Case Studies.

Add Case Study

Our Case Study database tracks 8,303 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (16)
    • (6)
    • (6)
    • (4)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (2)
    • (1)
    • (1)
  • (2)
    • (1)
    • (1)
  • (1)
    • (1)
  • (1)
    • (1)
    • (1)
  • View all 8 Technologies
  • (5)
  • (4)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 7 Industries
  • (4)
  • (1)
  • (1)
  • (5)
  • (1)
  • (1)
  • (1)
  • (4)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 14 Suppliers
Selected Filters
21 case studies
Sort by:
SCADA Cyber Security Vulnerability Assessment - Honeywell Industrial IoT Case Study
SCADA Cyber Security Vulnerability Assessment
A U.S. power company employed regularly-recurring audits of various controls, systems and programs. However, when it came to a SCADA-based cyber security vulnerability assessment, the in-house audit team did not possess the specific combination of process control experience and cyber security risks. They realized they required a third-party expert with a unique combination of knowledge of the two worlds.
Download PDF
Carmaker Holds the Keys to Network Security - Huawei Industrial IoT Case Study
Carmaker Holds the Keys to Network Security
FAW-Volkswagen Automotive Company (FAW-VW) required a high number of communication terminals due to its rapid development. FAW-VW also faced challenges in security management, IT Operation and Maintenance (O&M) costs, and employees work efficiency. FAW-VW needed terminal security protection with reliable access control and user rights management and comprehensive network protection.
Download PDF
Security for Edge Computing and Mesh Network -  Industrial IoT Case Study
Security for Edge Computing and Mesh Network
An enterprise security client wanted to develop a security product to address decentralized IoT security. Numerous reports and articles have been written on the security vulnerability of Industrial Internet of Things (IoT), smart cities, smart buildings, smart home automation, and healthcare. The standard best practices and solutions for cloud security and application security do not adequately address the specific nuances of the Internet of Things, especially for edge-to-edge computing and networking.
Download PDF
Driving Digital Transformation: Mazak Corporation - Cisco Industrial IoT Case Study
Driving Digital Transformation: Mazak Corporation
Mazak required a common, standards-based method to securely connect and derive value from the rich, raw data in its machine tools. An advanced security system suitable for IT and operations technology (OT) was necessary to protect from both internal and external attackers. The application needed to run on the network infrastructure on the factory floor, immediately transforming process, overall equipment effectiveness (OEE), and sensor data. The fog application needed to support the MTConnect specification for integration with existing systems and sensors. Real-time analytics were required to process high frequency vibration, temperature, coolant, and sound inputs to inform operator action and drive business support systems.
Download PDF
Enel Secures Italian Power Generation Network - Nozomi Networks Industrial IoT Case Study
Enel Secures Italian Power Generation Network
Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid. This grid:• Serves 31 million customers• Has a net installed energy capacity exceeding 31 gigawatts• Includes more than 500 power generation plants,including hydroelectric, thermoelectric, and wind• Is managed and monitored by Enel 24/7/365• Is operated by Terna, the Italian Transmission System Operator (TSO)Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.
Download PDF
CAD/CAM Dental Solutions from Sirona - WIBU-SYSTEMS Industrial IoT Case Study
CAD/CAM Dental Solutions from Sirona
To protect intellectual property, prevent reverse engineering and avoid manipulation of appliances. To design customized appliances with low entry-level prices from software modules and license models. Precautions to prevent reverse engineering of .NET software include secure and high-performance protection methods. Medical appliances must be safeguarded from manipulation to comply with the directives of the MPG (the regulation body for medical appliances).
Download PDF
ALD Automotive - Zscaler Industrial IoT Case Study
ALD Automotive
ALD Automotive's rapid growth in 39 countries has led to an exponential increase in IT infrastructure complexity. In order to provide cost effective and high performance access when needed, a mix of local and central Internet connectivity has been established rather than backhauling all traffic to a central site. With the evolution of the Web, content has become more dynamic and threats more sophisticated. Secure hacks are encrypted and require SSL inspection. ALD Automotive was looking for a full complete security solution.
