References

Discover with the help of case studies how public and private companies are using AMPEG Security Lighthouse to improve the effectiveness of their IT security.

IT security for "The Best of the North“

Central monitoring - overview is the key

The implementation of Security Lighthouse was also straightforward in terms of effort. Security Lighthouse is an uncomplicated system that does not cost a lot of resources and effort and was easy to deploy at NDR. The maintenance effort is low. For the NDR staff, it is also an advantage that no separate user administration is necessary within Security Lighthouse. You simply authorise users or groups from the domain.

Read more

or download as pdf

Security through transparency - for a universe of glass

“When I started at SCHOTT, our focus was basically: How do we protect our crown jewels?” explains Dirk Ossenbrueggen, Head of Information Governance and Security at SCHOTT. "The whole big rest went down a bit in IT operations. But then the awareness has grown that there are other things to protect besides the crown jewels and that you need to spend some money to do so. Above all, we had too little transparency at that time. We didn't have a deeper insight into our network, didn't know what we were up against, or what the security level was at all. To solve this problem, I was searching for tools that would give me a quick overview of the security level of our IT.“

Read more

or download as pdf

A new hub for the corporate security level management

During the Proof of Concept (PoC), AMPEG was already able to show that for nearly all important ZF systems which were to be integrated, collectors could be made available as an “out of the box” interface solution. “The fact that the PoC went so smoothly against this background, and that we did not have to find individual solutions, made us expect a low-maintenance product,” Michael Schrank, former Head of IT Security at ZF, explains.

Read more

or download as pdf

70 Countries at a Glance

We have been working with comprehensive Excel tables sent to us at regular intervals in order to have an overview of the existing IT systems and the installed software, but also of security tools, applied patches, virus patterns and other im­portant data, explains Andreas Sternberg, IT security officer at KWS, and he ad­mits: But this procedure did not offer us our desired direct access to the global status in­formation.

Read more

or download as pdf

Customer Voice SCHOTT

The findings that SCHOTT was able to draw from the data detected by Security Lighthouse were significant. "The con­trol system clearly showed us where we stand. In a way, the data was sobering because we had thought that we were further ahead with our IT security. But that was not the case. However, and that was the positive thing about it, we now knew what deficits we had."

Dirk Ossenbrueggen
Head of Information Governance and Security at SCHOTT

forward to the references

Customer Voice KWS SAAT SE

Matthias Helmke, Head of Infrastructure at KWS, draws attention to another point: “If auditors want to check our security level, we can offer them an im­mediate and incredibly concrete way of doing so. We can also prepare reports quickly for specific target groups. All this dramatically simplifies audits.”

forward to the references