Use Cases

These Pearl Software customer case studies and technical papers document how and why companies are using Pearl Software's cybersecurity solutions to enhance productivity, reduce liabilities and protect and conserve resources.

 

Use Case Study || Corporate Productivity

Corporate Productivity Case Study


Connectivity, inexpensive bandwidth and the ubiquity of end user devices have contributed to creating the always-on employee, further blurring the traditional and once-sacred boundary of work and personal time. As a result, employees may feel warranted with the self-proclaimed right to managing their own time while at work. More...

 


Use Case Study || Government Duty of Care

Government Cybersecurity Case Study


Cybersecurity holes expose government institutions and critical infrastructure. Regulatory mandates such as FISMA, HIPAA and SOX as well as Duty of Care require agencies to implement extensive information security programs while protecting the privacy of US citizens. More...

 


Use Case Study || Healthcare Data Loss Prevention (DLP)

Healthcare DLP Case Study


Healthcare providers are required to maintain technical and physical safeguards to ensure the confidentiality and unauthorized disclosure of patient information. HIPAA stipulates that wrongfully disclosure of a patient’s health information is subject to fines ranging to $250,000 and prison time ranging to 10 years. More...

 


Use Case Study || Financial Services Liability

Financial Services Cybersecurity Case Study


Managing liabilities is part of the cost of doing business; extraordinary liabilities such as hostile workplace suits, negative public relations and the negligent disclosure of personally identifiable information can go a long way towards sinking a business. For financial institutions, Internet abuse also includes the transmission of sensitive customer data such as Social Security numbers. More...

 


Use Case Study || Education

Education Web Filtering Case Study


Internet use is a part of a student’s daily routine, in part because today’s children have grown up with computers. Computers are integrated into their communication habits and are used as a tool to help students work more efficiently. The Internet provides a vast store of online knowledge and resources. Web access in the classroom has a dark side, however, when Internet use becomes Internet abuse. More...

 


Use Case Study || Law Enforcement

Law Enforcement Cybersecurity Case Study


US Law Enforcement requires real-time capability to monitor subjects and supervise offenders and defendants who have access to technology. The solution must consist of a highly secure technology that is designed to comply with existing case law and Federal legal opinions rendered as well as withstand rigorous judicial scrutiny. More...

 


Use Case Study || Malware and Ransome-ware Protection

Stop Malware and Ransome-ware at its Source Case Study


Programs that compromise electronic data or disable the security of computers are not new however their prevalence has been exacerbated by the connectivity that the Internet provides. Malware are malicious software programs that pretend to be something useful like an image file or desktop screen saver. More...

 


Technical Case Study || User Internet Design Choices

Cybersecurity Design Architectures


There are generally three architectures used in order to monitor and/or control the access to content available on the Internet: Pass-Through (Proxy), Pass-By (Sniffer) and Client-Server (Agent). Each has its advantages and disadvantages summarized in what follows. More...