Download PDF
Going Mobile: Business on the Go - Huawei Industrial IoT Case Study
Going Mobile: Business on the Go
Haier is building a mobile application platform where all mobile applications running on this platform must be designed with unified security, architecture, management, and platform support capabilities. This new platform also must incorporate Haier's IT applications with smart devices.
Download PDF
COPA-DATA - WIBU-SYSTEMS Industrial IoT Case Study
COPA-DATA
From as early as 1991 COPA-DATA realized a need to find a long-term solution for copy protection – one that encompassed its corporate philosophy of openness and flexibility. Requirements included compatibility with Windows and a trouble-free experience for the customer, who should be able to transfer the key to new or modified equipment, and who is supported with the difficulties that can be encountered in an industrial environment – such as network connections being unavailable or defective.
Download PDF
VMI Group - WIBU-SYSTEMS Industrial IoT Case Study
VMI Group
With field engineers servicing sophisticated tire production machines around the globe, tire machine specialist VMI felt the need to secure access to the Programmed Logic Controllers on installations. This leading Dutch tire machine manufacturer realized that a centrally administered password key protection scheme would safeguard intellectual capital and machine investments for the future.
Download PDF
Data management as a part of your cybersecurity strategy - AUVESY-MDT Industrial IoT Case Study
Data management as a part of your cybersecurity strategy
Coordinating data in the age of digitalisation presents a real challenge, especially where production facilities are concerned. The task of maintaining the many and varied components used in production also entails working with a wide variety of different software packages (editors) Each change that is made to the software results in a new version that has to be securely stored – versions need to be properly managed and there can only ever be one version that is the latest authorised version. But how can you make sure that all changes that were made to the software now running on the machine/device were authorised?
Download PDF
Redefines Data Mobility for Kremsmuller Industrieanlagenbau KG -  Industrial IoT Case Study
Redefines Data Mobility for Kremsmuller Industrieanlagenbau KG
“The demands made on modern IT environments that guarantee access to company data from any location, at any time, have risen dramatically within a few years,” says Gregor Kremsmüller, CMO and executive board member of Kremsmüller Industrieanlagenbau KG. The challenge was to share business data securely. High data mobility is necessary to transfer data between branches (Romania, Russia, Abu Dhabi, Turkey), suppliers and customers. Recognizing that data mobility is a critical success factor for business, Kremsmüller opted to continue its successful cooperation with Hitachi Data Systems to construct the solution.
Download PDF
Providing Secure and Reliable SAP Cloud and Hosting Services - SAP Industrial IoT Case Study
Providing Secure and Reliable SAP Cloud and Hosting Services
SAP
Specializing in cloud-hosting and cloud recovery services, Bluelock works to mitigate risk and ensure mission-critical applications, such as SAP and SAP HANA, are always available to keep its clients’ businesses running. Bluelock tailors its solutions to meet the unique needs of every client, providing numerous certifications to securely handle Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), Health Information Technology for Economic and Clinical Health (HITECH), and other sensitive workloads for clients in finance, healthcare, and other industries with sensitive data.
Download PDF
IT Simplification to Improve the Healthcare Computing Environment - IBM Industrial IoT Case Study
IT Simplification to Improve the Healthcare Computing Environment
IBM
Increasingly sophisticated malware attacks can leave healthcare providers in a vulnerable position as they confront the critical need to improve security while also keeping IT costs under control. Concord Hospital has worked hard to cultivate a reputation for clinical and patient service excellence.As an example of its progressive approach to automating health service delivery, Hospitals & Health Networks magazine has named Concord one of the United States’ “Most Wired Hospitals” for several consecutive years. In order to maintain this level of operational excellence, Concord Hospital needed a solution to save time and resources while also improving results for software licensing, patch management, asset inventory and security configuration.
