
The Challenge
One of the biggest challenges CYANIT faces is ensuring they have the right combination of hardware and software tools to make IT secure and stay at the forefront of the industry.
With new solutions always coming onto the market they need to redefine their solutions package about every six months. “Everything is moving to the cloud and not coming back”, said Jakob Arndt, CEE (Chief Executive of Everything) at CYANIT. “This is extremely challenging for security as data is more distributed now, our job is to connect all of the data points and secure them. In the past we would just back up one server and know we were secure, today its complicated and getting more so by the day, making our jobs more critical to our clients.”
One of the biggest challenges CYANIT’S customer base faces is the increase in remote working. With today’s workforce becoming increasingly mobile, working from home, in airports, coffee shops and hotels, it is more difficult for companies to have a realistic view of what is happening on each device. “We knew we needed a solution that would allow us lock and block regardless of location, something that would add that extra layer of security for our customers,” said Jakob.
The Solution
CYANIT learned about BlackFog from an IT distributor in Denmark in 2017 and was very interested in the technology. The increase in malicious threats, hacking, fake news and focus on GDPR meant that their customers were much more focussed on cybersecurity and data protection and they wanted to ensure they had the best solution available to protect them. For the end customer the biggest threat is undoubtedly the hidden threat – the ‘drive-by’ or phishing email that seems innocent until a user clicks on it. Other issues like viruses and spam email were covered by other solutions, but until BlackFog was introduced to CYANIT preventing these malicious attacks was very much still an issue.
The Approach
BlackFog worked closely with CYANIT for a period of around four months during the evaluation process before deciding that they would include BlackFog as part of their managed solution. “Technically the solution was quite brilliant” commented Jakob, “we worked closely with the team refining the solution and knew we wanted to work with them, they were agile, and we had open communication through the entire process. We never say we purchase BlackFog, but rather that we work with them.” At the end of the evaluation process CYANIT decided to bundle BlackFog into their solution suite and roll it out to every client. As a trusted advisor to their end customers, knowing that their systems were secure was vital to their business.
The Results
BlackFog is now an integral part of the IT solution CYANIT provides to all its clients. “With BlackFog installed our clients can focus on running their businesses without worrying about their IT security and we are secure knowing that everything is ok if they do happen to click on a bad link,” commented Jakob. “We have found BlackFog to be the missing cog in the security wheel as it’s the only solution that is blocking the outbound traffic. We are still rolling the solution out to entire customer base and we already blocking around 3000 threats each month!”
Share This Story, Choose Your Platform!
Related Posts
Kerberoasting Attack Explained: Example And Prevention Guide
Kerberoasting attack explained with examples, detection tips, and prevention steps. Learn how to secure Active Directory from credential theft.
BlackFog Appoints Former Yahoo CFO Kenneth A. Goldman To Board Of Advisors
Kenneth A. Goldman joins BlackFog’s Board of Advisors, bringing decades of tech and finance leadership to accelerate enterprise growth and AI-based data protection.
Why Every Business Needs A Cybersecurity Roadmap
Find out what's involved in creating a cybersecurity roadmap and how having one can help navigate an extremely challenging threat landscape.
Cybersecurity Risk Assessment: Why It Matters And How To Do It Right
What do you need to complete a successful cybersecurity risk assessment and how can outsourced solutions like a virtual CISO aid in the process?
5 Effective Ways To Mitigate Risk In Cybersecurity
Follow these five proven strategies to help your firm mitigate risk in cybersecurity and ensure effective protection in today’s challenging digital environment.
How Do vCISO Costs Work – And What Do Firms Get In Return?
How much should businesses expect in vCISO costs? This guide breaks down the key factors that influence pricing and what drives those cost variations.






