Case Studies.
Add Case Study
Our Case Study database tracks 8,303 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Filters
-
(3)
- (2)
- (1)
- (1)
-
(3)
- (1)
- (1)
- (1)
-
(1)
- (1)
- (1)
- (2)
- (1)
- (1)
- (1)
- (1)
Selected Filters
|
IIC - Security Claims Evaluation Testbed
Provide a Testbed to allow testing of security claims and other security related testing evaluation.
|
|
|
MouseJack Case Study
In order to prevent eavesdropping, most vendors encrypt the data being transmitted by wireless keyboards, however it appears that the same security was not built into the mouse communications. The communication between the dongle and mice tested by the research team showed that there was no authentication in place, leaving the dongle unable to determine the difference between commands originating from the user’s mouse and those coming from an attacker. This results in the ability for an attacker to pretend to be a mouse and transmit their own packets to the dongle.
|
|
|
BAZIS-CENTER
The main objective is the software roll out to customers. At a closer look the licensing platform should be an entry point for end users with granted rights only to access their specific licenses, safe enough to guarantee a protected environment even without dongle distribution in the field, and fully powerful for optimal and swift data processing even on a time box implementation scenario.
|
|
|
Cisco Systems Use the Observer Platform for Faster Troubleshooting
Prior to purchasing Observer, Cisco Systems experienced a lack of visibility during and after network events.“I needed large data captures and a way to manipulate them,” says Eric Arnold, Service Provider Video TAC Manager for the company.Arnold states that Cisco Systems chose Observer over competitors because of the packet capture and storage capabilities.
|
|