Ziften's Zenith for Steel Distributor

Additional information

Source: Web-site of vendor

The project has been delivered on schedule

The budget has not been exceeded

Functionality complies with task

Description

Problem The customer is a leading steel stockholder and distributor that was founded more than 100 years ago. It currently has multiple divisions operating in Europe and serves customers around the world. Despite the customer’s global reach, this case study concerns the use of Ziften in one of its business unit offices, with several hundred endpoint systems. Before using Ziften’s solution, the customer was experiencing a number of common pain points typical of organizations with smaller IT security departments. For example, although they were using McAfee antivirus software and Microsoft System Center Configuration Manager, the customer was unsure whether these solutions were actually working as intended. This uncertainty also extended to the customer’s practices for threat detection and remediation, which were rather rudimentary. Prior to using Ziften, resolving issues required physical access to the endpoint, which often meant having users bring their laptops to the IT department. Challenge:
  • No formal process for detecting, responding to, or remediating security issues
  • Lack of visibility into important risk, threat, and behavioral events on their endpoints
Trial During the proof of concept, Ziften was able to detect and remove malware on the customer’s network, as well as address a variety of other issues. Most importantly, the customer gained full visibility into the status of its users, systems, and applications, which had been sorely lacking in their previous situation. After the successful POC, the customer quickly moved to a full Ziften installation. Results:
  • Discovery and management of unmanaged IT assets
  • Real-time insights into the entire IT endpoint environment
  • Powerful capabilities for incident response and forensics
“The visibility we achieved with Ziften is top-notch,” said the customer’s head of IT operations. “Our old process for risk and threat detection and remediation used to take days, but now we fly through the process in a couple hours or less.”

Details

Business tasks

Centralize management

Ensure Compliance

Ensure Security and Business Continuity

Problems

Decentralized IT systems

IT infrastructure does not meet business tasks

No IT security guidelines

Aging IT infrastructure

Risk of data loss or damage

Similar deployments

prev
next