Erzbistum Bamberg (Security)
Security and easy user access combinedDownload the case study
A comprehensive solution with multi-factor authentication
Founded in 1507, the Roman Catholic Archdiocese of Bamberg today covers the entire district of Upper Franconia, large parts of Middle Franconia, as well as smaller areas in Lower Franconia and the Upper Palatinate. Of the 2 million people who live there, approximately 700,000 are members of the Roman Catholic Church. The archdiocese itself employees around 7,000 staff at 650 locations. The central IT department has to support in excess of 3,500 computer work stations.
The large number of computers and extensive branching of the network pose a considerable security challenge to the IT staff of the archdiocese. In light of the numerous external employees, of whom many are older, honorary employees, remote access to the central network in particular must be controlled and secured.
Enhances data protection via multiple authentication
Smartphone codes and SMS alerts well received
Prices halved compared to previous solution
With a number of elderly users who weren't experienced with computers, it was common for employees to request assistance for network access problems within their circle of relatives or friends. This resulted in password breaches and security being highly compromised. Given that weak or stolen passwords are a primary gateway for cyber criminals, the need for a secure authentication solution became clearly apparent to the Roman Catholic Archdiocese of Bamberg.
Proact was selected to conduct an extensive evaluation of multi-factor authentication credentials of Censornet's MFA technology. Utilising the expertise of Proact's security specialists, the subsequent installation was completed without a hitch. Now it’s possible to efficiently secure external access to data and applications, meeting user demands for a simple login process at the same time.
Our goal was to combine the best possible security with an easy login process.
Read the full case study
Investing in the future – Proact’s support of GCU’s SOC
Euan Birch, Security Operations Lead at Proact UK It isn’t often that I feel nervous. I’m generally very good at...
The Nightmare Before Christmas in a Cyber Age
Faye Morton, Marketing Copywriter at Proact UK Most of us know about the misadventures of Jack Skellington, Halloweentown’s beloved Pumpkin...
Cyber warfare: Targeting national infrastructure
Euan Birch, Security Operations Lead at Proact UK The water we drink, the train we get to work, the hospital...
What does a cyber attack really look like?
Tim Simons, UK Security Product Manager at Proact We often get asked what cyber attacks really look like and it’s...
Privileged access management – protecting the keys
Jason Lucas, Security Consultant at Proact UK For years organisations protected their crown jewels – their data – by building...
Email phishing: Why do we still get hooked?
Lara Huddless, Sales Enablement Coordinator at Proact UK We all know about phishing attacks. They’re not new, in fact they’ve...
Cyber warfare: Setting cyber rules in the wild world
Euan Birch, Security Operations Lead at Proact UK Humans have been at war for 92% of the past 3,400 years....
Public Wi-Fi, evil twins and the men in the middle
Tim Simons, UK Security Product Manager at Proact Public Wi-Fi is everywhere – airports, trains, cafes, hotels – and we...
Mapping a trail towards the security maturity summit
Define a path to tackle the uphill challenge of planning & benchmarking your security journey, including measuring progress
Conquering your security Everest
Understand what a mature security approach looks like and the various stages you need to conduct across your organisation to get there
Is data your attacker’s advantage or yours?
Here we discuss how SIEM systems can be used to gain access to & analyse key information to create predictive models for future cyber attack patterns