Medium-sized company relies on local IT Security

Fast and seamless transitions from the old security solution to a modern IT-security solution

Customer

  • Branch: Mechanical engineering
  • Country: Germany, Bochum
  • Scope: 1,100 Clients, in-house data center

The Challenge

  • Comprehensive IT-protection
  • Fast and seamless transitions from the old security solution to a modern IT-security solution

The Solution

  • Comprehensive IT-security solution: G DATA Endpoint Protection Business and Exchange Mail Security
  • Premium customer support with year-round availability – around the clock

Benefits

  • Complete protection against online threats, including a combination of machine learning and artificial intelligence with DeepRay®
  • Fast assistance and problem solving in the field of IT-security

Due to the general threat posed by malware and, in particular, by the constantly increasing number of ransomware attacks, Gebr. Eickhoff Maschinenfabrik und Eisengießerei has decided to implement a new IT security solution. G DATA CyberDefense’s Endpoint Protection Business and Exchange Mail Security tools were chosen. The key reasons for this were the fact the transition is seamless and does not create gaps in cyber defense, as well as the personal cooperation.

The traditional, family-run company Gebr. Eickhoff Maschinenfabrik und Eisengießerei, which is based in Bochum, Germany, develops machines, components, and services for the global market. With over 1,000 employees, the Gebr. Eickhoff Group is one of the leading medium-sized companies in the region and supplies customers all over the world. Quality, precision, and reliability are among the company’s strengths and this is demonstrated in its products, which have to prove themselves under extreme conditions underground in mining operations or at heights of one hundred meters in the form of wind turbines. Strengths that also distinguish G DATA CyberDefense.

The new security software from G DATA works silently in the background and delivers excellent performance, meaning our employees don’t actually notice the protective mechanisms and aren’t disturbed by them. In particular, using it in combination with the AI technology DeepRay offers a very high level of protection against the sophisticated tactics employed by criminal hackers.

Stefan Weinkauf, IT-manager at Gebr. Eickhoff Maschinenfabrik und Eisengießerei

Secure IT at all times

IT services in the Gebr.-Eickhoff Group are provided centrally by the so-called holding company. The IT team operates the essential services almost completely on its own every day, from the data center and the operation of the approximately 130 applications, to license management and support, to IT security. The objective: providing cost-effective, highly available IT. The security of a company’s own internal network is a top priority here. This way, important data such as construction plans are well protected and the value chain runs smoothly. In view of the existing cyber risks, the traditional company has established a security process to contain possible attacks as early as possible and prevent data loss. Quickly identifying and isolating the computers that may have been infiltrated is a crucial part of this process. The Bochum-based company decided to switch providers in 2018 due to the generally increasing threat level and the associated risk sensitive data being stolen, businessrelevant information being encrypted, as well as production and business processes being restricted and manipulated. The company opted for this change because disruptions in the operating process coupled with dissatisfaction with the support provided by the previous service provider caused confidence to  decline, leading to a rethink.

Seamless transition

The people tasked with searching for a new provider found their way to G DATA CyberDefense. This is because the portfolio fulfilled all of the Gebr. Eickhoff Group’s requirements. In particular, the cyber defense specialists convinced the company with a detailed plan for the transition and were thus able to solve one of the most important challenges in that it should be ensured that no device runs on the network without an active protective solution. Another argument for the choice: the two companies are neighbors. G DATA CyberDefense is also located on Königsallee in Bochum. Only the Springorum cycle path, an old railway line, separates the two companies. In the initial discussions, it became clear that the medium-sized DNA of a family-owned company and the loyalty to the Bochum location also connects both companies. In the course of the transition, G DATA’s Technical Account Management Team, or TAM Team for short, implemented its own solution. During the migration process, this automatically checked whether the old solution was completely removed from the computer and whether G DATA’s Endpoint Protection was already active. This is because AV programs are deeply integrated into every system to ensure extensive protection. Only in a few cases did the TAM team identify computers that required manual installation. The well-planned package rollout allowed the G DATA specialists to convert up to 300 computers per day. “The transition has worked wonderfully”, says Stefan Weinkauf, IT manager at Gebr. Eickhoff Maschinenfabrik und Eisengießerei. “The good preparation and consultation provided by G DATA ensured that only a small amount of follow-up work was necessary after the transition.“

Silent operation

Eleven months after the transition, the conclusion is a positive one: “The new security software from G DATA works silently in the background and delivers excellent performance, meaning our employees don’t actually notice the protective mechanisms and aren’t disturbed by them. In particular, using it in combination with the AI technology DeepRay offers a very high level of protection against the sophisticated tactics employed by criminal hackers”, says Weinkauf. Another plus: the German-language Premium Support is available 365 days a year. “We receive first-hand information about upcoming updates or current threats.”