Case Studies
|
July 17, 2024

Network Access Case Study

Objectives

As a large renewable company with limited resources and a high volume of sites, they approached Network Perception with the urgency to better assess the access for vendors and operators into their sites. The need to not only quickly understand their current firewall access rules, but to gain a better understanding of their network segmentation, was paramount to their efforts. Adding to that challenge, with finite resources available, being able to document and consistently generate reports to identify gaps was a large time commitment, especially for compliance obligations.

Solutions

Using NP-View has given them the power to gain much-needed visibility into their networks. They also leveraged Network Perception’s Reporting as a Service to facilitate their reporting efforts required for compliance, as well as to provide executive summaries that instantly identify gaps in their access rule sets, making sure their resources spend less time on data gathering and more time on managing their security posture.

Case Studies

Network Access Case Study

Objectives

As a large renewable company with limited resources and a high volume of sites, they approached Network Perception with the urgency to better assess the access for vendors and operators into their sites. The need to not only quickly understand their current firewall access rules, but to gain a better understanding of their network segmentation, was paramount to their efforts. Adding to that challenge, with finite resources available, being able to document and consistently generate reports to identify gaps was a large time commitment, especially for compliance obligations.

Solutions

Using NP-View has given them the power to gain much-needed visibility into their networks. They also leveraged Network Perception’s Reporting as a Service to facilitate their reporting efforts required for compliance, as well as to provide executive summaries that instantly identify gaps in their access rule sets, making sure their resources spend less time on data gathering and more time on managing their security posture.