{"id":981,"date":"2020-03-12T17:40:18","date_gmt":"2020-03-12T17:40:18","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=981"},"modified":"2020-03-12T17:49:09","modified_gmt":"2020-03-12T17:49:09","slug":"new-case-study-jpks-it-security-is-growing-with-the-business-thanks-to-sophos-synchronized-security","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2020\/03\/resources\/new-case-study-jpks-it-security-is-growing-with-the-business-thanks-to-sophos-synchronized-security\/","title":{"rendered":"New Case Study: JPK\u2019s IT Security is Growing With the Business Thanks to Sophos Synchronized Security"},"content":{"rendered":"<p>More and more sophisticated and targeted attacks made it necessary for our Serbian customer JKP to replace their existing, outdated infrastructure and start looking for a more modern network security solution that would grow with the business and its requirements. The lookout was for easier, more manageable security that also offers protection for non-technical users and their devices on-site and on the go from zero-day attacks, advanced threats, and ransomware. Last but not least, the IT team was searching for smooth acceleration and automation of incident response processes to reduce the workload in this area.<\/p>\n<p>JKP scanned the market for IT security solutions, but were dissatisfied with the existing silo solutions.<\/p>\n<p>Radenko Vukovic, who manages IT for JKP, explained that the point products available worked in isolation and required him to juggle multiple administrative consoles. As a result, they were difficult to manage and unable to quickly and effectively counter today\u2019s coordinated attacks. Additionally, these tools were not all-inclusive and required expensive add-ons and upgrades.<\/p>\n<p>In the end, the team choses a configuration consisting of next-generation Sophos Synchronized Security using Sophos XG Firewall and Sophos Central, our cloud-native cybersecurity platform. The solution provides the breadth and depth of protection Vukovic believes JKP needs to detect and defeat today\u2019s advanced threats, zero-day attacks, and ransomware.<\/p>\n<h2><strong>Technology Solution <\/strong><\/h2>\n<p>Switching over to Sophos was a simple process and went quite smoothly with support of the Sophos Partner Global Vision Consulting.<\/p>\n<blockquote><p>\u201cNot only was it easy, but it\u2019s working great and is providing our network and endpoints with a truly effective and consistent defense,\u201d Vukovic points out.<\/p><\/blockquote>\n<p>By automating the response to threats, the system\u2019s response was shortened from two to four hours to merely some minutes per incident. This results in serious savings to the company. Also, the quality of the service to JKP customers is better than it was in the past.<\/p>\n<p>Sophos Synchronized Security has fundamentally changed the way the company approaches security. Rather than relying on individual components acting in isolation with no communication between them, the organization now has Sophos Synchronized Security working for it around the clock. The Security Heartbeat\u2122 technology that drives Synchronized Security ensures that their endpoint security and firewall are talking to each other. XG Firewall and Sophos Endpoint Security can share threat information and respond automatically to prevent advanced attacks from spreading. For example, Sophos Endpoint pinpoints a system that has been compromised by malware. Then, the firewall isolates the machine and limits network access. The endpoint then automatically undergoes cleanup and remediation, and patches or upgrades are added as needed.<\/p>\n<p>For JKP and its users, Sophos Endpoint pinpoints a system that has been compromised \u2013 for example, when a user is tricked into clicking a phishing link.<\/p>\n<blockquote><p>\u201cIt\u2019s much like having our own team of intelligent robots. When something goes wrong, they spring into action and work together to resolve the problem,\u201d explains Vukovic.<\/p><\/blockquote>\n<p>Sophos Synchronized Security also provides real-time insights and control all in one place, which helps to quickly identify issues and take action immediately \u2013 across endpoints, the network, email, and beyond.<\/p>\n<blockquote><p>\u201cIf there\u2019s a problem, Sophos sends me a notification,\u201d he says. \u201cThen I get on the Sophos Central platform to track down the problem. If I have to do anything in-house to clean the malware or virus, then I can respond to issues in a timely fashion. Sophos Synchronized Security offers us the kind of protection we\u2019ve been looking for, and I can confidently say that I sleep better at night because of it.\u201d<\/p><\/blockquote>\n<h2><strong>Business Benefit <\/strong><\/h2>\n<p>Recently, the IT team discovered that JKP\u2019s employees were receiving quite a number of ransomware emails, malicious software that blocks access to a computer system until money or some other type of ransom is paid. Ransomware is the most prevalent malware attack affecting today\u2019s organizations.<\/p>\n<blockquote><p>\u201cWe want to be sure that we\u2019re fully protected against this rising threat. We think that Sophos Intercept X is a valuable addition to our to security toolbox,\u201d he suggests.<\/p><\/blockquote>\n<p>Vukovic has now deployed Sophos Intercept X, which uses CryptoGuard technology to block the malicious, spontaneous encryption of data by ransomware. Through Synchronized Security, ransomware-infected devices are assigned a status indicating they are at risk. This information is then shared with XG Firewall, which isolates these devices from the network. By doing so, ransomware attacks are unable to communicate to command and control servers so the attack cannot infect other systems.<\/p>\n<blockquote><p>\u201cSince we\u2019ve deployed Synchronized Security, it was so easy to integrate Sophos Intercept X into our system. It\u2019s exciting to know our security can truly grow with us,\u201d he asserts.<\/p><\/blockquote>\n<h2><strong>Synchronized Security Accreditation<\/strong><\/h2>\n<p>As a Synchronized Security partner, you can offer the industry&#8217;s strongest cybersecurity protection. The case study you\u2019ve just read offers a lot of proof. Become accredited today and drive revenue by selling award-winning products that work together as a system to be more coordinated than the attackers.<\/p>\n<p><a href=\"https:\/\/partnerportal.sophos.com\/en-us\/channel-programs\/synchronized-security-accreditation.aspx\">Learn more<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos Synchronized Security has fundamentally changed the way our Serbian customer JPK approaches security.<\/p>\n","protected":false},"author":11,"featured_media":522,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[26],"coauthors":[64],"class_list":["post-981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-synchronized-security"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/sophos-central-cross-sell-app-icon-1600x960px.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=981"}],"version-history":[{"count":3,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/981\/revisions"}],"predecessor-version":[{"id":985,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/981\/revisions\/985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/522"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=981"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}