Case Studies.
Add Case Study
Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.
Download Excel
Filters
-
(1)
- (1)
-
(1)
- (1)
-
(1)
- (1)
-
(1)
- (1)
-
(1)
- (1)
- (1)
- View all 6 Technologies
- (1)
- (1)
- (1)
- (1)
- (1)
- (2)
- (1)
- (1)
- (2)
- (3)
Selected Filters
|
Driving Predictive Maintenance into ThyssenKrupp Elevators
TKE had a number of initiatives underway around the world to enable remote monitoring of its elevators. However, none of the solutions provided the data and insight required to move from a traditional reactive maintenance approach to one that is predictive and even preemptive, and all were challenged by information overload issues that limited their value. TKE wanted a solution that would enable it to anticipate and quickly resolve maintenance issues for the majority of the 1.2 million elevators it services across the globe.
|
|
|
Jacobs Douwe Egberts: Effectively mitigating risks with OT cybersecurity insight
JDE needed a partner with the expertise to provide a comprehensive overview of all cybersecurity risks and vulnerabilities across its factories. This included all operational technology computing systems used to manage the entire industrial operation.
|
|
|
Mitigating Cybersecurity Risks in Manufacturing: A Case Study of Jacobs Douwe Egberts
Jacobs Douwe Egberts (JDE), a global coffee and tea company, faced a significant challenge in the wake of a malware incident in 2017 that caused a computer outage across Mondelez’s global operations, resulting in losses of €100M. This incident served as a wake-up call for JDE to implement a robust cybersecurity program to protect its operational technology (OT), including the industrial control system (ICS) environment across its factories worldwide. The advent of Industry 4.0 has led to increased interconnectivity in manufacturing environments, making them more vulnerable to cyberattacks. Traditional IT security measures were no longer sufficient to protect JDE's manufacturing operations. The company needed a comprehensive overview of all cybersecurity risks and vulnerabilities across its factories, including all operational technology computing systems used to manage the entire industrial operation.
|
|