Register now to watch this webcast on demand!

First Name
Last Name
Phone Number
Job Title
I want to receive Umbrella newsletters, updates, and promotions. Withdraw your consent at any time.
I do not want to receive email communications about products & offerings from Umbrella & affiliates.
I am an MSP, IT Provider or Reseller contacting you on behalf of a customer
Thank you!
Error - something went wrong!

Why manufacturers are using the cloud to deliver infosec

November 20, 2015

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same. Take Chart Industries, for example.

Chart — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day, resulting in excessive break-fix work for their small security team. They were definitely in need of a new layer of malware and breach protection. But such protections also had to deploy painlessly and be a transparent experience for their employees and guests.

Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:

  • Why they use a layered approach to security and how Cisco Umbrella is their first line of defense*
  • How long it took to deploy Cisco Umbrella globally
  • How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using Cisco Umbrella Investigate

*Chart also has a new rollout of Cisco Cloud Web Security and are upgrading Cisco ASA firewalls with FirePOWER services and Advanced Malware Protection. They use Cisco’s botnet subscription to protect the network as well as two third-party endpoint security products to protect endpoints they owned.

Previous Video
Block malware on the internet, not your perimeter or endpoint
Block malware on the internet, not your perimeter or endpoint

There are two dilemmas with your security stack. First, your threat protections must wait until malware rea...

Next Video
Cover your "what happens off-network, stays off-network" security gap
Cover your "what happens off-network, stays off-network" security gap

We know that "What happens in Vegas, stays in Vegas" is not a winning network security strategy. But how wo...