Toyota locks down financial data with Palo Alto Networks

Car manufacturer turns to network security firm to safeguard financial data.

smartphone financial

The UK financial services arm of car manufacturer Toyota has deployed Palo Alto Network's Intrusion Prevention System (IPS) to help safeguard its data.

The IPS will monitor networks for any malicious malware activity, before identifying it, logging it, and blocking it from accessing the network.

As part of the deployment, the company has rolled out a network-generation firewall, and a cloud-based Wildfire threat portal, which it is claimed will give Toyota the ability to detect all types of modern malware.

Palo Alto Networks worked with IT consultancy Synetix Solutions to deploy the firewalls across two UK sites in Burgh Heath and Salford, and for 1,300 users.

"Through Palo Alto Networks, we've achieved the best of both worlds, bringing unknown threats out into the light, while also getting far better insight into how our network is running," said Robert Spiteri, Toyota Financial Services Security and Network team leader.

It is hoped the addition of these products will boost the security of Toyota's financial information, and bolster network performance capacity in anticipation for future business expansion.

"Toyota has taken a positive step here to keep all potential threats, no matter what size and whether encrypted or not, away from company assets," said Alex Raistrick, the director for western Europe at Palo Alto Networks.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021