Read case studies of how public and private companies are using AMPEG Security Lighthouse to improve the effectiveness of their IT security.
“When I started at SCHOTT, our focus was basically: How do we protect our crown jewels?” explains Dirk Ossenbrueggen, Head of Information Governance and Security at SCHOTT. "The whole big rest went down a bit in IT operations. But then the awareness has grown that there are other things to protect besides the crown jewels and that you need to spend some money to do so. Above all, we had too little transparency at that time. We didn't have a deeper insight into our network, didn't know what we were up against, or what the security level was at all. To solve this problem, I was searching for tools that would give me a quick overview of the security level of our IT.“
During the Proof of Concept (PoC), AMPEG was already able to show that for nearly all important ZF systems which were to be integrated, collectors could be made available as an “out of the box” interface solution. “The fact that the PoC went so smoothly against this background, and that we did not have to find individual solutions, made us expect a low-maintenance product,” Michael Schrank, former Head of IT Security at ZF, explains.
We have been working with comprehensive Excel tables sent to us at regular intervals in order to have an overview of the existing IT systems and the installed software, but also of security tools, applied patches, virus patterns and other important data, explains Andreas Sternberg, IT security officer at KWS, and he admits: But this procedure did not offer us our desired direct access to the global status information.
The findings that SCHOTT was able to draw from the data detected by Security Lighthouse were significant. "The control system clearly showed us where we stand. In a way, the data was sobering because we had thought that we were further ahead with our IT security. But that was not the case. However, and that was the positive thing about it, we now knew what deficits we had."
Head of Information Governance and Security at SCHOTT
Matthias Helmke, Head of Infrastructure at KWS, draws attention to another point: “If auditors want to check our security level, we can offer them an immediate and incredibly concrete way of doing so. We can also prepare reports quickly for specific target groups. All this dramatically simplifies audits.”
“We are now able to show our improvements with facts and figures – we have measurements and analyses that we can pass on to management. What once was a vague gut feeling about IT security has now become specific, quantitative knowledge.”
Michael Schätzke, former Security Officer, Landesbetrieb für Statistik und Kommunikationstechnologie Niedersachsen (Lower Saxony Institute for Statistics and Communication Technology)