HELL ENERGY, an internationally acknowledged energy drink brand entrusted Softline with the strengthening of its cybersecurity. Softline deployed multiple Microsoft security solutions to reinforce the identity and access management within the energy drink company.
HELL ENERGY is one of the fastest growing FMCG brands in the world, as proven by its explosive export expansion and growing global popularity. The 100 percent Hungarian energy drink brand was crafted in 2006 and by 2010, it became the market leader in Hungary, it has become a key player internationally, with an export market of more than 50 countries. In addition to Hungary, it is the market leader in Bulgaria, Romania, Bosnia and Herzegovina, Slovakia, Croatia, Greece and Cyprus.
Softline experts assessed HELL ENERGY’s security status using Microsoft’s Cybersecurity Solution Assessment Tool to collect all the relevant information of the IT environment of HELL ENERGY by scanning local accounts, firewall rules, applications installed. Softline summarized the results of the cybersecurity assessment in a report included with services that are indispensable to reach the optimal cybersecurity, and a road map with the necessary steps. With the help of Softline, HELL ENERGY deployed multiple Microsoft security solutions to enhance their protection against malware, viruses, targeted attacks including business email compromise, credential phishing and ransomware. Thanks to advanced capabilities of Microsoft 365, now the company can identify, prioritize and investigate potential threats and attacks. In addition, the organization implemented tools to safeguard access to corporate data and apps while maintaining simplicity and ease of access for users.
”In today´s world, an organization cannot afford to operate without appropriate cybersecurity protection. In Softline, we found a reliable and experienced partner who supports us in creating a safe and well-protected IT environment. Our journey began with an assessment which made it clear that our identity and access management need to be reinforced. Softline’s team of experts highlighted the focal points of the process and offered secure solutions to us. They tailored Microsoft’s security solutions according to our procedures and security goals, providing personalized experience and measures to fit our needs” – said László Mészáros, CIO and CISO of HELL ENERGY Group.
”Working with a company who is recognized for their continuous innovation is a great honor for us. We are pleased to help HELL ENERGY to protect its company information and business values by implementing the right cybersecurity solutions. Our goal, as our customers´ technology partner is to safeguard their businesses and information, and we work every day to improve our services and solutions to make sure they are always adapted to our customers´ needs”– said Zoltán Mészáros, Vice President, Softline Eastern Europe.
The strengthening of HELL ENERGY’s cybersecurity posture continues with the deployment of Mobile Device and Application Management solutions. To reach the optimal level of security further solutions will be implemented according to the road map created based on the findings of the Cybersecurity Solution Assessment.
’We were thrilled to launch the cooperation with Antenna Hungária regarding comprehensive cybersecurity solutions. The company has a rich history, furthermore, it has continuously developed in the past years. Supporting their operation with our knowledge and expertise in IT security solutions is a huge honor for us.’ – added Zoltán Mészáros, Vice President, Softline Eastern Europe.
Effectively reducing your company’s cybersecurity risks can’t depend solely on strict policies. Taking proactive measures is just as important. Check out the three levels of actions you should take to protect your assets starting today.
Идентичност, крайни точки, приложения, мрежа, инфраструктура и данните са важни връзки в цялостната
верига на модела за сигурност Zero Trust. Microsoft поддържа сигурността Zero Trust чрез множество слоеве на защита. По-долу са описани шестте слоя за сигурност Zero Trust и как да ги защитите.
Моделът Zero Trust предполага доверие след проверка, т.е. за да се доверите, първо трябва да проверите. Моделът Zero Trust въвежда строга проверка на самоличността, проверява съответствието на устройството преди предоставяне на достъп и гарантира достъп с най-малко права само до изрично разрешени ресурси. В тази статия обобщаваме основните елементи на Zero Trust.