TechValidate Research on SolarWinds Security

69 Case Studies – Page 3 of 3


Case Study: Construction Company (Turkey) Replaces Microsoft OneDrive with Serv-U

“Self-hosted FTP server software is much more secure and reliable for file transfer than cloud-based/SaaS services and FTP freeware.”

Challenges

  • Used Microsoft OneDrive for file sharing before purchasing Serv-U.
  • IT challenge faced before purchasing Serv-U:
    • Inability to securely encrypt and protect file transfer data

Use Case

  • Has 250-1000 users (both internally and externally) that use Serv-U.
  • Purchased Serv-U Managed File Transfer (MFT) Server.
  • Use Serv-U to secure B2B file transfer with external parties.
  • Decided to buy Serv-U because of its ease of use.
  • Key features of Serv-U that helped meet their IT requirements:
    • SFTP for file transfer
    • Web access for file transfer (via HTTP/S)
    • Active Directory/LDAP integration

Results

  • Benefits realized as a result of using Serv-U MFT Server:
    • Increased visibility and control of file transfers
    • Prevented data loss during file transfer
  • Rated Serv-U file transfer solution as 4 stars.

Case Study: Consumer Services Company (USA) Uses Serv-U for Managed File Transfer

“We have used Serv-U for years. It is the most flexible, reasonably-priced, and full-featured solution for secure file transfer (FTPS/SFTP/HTTPS) period.”

Challenges

  • Used home-grown FTP tools and scripts for file transfer before purchasing Serv-U.
  • IT challenges faced before purchasing Serv-U:
    • Lack of centralized file transfer administration & control
    • Inability to securely encrypt and protect file transfer data
    • Non-IT-approved file transfer services used by employees
    • Difficulty tracking, logging, and managing file transfers

Use Case

  • Has more than 1,000 users (both internally and externally) that use Serv-U.
  • Purchased Serv-U Managed File Transfer (MFT) Server.
  • Use Serv-U MFT Server to
    • Secure B2B file transfer with external parties
    • Centralize file transfers within the organization
  • Decided to buy Serv-U because of its:
    • Affordable cost
    • Robust security for file transfer
    • Ease of use and configuration
  • Key features of Serv-U that helped meet their IT requirements:
    • FTPS and SFTP for file transfer
    • Web access via HTTPS

Results

  • Benefits realized as a result of using Serv-U:
    • Increased visibility and control of file transfers
    • Enhanced security and data protection
    • Improved compliance with security policies
    • Prevented data loss during file transfer
    • Improved administration and governance of file transfers
    • Cost & time savings
    • Improved productivity
  • Rated Serv-U file transfer solution as 5 stars.

Case Study: Fortune 500 Industrial Manufacturing Company Replaces FileZilla with Serv-U

“Serv-U is a great tool at a reasonable cost.”

“Self-hosted FTP server software is much more secure and reliable for file transfer than cloud-based/SaaS services and FTP freeware.”

Challenges

  • Used FileZilla for file transfer before purchasing Serv-U.
  • Faced the challenge of securely encrypting and protecting file transfer data.

Use Case

  • Has more than 1,000 users (both internally and externally) that use Serv-U.
  • Purchased Serv-U Managed File Transfer Server along with Serv-U Gateway.
  • Use Serv-U to offer hosted file transfer services to clients.
  • Decided to buy Serv-U because of its:
    • Affordable cost
    • Robust security for file transfer
  • Key features of Serv-U that helped meet their IT requirements:
    • SFTP for file transfer
    • Active Directory/LDAP integration

Results

  • Benefits realized as a result of using Serv-U:
    • Enhanced security and data protection
    • Improved administration and governance of file transfers
    • Improved compliance with security policies
  • Rated Serv-U file transfer solution as 5 stars.

Case Study: Neighborhood Credit Union

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Report that they are meeting their compliance requirements to auditors
    • Meet compliance requirement, for example, by storing log data for a required retention period
    • Determine whether a security incident has occurred and what happened
    • Collect and store log data from all devices in a single place
    • Protect endpoints by monitoring events, and file and registry changes
    • Correlate logs and events from network devices, servers, and applications

Use Case

  • Collects log and event data from between 0 and 100 nodes.
  • Collect logs and events from the following devices:
    • Servers
    • Switches
    • Routers
    • Firewalls
  • Collect log and events from the following applications:
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Web servers and applications
    • Antivirus software
    • Databases

Results

  • Realized the following benefits with SolarWinds LEM:
    • Easily provide the reports and data they need to prove they are meeting their compliance requirements
    • Troubleshoot application and network problems
    • Aggregate their log data in a single place
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • SolarWinds’ features
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products
    • SolarWinds’ reputation

