技术
- 网络安全和隐私 - 端点安全
- 网络与连接 - NFC
适用行业
- 电子商务
- 国家安全与国防
适用功能
- 质量保证
- 销售与市场营销
用例
- 网络安全
- 篡改检测
服务
- 云规划/设计/实施服务
- 网络安全服务
关于客户
橘子集团是一家总部位于台湾台北的电脑在线游戏和数字娱乐公司。它是第一个进军全球的台湾网络游戏品牌,在全球拥有超过1000万注册会员。集团业务涉及电子商务、支付、娱乐、营销、IT服务等多个领域。该集团的旗舰业务游戏橘子是一家手机游戏发行商,管理着世界上最著名的大型多人在线角色扮演游戏之一《冒险岛》。集团其他业务包括GASH Mall在线支付系统和台湾首创的GAMA PAY支付支付服务。
挑战
橘子集团是一家台湾企业集团,业务涉及在线游戏、电子商务、电子支付服务和 IT,面临着严峻的网络安全挑战。该组织在全球拥有超过 1000 万注册会员,是黑客和勒索软件攻击的主要目标。该集团的旗舰业务游戏橘子(一家手机游戏发行商)由于其业务性质而特别容易受到影响。该公司管理着世界上最著名的大型多人在线角色扮演游戏之一,MapleStory,该游戏吸引了各种各样的参与者,包括意图造成损害或试图从企业及其客户身上榨取金钱的恶意个人。该集团的其他业务,例如GASH Mall在线支付系统和GAMA PAY支付服务,也是网络攻击的主要目标。意识到所面临的高级威胁,橘子集团着手建立现代而强大的网络安全防御策略。
解决方案
在对网络安全市场进行广泛调查后,橘子集团选择 CyberArk 作为其身份安全合作伙伴,以解决特权访问管理和端点特权安全问题。游戏橘子与该集团内专门从事网络安全的 IT 企业 Digicentre 合作,开始部署 CyberArk 身份安全解决方案,其中包括 CyberArk 特权访问管理器和 CyberArk 端点特权管理器。最初,CyberArk 是在游戏橘子的游戏部门实施的,为大约 200 名用户提供了访问权限。在接下来的几个月里,CyberArk 被用来保护游戏橘子集团所有企业的客户、员工和业务运营。 CyberArk 使游戏橘子集团能够自动发现并加入人类身份特权凭证和秘密、集中策略管理、删除本地管理权限并在整个组织内强制执行最低权限,并跨平台实施基础端点安全控制。
运营影响
数量效益
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Digital Transformation of Atlanta Grout & Tile: An IoT Case Study
Atlanta Grout & Tile, a Tile, Stone & Grout restoration company based in Woodstock, Georgia, was facing challenges with its traditional business model. Despite steady growth over the years, the company was falling behind the web revolution and missing out on the opportunity to tap into a new consumer base. They were using independent software from different vendors for each of their department information and workforce management. This resulted in a lot of manual work on excel and the need to export/import data between different systems. This not only increased overhead costs but also slowed down their response to clients. The company also had to prepare numerous reports manually and lacked access to customer trends for effective business decision-making.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
IFFCO Boosts IT Performance and Innovates Agriculture with Oracle Cloud
Indian Farmers Fertiliser Cooperative Ltd. (IFFCO), the world’s largest manufacturer and marketer of fertilizers in the cooperative sector, was facing several challenges in its quest to innovate and improve the livelihood of farmers in India. The organization had recently launched a new product, nano urea, which brought new demands to IFFCO’s cloud computing needs. The organization needed a reliable cloud vendor to support the processes of 6–7 new manufacturing plants during the upcoming year, enhancing its production capability 300–350 million bottles of nano urea to meet increasing demand. IFFCO’s cloud adoption was driven by a need to innovate. The organization wanted capabilities for a dynamic business that can adapt to the changing needs of the market while growing fast. However, it was inhibited by rigid on-premises data center deployments and the overhead of maintaining legacy systems. IFFCO wanted to apply the elasticity and availability of cloud for improving overall performance of applications at lowest possible operational overhead. Lastly, IFFCO needed to provide the benefits of its technology to all its stakeholders, including employees, members, transporters, and farmers, some of whom have limited literacy. To accommodate all stakeholders, IFFCO wanted to add a voice interface to its applications.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.