{"id":2022,"date":"2024-09-23T16:15:04","date_gmt":"2024-09-23T14:15:04","guid":{"rendered":"https:\/\/enthec.com\/case-studies\/proteccion-del-correo-corporativo\/"},"modified":"2024-11-05T19:37:02","modified_gmt":"2024-11-05T18:37:02","slug":"protecting-corporate-mail","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/use-cases\/protecting-corporate-mail\/","title":{"rendered":"Protecting Corporate Mail"},"content":{"rendered":"

[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”536538″][vc_custom_heading auto_text=”yes” text_size=”custom” text_weight=”700″ uncode_shortcode_id=”283533″ heading_custom_size=”5em”]T\u00edtulo din\u00e1mico[\/vc_custom_heading][vc_single_image media=”319″ media_width_use_pixel=”yes” uncode_shortcode_id=”664052″ media_width_pixel=”250″][\/vc_column][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”141236″][vc_empty_space empty_h=”3″ mobile_visibility=”yes”][vc_custom_heading heading_semantic=”h1″ text_size=”h4″ text_weight=”300″ uncode_shortcode_id=”164621″]The information provided by Kartos XTI Watchbots enables the hospital to quickly identify the breach and its source and to carry out the necessary corrective measures to protect hospital systems.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_bottom_divider=”default” bottom_divider=”step” shape_bottom_h_use_pixel=”” shape_bottom_height=”500″ shape_bottom_color=”color-lxmt” shape_bottom_opacity=”100″ shape_bottom_index=”0″ content_parallax=”0″ uncode_shortcode_id=”265517″ back_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”2″ style=”light” back_color=”color-xsdn” overlay_alpha=”50″ shadow=”std” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”10″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”408996″ back_color_type=”uncode-palette”][vc_custom_heading uncode_shortcode_id=”178873″]CHALLENGE[\/vc_custom_heading][vc_single_image media=”473″ media_width_use_pixel=”yes” uncode_shortcode_id=”443915″ media_width_pixel=”50″][vc_custom_heading text_size=”h4″ uncode_shortcode_id=”929797″]A hospital is an organisation that belongs to the category of critical infrastructures subject to strict compliance with legal regulations on the protection of confidential patient data as well as business continuity protection. After a period of malfunction and loss of information in some communication systems, the hospital’s management team accepts the need to find out, with as much certainty as possible, the existence of security breaches in its IT system. In this way, it ensures that the budget allocation for remediation will be adjusted to the real need of the risk.[\/vc_custom_heading][vc_row_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”148772″][vc_single_image media=”747″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”393742″][vc_custom_heading separator=”yes” uncode_shortcode_id=”135113″]Solution[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”139225″]The hospital’s CISO contacts Enthec Solutions and starts using the Kartos XTI Watchbots cyber intelligence and cyber security platform, which is used by the hospital’s CISO:<\/strong><\/p>\n