among competitors in the large UK market. The company aimed to provide the utmost security to its customers while also ensuring continued availability through unhindered access to their systems. In today’s environment of increasingly sophisticated and common attacks, Hyve cannot deliver the performance and satisfaction its customers demand without addressing security threats that plague organizations the world over. To mitigate these risks and meet customer expectations, Hyve’s environment has multiple layers of defense, is ISO-27001 and PCI-DSS certified, and has been architected to prevent client cross-contamination if a problem does occur. Nevertheless, Hyve was still challenged by weaknesses in individual clients’ hosted environments. Being a proactive, security driven company, Hyve have looked for another line of defense to better protect the entire IT environment.
Jagex Drops the Warhammer Against Ddos with Corero
Corero
Jagex Games Studio, a Cambridge-based multi-award-winning games developer and publisher, was facing an increase in DDoS attacks for various reasons, including banning known DDoSers, attention-seeking purposes, and those looking for bragging rights. The company also faced extortion attempts, with bad actors threatening to take down the site unless Jagex paid their ransom requests. The company was also threatened with DDoS unless they made changes to the game itself. These instances posed a serious challenge to game availability, which is the lifeblood of the organisation. The company was using a legacy DDoS mitigation solution that was not performing to specifications and was based on time-consuming reactive policies in an industry that demands proactive defense measures.

    Contact us

    Let's talk!

    * Required
    * Required
    * Required
    * Invalid email address
    By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
    No thanks, I don't want to receive any marketing emails from IoT ONE.
    Submit

    Thank you for your message!
    We will contact you soon.