Download PDF
GenoSpace Boosts Population Analytics and Application Performance - Intel Industrial IoT Case Study
GenoSpace Boosts Population Analytics and Application Performance
Since maintaining the confidentiality of human genetic data is of paramount importance to GenoSpace, the company has made security a top priority. In an environment where breaches involving healthcare data have reached alarming levels, GenoSpace understands the costly business impact of noncompliance with HIPAA patient privacy regulations and industry-leading data security practices. For example, the Identity Theft Resource Center’s 2014 annual list of security breaches points out that the medical/healthcare sector accounted for more than 42.5% of all the breaches listed, topping all other categories. Since reporting requirements began, the US Department of Health and Human Services has tracked 944 incidents involving approximately 30 million individuals. Along with the persistence and enormity of this problem comes financial fallout. For example, in its study, 2014 Cost of Data Breach Study: Global Analysis, the Ponemon Institute estimated that the average cost of a data breach in 2014 was $3.5 million, an increase of 15% over 2013. Additionally, the average cost per record across all sectors also increased, from $188 to $201—and the per capita cost for healthcare was the highest across all industries at $316 per patient. And the typical fine for a data breach runs up to $1.5 million per incident. The cost of breaches to the healthcare sector overall is estimated at $5.6 billion annually.
Download PDF
Keeping Patient Information Secure for SCL Health - RSA (DELL) Industrial IoT Case Study
Keeping Patient Information Secure for SCL Health
SCL Health’s IT department faced unique challenges when planning their security. In addition to securing thousands of endpoints spread across three states, they also have to be compliant with HIPAA regulations. HIPAA, Health Insurance Portability and Accountability Act, sets rules for keeping patient information secure. If a healthcare organisation fails to secure sensitive patient information, they can face large fines and legal action. A major security goal was to make sure there were no malicious threats operating in their network. A singular locally installed anti-virus programme cannot protect against all threats. Advanced threats are smart enough to lie dormant for long periods of time and can bypass a specific antivirus engine’s vulnerabilities. SCL needed a solution that would provide stronger assurance of detecting all types of threats and that would help them show their efforts to maintain compliance with HIPAA.
Download PDF
Arkessa | Enabling IoT Security - Arkessa Industrial IoT Case Study
Arkessa | Enabling IoT Security
The assumption of trust which accompanied the early days of the internet is gone and replaced by privacy and security concerns accompanied with attitudes to risk which rise and fall across different sector and application scenarios. IoT covers a diverse range of services and products deployed in both managed and unmanaged use-cases with varying network topologies which bring different security challenges and new potential for attack.
Download PDF
Boosting visibility and insights with RSA Security Analytics, Archer and SecurID® - RSA (DELL) Industrial IoT Case Study
Boosting visibility and insights with RSA Security Analytics, Archer and SecurID®
– Partners HealthCare holds patient data, intellectual property and employee personal information, all of which must be protected – Security is an increasingly important priority for the board, so clear visibility and reporting on security status is essential – The organization needed to boost automation and standardize processes to enhance its security posture and compliance
Download PDF
Solution Integrator Partner with OpenDNS Strengthen Client Security - OpenDNS (Cisco) Industrial IoT Case Study
Solution Integrator Partner with OpenDNS Strengthen Client Security
Hacking is no longer a question of if, but when and how often. To Core’s 15 locations, this represents the point at which the IT industry’s long-running conversation around information security reached critical mass.Core Business Technology Solution has challenges in growing business by helping mid-level commercial clients with varying degrees of technical resources understand and reduce risk through the quick and easy deployment of a highly effective security solution.
Download PDF
Protection and Licensing in Chemical Analytics - WIBU-SYSTEMS Industrial IoT Case Study
Protection and Licensing in Chemical Analytics
For the launch of its new OMNIS product line, a titration platform for chemical laboratories, Swiss Metrohm AG required a protection system to safeguard the know-how invested in its software and a flexible licensing system that would allow for the creation of customized software licensing models for its laboratory instruments. One specific requirement posed by the company was the necessity to integrate the licensing and entitlement solution seamlessly with the company’s existing back office systems.
Download PDF
Secure Email Signature Management  - Microsoft Azure Industrial IoT Case Study
Secure Email Signature Management
Every day enterprises send out thousands of emails but can struggle to maintain visual and legal consistency in email signatures and many don't seize the opportunity to include marketing campaigns in company email signatures. With a rapidly accelerating number of emails being sent from mobile devices and websites, email signature management has entered a new level of complexity and is now also a matter of enterprise security on emails.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
Submit

Thank you for your message!
We will contact you soon.