Overview
Between managing a complex environment with the introduction of research equipment and the retirement of old equipment, and an increasing trend of cybersecurity challenges including student scams and phishing attacks in the postsecondary education sector, McMaster University had its hands full. Tracy Dallaire, Director of Information Security at McMaster University, and her team implemented runZero's active, unauthenticated scanner to scan their environment for vulnerabilities. The implementation of runZero gave Dallaire's team a comprehensive view of the assets operating in their environment and their associated risks.
Favorable Outcomes
How runZero helped McMaster University:
Reduction of overall risk
Substantial return on value
Significant time savings
Increased visibility
Problem
Tracy Dallaire, Director of Information Security at McMaster University, leads a team of cybersecurity professionals dedicated to safeguarding the availability, integrity, and security of their university community's data. Throughout the COVID-19 pandemic and beyond, cybersecurity challenges such as student scams and phishing attacks have become increasingly prevalent in the postsecondary education sector. In response, Dallaire and her team were searching for new tools to help them achieve McMaster University's comprehensive information security strategy.
Solution
Dallaire and her team adopted the Cyber Asset Attack Surface Management (CAASM) solution by runZero to run automated scans of their network, leveraging runZero’s active, unauthenticated scanner.
Outcomes
Implementing runZero provided McMaster University with invaluable insights into their assets, enabling quicker and more informed cybersecurity monitoring and decision-making. runZero's quick scans and automation streamlined their team's processes, allowing them to focus on mission-critical work.
Why runZero?
"Our team relies on runZero to remain vigilant in monitoring emerging vulnerabilities across our extensive network of information sources. The tool not only guides us in pinpointing precisely where and how to direct our security efforts but has seamlessly integrated itself into the very core of our security program, operational activities, and our suite of essential tools." - Tracy Dallaire | Director of Information Security | McMaster University