CASE STUDY HiLASE
Infected IoT device
Anomalies, and repetitive machine-like behavior detected by behavioral analytics features within MENDEL
Attack Stopped by:
HiLASE focuses on the research and development of “high-reputation” lasers for use in industry, small-medium scale research facilities, and the military. HiLASE works to produce lasers which are more powerful, efficient, compact, and stable, and which are more easily maintained than lasers currently available.
Specifically, HiLASE works with Diode-pumped Solid State Laser Systems (DPSSLs) which can be used for micro machining technologies, testing resistance of optical materials, cutting, welding, laser peening, and removal of deposits. They are unique across Europe in this focus.
“We knew we wanted to improve our security, and are very lucky to have found MENDEL. We are much more secure, and can do the work of three people, and all in-house. If something goes wrong somehow, we can easily use MENDEL to find out where the device is, and take the actions we need to. We’re very happy to have it.” (Richard Tůma, IT Manager)
Though HiLASE used a common set of network security tools, they knew that they needed to improve their network security to provide better capabilities to protect their network and sensitive research data; to detect advanced persistent threats, malware, ransomware, and employee data exfiltration. As part of this, they were also looking for greater network visibility; to see who what devices were present in the network at any given time, and to identify each device’s communications within the network.
Finally, like many organizations, HiLASE has a limited number of staff devoted to IT overall, so they needed to implement a solution which would be easy for their IT security team to use.
Following impelmentation of the MENDEL appliance, HiLASE was able to significantly harden their security posture, as well as acquire the visibility they were looking for. With a relatively small IT staff, MENDEL provided their security team with all of the information they needed in one place at one time, and each member of the security team is capable of taking an active role in the security process with MENDEL.