Case Study: Pharmathen International

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Determine whether a security incident has occurred and what happened
    • Correlate logs and events from network devices, servers, and applications

Use Case

  • Collects log and event data from between 0 and 100 nodes.
  • Collect logs and events from the following devices:
    • Servers
  • Collect log and events from the following applications:
    • Operating System Events
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Antivirus software

Results

  • Realized the following benefits with SolarWinds LEM:
    • Find if a security incident had occurred and what happened
    • Troubleshoot application and network problems
    • Aggregate their log data in a single place
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products

Case Study: Government Of Puerto Rico, Puerto Rico Ports Authority

“To me, SolarWinds is not just a bunch functionalities put together to do something random; it is a very complex system put together to correlate capabilities between its modules to provide an organization the right tools to troubleshoot and the abilities to take action before a problem or a threat happens.”

“As I mentioned before, I look forward to taking the Network Management Certification (SCP)from SolarWinds.”

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Meet compliance requirement, for example, by storing log data for a required retention period
    • Determine whether a security incident has occurred and what happened
    • Protect endpoints by monitoring events, and file and registry changes
    • Correlate logs and events from network devices, servers, and applications

Use Case

  • Collects log and event data from between 0 and 100 nodes.
  • Collect logs and events from the following devices:
    • Servers
    • End user workstations
  • Collect log and events from the following applications:
    • Operating System Events
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Web servers and applications
    • Antivirus software
  • Evaluated the following vendors before purchasing SolarWinds LEM:
    • ManageEngine

Results

  • Realized the following benefits with SolarWinds LEM:
    • Find if a security incident had occurred and what happened
    • Troubleshoot application and network problems
    • Aggregate their log data in a single place
    • Enable endpoint protection for file and registry changes
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Ease of use
    • SolarWinds’ features
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products
    • SolarWinds’ reputation

Case Study: John Roberts Co.

“An all-in-one solution.”

“Intuitive, easy to use interface that pulls all of the network enterprise data into meaningful and understandable information.”

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Report that they are meeting their compliance requirements to auditors
    • Meet compliance requirement, for example, by storing log data for a required retention period
    • Determine whether a security incident has occurred and what happened
    • Troubleshoot application and network problems
    • Collect and store log data from all devices in a single place

Use Case

  • Collects log and event data from between 101 and 500 nodes.
  • Collect logs and events from the following devices:
    • Servers
    • Switches
    • Routers
    • Firewalls
    • Storage Devices
    • Virtualization infrastructure
    • Intrusion Detection / Prevention Systems
  • Collect log and events from the following applications:
    • Operating System Events
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Web servers and applications
    • Antivirus software
    • Databases
    • Vulnerability Assessment products
    • Identity and authentication management applications
  • Evaluated the following vendors before purchasing SolarWinds LEM:
    • ManageEngine

Results

  • Realized the following benefits with SolarWinds LEM:
    • Easily provide the reports and data they need to prove they are meeting their compliance requirements
    • Satisfy specific compliance requirements where they had gaps
    • Find if a security incident had occurred and what happened
    • Troubleshoot application and network problems
    • Aggregate their log data in a single place
    • Enable endpoint protection for file and registry changes
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Cost
    • Ease of use
    • SolarWinds’ features
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products
    • SolarWinds’ reputation

Case Study: Manpower Group

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Troubleshoot application and network problems
    • Correlate logs and events from network devices, servers, and applications

Use Case

  • Collects log and event data from between 1001 and 5000 nodes.
  • Collect logs and events from the following devices:
    • Servers
    • End user workstations
    • Switches
    • Routers
    • Firewalls
    • Storage Devices
    • Virtualization infrastructure
  • Collect log and events from the following applications:
    • Operating System Events
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Web servers and applications
    • Antivirus software
    • Databases
    • Vulnerability Assessment products
  • Evaluated the following vendors before purchasing SolarWinds LEM:
    • McAfee NitroSecurity

Results

  • Realized the following benefits with SolarWinds LEM:
    • Easily provide the reports and data they need to prove they are meeting their compliance requirements
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Cost
    • Ease of use
    • SolarWinds’ features
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products

Case Study: Educational Institution

“SolarWinds LEM was a single aggregate point for the log files we needed.”

“We could see in real-time files/directories and user authentication activity.”

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Determine whether a security incident has occurred and what happened
    • Track user authentication

Use Case

  • Collects log and event data from more than 5001 nodes.
  • Collect logs and events from the following devices:
    • Servers
  • Evaluated the following vendors before purchasing SolarWinds LEM:
    • BlueLance, Inc.

Results

  • Realized the following benefits with SolarWinds LEM:
    • Find if a security incident had occurred and what happened
    • Aggregate their log data in a single place
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Cost
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products



More Research on SolarWinds Security