SlideShare a Scribd company logo
Customer Success Story




Bandit Lites:
Making out like a Bandit
The Challenge:
“We work with musical artists around the world,” says Je Vogt, network                                               Location:
administrator at Bandit Lites, the world’s second-largest lighting hire                                              Knoxville, TN
company. “Our guys are constantly on the road, and they need access                                                  Size:
to our network for drawings and plots for lighting deployments. Our                                                  6 locations, 100 employees
programmers need greater leeway for their PCs, and we need to                                                        Industry:
make sure that their computers are protected.”                                                                       Publishing/Entertainment

The Solution: Total Defense Endpoint Premium Edition r12                                                             Solution:
                                                                                                                     Total Defense Endpoint premium
“Total Defense allows us to implement different policies for different computers,”
                                                                                                                     Edition r12
Vogt says. “I’ll check the logs three or four times a week to see what Total Defense




                                                                                                             ‘‘
has caught. Sometimes, we’ll need to change a policy; we quickly institute it, and
it’s implemented within the next hour. When one of our workers hooks their laptop
into our network, Total Defense detects it, and automatically pushes out the latest
update.” Vogt says the one time he needed technical support from Total Defense,
his problem was solved within 30 minutes. “We’re as happy as you can be.”
                                                                                                                         Total Defense allows us
                                                                                                                         to implement different
                                                                                                                         policies for different
                                                                                                                                                            “
About Bandit Lites                                                                                                       computers. We’re as
Specializing in lighting for concerts, films, television, theater, architectural design
and more, Bandit Lites is the oldest company in the industry and the world’s
                                                                                                                         happy as you can be.
second largest, celebrating its 40th anniversary in 2008 and still growing. With
offices in the United States, Europe and Asia, Bandit Lites works with companies
to fill their lighting needs worldwide.




   Total Defense Endpoint Premium Edition r12

   Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks,
   endpoints and groupware systems. It protects against malware, unauthorized access, and
   malicious applications with a client-server approach that also incorporates a client based
   firewall. A central management console and dashboard allows you to have granular control
   over access, applications, and security settings and deploy policies in a snap.


                          Learn more by visiting totaldefense.com/customersuccess

                                            100 Motor Parkway, Hauppauge, NY 11788 USA
                                            Phone: (888) 504-9800 totaldefense.com
                                            ©2012, Total Defense. Total Defense is a registered trademark of Total Defense. All other trademarks are the property of
                                            their respective owners. Specifications subject to change without notice. All rights reserved.

More Related Content

Similar to Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites

Consilien Managed IT Services
Consilien Managed IT ServicesConsilien Managed IT Services
Consilien Managed IT Services
Boutique Marketing Group
 
Brian cernypeer 3
Brian cernypeer 3Brian cernypeer 3
Brian cernypeer 3
bricer1272
 
Brian cernypeer 3
Brian cernypeer 3Brian cernypeer 3
Brian cernypeer 3
bricer1272
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
Dr. Jimmy Schwarzkopf
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 
Total Defense Customer Success Stories - Threat Manager r12: 422 South
Total Defense Customer Success Stories - Threat Manager r12: 422 SouthTotal Defense Customer Success Stories - Threat Manager r12: 422 South
Total Defense Customer Success Stories - Threat Manager r12: 422 South
TotalDefense
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
AllSeen Alliance
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
A. Phillip Smith
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
African Cyber Security Summit
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
HiveMQ
 
Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guide
scottjohanson
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Craig Saunders
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Laurie Lamberth
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
Edge AI and Vision Alliance
 
Signal distribution in ds networks
Signal distribution in ds networksSignal distribution in ds networks
Signal distribution in ds networksElizabeta Petakovic
 
Developing Performance-Oriented Code: Moore's Law Over 50
Developing Performance-Oriented Code: Moore's Law Over 50Developing Performance-Oriented Code: Moore's Law Over 50
Developing Performance-Oriented Code: Moore's Law Over 50
SmartBear
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
APNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Barry Greene
 
