Stefanini Prevents Zero-Day Attacks with Check Point R80.10 Solutions
Network Engineer, Dion King, explains how Check Point secured his company, Stefanini, from network cyber threats. For more information visit https://www.checkpoint.com/customer-stories/
Stefanini is an I.T. outsourcing company that provides on shore and near shore I.T. support for medium to large sized companies.
The company ran into new security concerns for preventing against zero-day attacks and protecting our customer’s information.
That's when they choose Check Point R80.10 to protect and manage gateways and firewalls.
Transcript
Stefanini is an I.T. outsourcing company that provides on shore and near shore I.T. support for medium to large sized companies.
With respect to the network our security concerns are preventing against zero day attacks and protecting our customer’s information.
Nowadays it's important to protect customer’s information because at the end of the day information is directly tied to a company's reputation.
Not only are you risking financial assets you're also risking your reputation by not protecting your customers data.
We typically see 1 gig of data constant for our customers accessing websites and web servers hosted by Stefanini.
We use R80. 10 to manage all of our gateways from policies to user object creation and it's the central administration point for all of our enterprise firewalls.
I'd say for Stefanini the ease of administration that's come from R80.10 has certainly been the biggest benefit to us coming from disparate tools that didn't have good graphical user interfaces
It saves us time and training and administration.
The concurrent administration capability has to be one of the greatest advantages.
No longer have we tied to one user being able to make modifications at a time and it certainly helps our team work better and more efficiently together.
I utilize smart log on a daily basis and I’m troubleshooting incidents and correlating information. It's invaluable the information that it provides.
The improvements that we were able to see in the VPN logging information especially has helped us to tremendously increase our security posture as it relates to our customers and the connections we have between our partners.