Case Studies.

Add Case Study

Our Case Study database tracks 1,845 case studies in the global IoT Ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Filters
  • (1)
    • (1)
  • (1)
  • (1)
  • (1)
  • (6)
Selected Filters
6 case studies
Sort by:
Achieved Self-learning Protection of Email Accounts and Users - DarkTrace Industrial IoT Case Study
Achieved Self-learning Protection of Email Accounts and Users
Guardsman Group and its subsidiaries are leaders in security, with clients across all industries around the Caribbean. It provides security equipment, personnel, and systems for some of the most prominent businesses in the region.One of the Guardsman's offices experienced an incident that saw all communications at that location affected. The team found that legacy security tools did not provide enough protection, with it taking hours to identify the source of the issue. At this point, Guardsman knew it needed a dynamic solution that could proactively identify threats like these.
Download PDF
How Traditional Defenses Let Major Threats Slip through - DarkTrace Industrial IoT Case Study
How Traditional Defenses Let Major Threats Slip through
 As a global company with over 1,200 employees and 24 subsidiaries, KTR systems has a diverse and complex digital infrastructure to protect. With increasingly subtle and sophisticated cyber-attacks targeting every corner of the digital ecosystems, the IT team sought a new approach that could detect and autonomously respond to these threats.
Download PDF
Targeted by Sophisticated Email Impersonation - DarkTrace Industrial IoT Case Study
Targeted by Sophisticated Email Impersonation
As a global company with over 1,200 employees and 24 subsidiaries, KTR Systems has a diverse and complex digital infrastructure to protect. With increasingly subtle and sophisticated cyber-attacks targeting every corner of the digital ecosystem, the IT team sought a new approach that could detect and autonomously respond to these threats.The team identified the threat before it could escalate and suffered no damage. However, by now it had become clear the team needed a robust solution to enable them to respond to email attacks 24/7.
Download PDF
Phishing Attacks and Spoofing Emails  - DarkTrace Industrial IoT Case Study
Phishing Attacks and Spoofing Emails
Safeguarding sensitive customer data is imperative for data service providers like Calligo who are committed to delivering reliable and secure services to their customers.Calligo was targeted by an increasing number of phishing emails that its existing security tools were unable to stop, including fake invoices sent to the accounting team. Fundamentally, Calligo required an email security solution that was able to provide better visibility across their vast digital ecosystem and, crucially, stops advanced email-borne threats that would otherwise go unnoticed – keeping their sensitive data safe.
Download PDF
Cyber AI Analyst Automates Investigations and Augments a Lean Security Team - DarkTrace Industrial IoT Case Study
Cyber AI Analyst Automates Investigations and Augments a Lean Security Team
Being a Cooperative financial institution, Confiar recognized the importance of having a  robust security stack and safeguarding its clients' sensitive data. The Cooperative had a range of traditional security tools in place, including firewall, anti-virus, and email protection, but needed a solution that could understand user behavior and protect against fast-moving threats like ransomware.  
Download PDF
Security Team Sought Packet-level Visibility - DarkTrace Industrial IoT Case Study
Security Team Sought Packet-level Visibility
As the digital infrastructure at EV Group became more complex, the team sought to improve its security stature by going beyond the log-based analysis that its existing security tools relied on. Their log-based SIEM technology gave a good overview of the digital estate, but a lack of packet-level insight at the network traffic layer meant that security incidents were not being recognized and controlled fast enough.The primary aim was to minimize the time between an event happening and it is acknowledged.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.