How a Midsize Company Keeps Rogue Malware at Bay
Modernizing Authentication — What It Takes to Transform Secure Access
A leading manufacturer of ceramic products relies on an endpoint security manager to mold its security outlook.
As many IT professionals know, all it takes is one careless click from one employee to introduce a virus into an organization.
Never has endpoint security been so critical to a business. In today’s hyper-connected world, any disruption to purchase orders, invoices, production schedules or the exchange of information among employees can cost millions of dollars in lost productivity.
Factor in cyber-thieves constantly planning new ways to steal both money and data, and it’s a wonder how CISOs get any sleep at night. While there are many ways to address the security of IT infrastructure, taking on the challenge at the endpoint is essential.
Scheurich is one of the world's largest manufacturers of pottery and accessories for plants. Each year, the 350 employees of Germany-based Scheurich manufacture more than 20 million ceramic products for thousands of global customers.
Across its IT environment, purchase orders, invoices, production schedules, patent information as well as research and development are shared across hundreds of endpoints via desktop, laptop and mobile devices.
"Like any company today that uses IT as a foundational means of sharing and exchanging information, we wanted to make sure our infrastructure was safe and protected from the thousands of pieces of malware that surface each day," said Joerg Chemii, IT manager for Scheurich. "If our system gets hit with any kind of malware, our environment will be crippled. We needed to find a business partner that could come in, take a look at our environment, and help us to implement a secure solution that would fit our demands–as well as our budget."
Enter the solution provider
Dr. Deutch is one of the leading IT business services and solution providers in Germany.
Scheurich engaged Dr. Deutch to have them evaluate the IT infrastructure of the company, and specifically focus on endpoint security.
"The cyber-threats of today are penetrating IT environments not at the server level, but at the endpoint level," said Christian Deutsch, founder and owner Dr. Deutsch. "All it takes is one unsuspecting employee to click on an email attachment that turns out to be malware, and then the virus spreads throughout your network. Scheurich engaged with Dr. Deutsch GmbH to make sure the scenario of rogue malware didn't happen to them."
Finding the right fit
After evaluating the IT environment of Scheurich, Dr. Deutsch decided Comodo was the right choice because of the technology's ability to protect from both known and unknown threats–and fit within the budget needs of Scheurich.
Dr. Deutsch engaged with Intellicomp, a leading software provider of third-party technology, to purchase the Comodo Endpoint Security Manager software suite for Scheurich.
Comodo Endpoint Security Manager (ESM) 3.4 software brings seven layers of defense–antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment) and file reputation, and virus scope (behavioral analyzer)–together under a single offering for customers of all sizes.
Comodo's patent-pending automatic containment technology prevents malware outbreaks by automatically running untrusted processes in an isolated environment—never allowing critical, financial and private data to be accessed or compromised by criminal activity.
Insight and control
Comodo ESM allowed Scheurich to take advantage of a centralized management console, offsite logging capabilities, and integrated intrusion prevention technology. The Comodo ESM dashboard is used by the IT team at Scheurich to gain panoramic insight and control over all aspects of endpoint protection and management.
Administrators can also terminate endpoint processes, stop or start services, uninstall applications and delete unwanted files—all without causing any interference to the user.
"We have been thrilled with the partnership with Dr. Deutsch as well as with Comodo's endpoint security technology because it protects our IT environment from both known – and unknown threats," said Chemii of Scheurich. "Comodo's containment technology is like a fortress for our IT environment–keeping the bad and unknown files away from our endpoints, while at the same time allowing all of our good files to be fully accessed by our employees and not impacting productivity."