Digital signage Malaysia
Digital signage MalaysiaDigital signage Malaysia
Digital signage Malaysia
Najib Habeb
 

Similar to Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites (20)

Consilien Managed IT Services
Consilien Managed IT ServicesConsilien Managed IT Services
Consilien Managed IT Services
 
Brian cernypeer 3
Brian cernypeer 3Brian cernypeer 3
Brian cernypeer 3
 
Brian cernypeer 3
Brian cernypeer 3Brian cernypeer 3
Brian cernypeer 3
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Total Defense Customer Success Stories - Threat Manager r12: 422 South
Total Defense Customer Success Stories - Threat Manager r12: 422 SouthTotal Defense Customer Success Stories - Threat Manager r12: 422 South
Total Defense Customer Success Stories - Threat Manager r12: 422 South
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guide
 
Bladetec_Manifesto
Bladetec_ManifestoBladetec_Manifesto
Bladetec_Manifesto
 
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdfSoftware Principles and Project Deadlines Don't have to be Polar Opposites.pdf
Software Principles and Project Deadlines Don't have to be Polar Opposites.pdf
 
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My! Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
Self-Driving Cars, Smart Watches and Heads-Up Displays... Oh My!
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
 
Signal distribution in ds networks
Signal distribution in ds networksSignal distribution in ds networks
Signal distribution in ds networks
 
Developing Performance-Oriented Code: Moore's Law Over 50
Developing Performance-Oriented Code: Moore's Law Over 50Developing Performance-Oriented Code: Moore's Law Over 50
Developing Performance-Oriented Code: Moore's Law Over 50
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Digital signage Malaysia
Digital signage MalaysiaDigital signage Malaysia
Digital signage Malaysia
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites

  • 1. Customer Success Story Bandit Lites: Making out like a Bandit The Challenge: “We work with musical artists around the world,” says Je Vogt, network Location: administrator at Bandit Lites, the world’s second-largest lighting hire Knoxville, TN company. “Our guys are constantly on the road, and they need access Size: to our network for drawings and plots for lighting deployments. Our 6 locations, 100 employees programmers need greater leeway for their PCs, and we need to Industry: make sure that their computers are protected.” Publishing/Entertainment The Solution: Total Defense Endpoint Premium Edition r12 Solution: Total Defense Endpoint premium “Total Defense allows us to implement different policies for different computers,” Edition r12 Vogt says. “I’ll check the logs three or four times a week to see what Total Defense ‘‘ has caught. Sometimes, we’ll need to change a policy; we quickly institute it, and it’s implemented within the next hour. When one of our workers hooks their laptop into our network, Total Defense detects it, and automatically pushes out the latest update.” Vogt says the one time he needed technical support from Total Defense, his problem was solved within 30 minutes. “We’re as happy as you can be.” Total Defense allows us to implement different policies for different “ About Bandit Lites computers. We’re as Specializing in lighting for concerts, films, television, theater, architectural design and more, Bandit Lites is the oldest company in the industry and the world’s happy as you can be. second largest, celebrating its 40th anniversary in 2008 and still growing. With offices in the United States, Europe and Asia, Bandit Lites works with companies to fill their lighting needs worldwide. Total Defense Endpoint Premium Edition r12 Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems. It protects against malware, unauthorized access, and malicious applications with a client-server approach that also incorporates a client based firewall. A central management console and dashboard allows you to have granular control over access, applications, and security settings and deploy policies in a snap. Learn more by visiting totaldefense.com/customersuccess 100 Motor Parkway, Hauppauge, NY 11788 USA Phone: (888) 504-9800 totaldefense.com ©2012, Total Defense. Total Defense is a registered trademark of Total Defense. All other trademarks are the property of their respective owners. Specifications subject to change without notice. All rights reserved.