project background
The family-owned business, which was established in 1931, eventually grew to become one of the biggest trade associations in the world. Porsche believes that by skillfully fusing history and innovation, it can achieve success in the future. The establishment of quick and direct contact between employees in various regions is a crucial factor in the company’s success because it considerably raises everyone’s sense of responsibility and production quality.
Porsche continuously invests in its own research and development division to successfully implement this plan, and it also makes sure that the IT aspect of the business is up to date and does not impede the company’s growth. The corporate network required an up-to-date, secure access control system, which gave rise to this project.
about the customer
About company
Porsche, which was established in 1931, is still among the most well-known automakers in the world. The company attributes its success to a clever fusion of innovations and far-reaching future ambitions with established practices and tried-and-true methods for building something new.
Business in numbers
our results
task immersion
Audit of the customer’s existing network infrastructure. Establishing principles and practices to strengthen network security within a company.
solutions
Integration of the access control system with the customer’s current hardware and software systems. Integration with existing security systems (such as Cisco ASA). Configuration of TACACS authentication and authorization to improve security and access control to network devices.
result
Certificate-based infrastructure access. Guest access via Wi-Fi. Post-project customer support. Possibility of intelligent policy creation, with an option of a granular description of trigger conditions.
technical results:
- Improving the level of access control to infrastructure
- Detailed analysis of security incidents
- Advanced threat detection functionality
- Unified infrastructure access control point
- Intelligent policy creation, granular description of trigger conditions
new business opportunities
automation
Automation of information security procedures throughout the entire organization utilizing network-level encryption and access control tools.
simplification
Simplifying the day-to-day activities of the IT department that enables to create rules that match the business norms taking into account users, devices, apps, and locations.
control
Granular access control to network devices (using the TACACS protocol), with the ability to flexibly generate policies.
cases that may be of interest to you
- 18:25, 25 June
- 14 min
- 00:53, 18 January
- 14 min
Have questions?
Please complete the form, and our specialists will contact you soon