下载PDF
Forcepoint Helps Tekno Group Protect IP and Client Data While Controlling Costs
技术
- 网络安全和隐私 - 云安全
- 网络安全和隐私 - 数据库安全
- 网络安全和隐私 - 网络安全
适用功能
- 离散制造
- 质量保证
用例
- 网络安全
- 自动化制造系统
服务
- 云规划/设计/实施服务
- 网络安全服务
挑战
Tekno Group 是一家专门生产预涂金属产品的公司,其以前的安全解决方案面临挑战。该解决方案成本过高,并且跟不上技术的发展。该公司需要一种安全策略,既能保护其知识产权和客户数据,又能加强对电子邮件和网络威胁的防范,既要经济高效,又要保持最高质量。
关于客户
Tekno Group 是一家总部位于巴西的公司,专门生产预涂金属产品。该公司之前使用的安全解决方案成本过高,而且跟不上技术的发展。他们需要一种解决方案,既能保护其知识产权和客户数据,又能加强对电子邮件和网络威胁的防范,既要经济高效,又要保持最高质量。
解决方案
Tekno Group 决定实施 Forcepoint 的解决方案来应对挑战。他们使用了 Forcepoint Web Security、Forcepoint Email Security 和 Forcepoint Data Loss Prevention。这些解决方案通过网络和电子邮件渠道协调威胁响应,并对关键数据进行入站和出站保护。实施这些解决方案使 Tekno Group 能够在降低成本的同时增强保护。他们还获得了更好的入站和出站数据流可见性。
运营影响
相关案例.
Case Study
Plastic Spoons Case study: Injection Moulding
In order to meet customer expectations by supplying a wide variety of packaging units, from 36 to 1000 spoons per package, a new production and packaging line needed to be built. DeSter wanted to achieve higher production capacity, lower cycle time and a high degree of operator friendliness with this new production line.
Case Study
Robot Saves Money and Time for US Custom Molding Company
Injection Technology (Itech) is a custom molder for a variety of clients that require precision plastic parts for such products as electric meter covers, dental appliance cases and spools. With 95 employees operating 23 molding machines in a 30,000 square foot plant, Itech wanted to reduce man hours and increase efficiency.
Case Study
Fully Automated Visual Inspection System
Tofflon has developed a fully automatic machine that uses light to inspect vials, medicine bottles, or infusion containers for glass fragments, aluminum particles, rubber grains, hairs, fibers, or other contaminants. It also detects damaged containers with cracks or inclusions (microscopic imperfections), automatically removing faulty or contaminated products. In order to cover all production processes for freeze-dried pharmaceuticals, Tofflon needed to create an open, consistent, and module-based automation concept.
Case Study
SAP Leonardo Enabling Rocket Science
At times, ULA has as many as 15 different operating systems dedicated to overlapping processes, such as rocket design, testing, and launch. Multiple systems created unnecessary costs and unwanted confusion among workers at offices, factories, and launch sites in different location. In order to improve collaboration and transparency during vital activities that directly influence mission success, ULA wanted to improve data sharing and streamline manufacturing processes.
Case Study
Enel Secures Italian Power Generation Network
Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid. This grid:• Serves 31 million customers• Has a net installed energy capacity exceeding 31 gigawatts• Includes more than 500 power generation plants,including hydroelectric, thermoelectric, and wind• Is managed and monitored by Enel 24/7/365• Is operated by Terna, the Italian Transmission System Operator (TSO)Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.
Case Study
Securing the Connected Car Ecosystem
In-vehicle communications and entertainment system hosts high-value or sensitive applications. API libraries facilitate communication and sharing of vehicle data. These API libraries are vulnerable to reverse engineering and tampering attacks and may even result in loss of passenger safety. Attackers can inject malware that may be able to migrate to other in-car networks such as the controller-area-network (CAN) bus which links to the vehicle’s critical systems. Software provided for dealers to interface with cars through the OBD2 port is vulnerable to reverse engineering and tampering attacks. Hackers may be able to abuse these tools to inject malicious code into the ECUs and CAN bus. Attackers can lift the cryptographic keys used, and use that to build their own rogue apps/software. Their cloned version of the original app/software may have altered functionality, and may intend to gain access to other in-car networks.