Founded in 1852 during the Civil War era, Memphis Light, Gas and Water (MLGW) is now the largest three-service municipal utility in the country. MLGW is headquartered in Memphis, Tennessee and provides reliable and affordable electricity, natural gas and water service to more than 440,000 customers across Shelby County. The utility company purchases electricity from the Tennessee Valley Authority and natural gas from various transmission companies. Unlike other utility companies that draw water from lakes or rivers, MLGW taps into the Shelby County aquifer, a deep underground natural source known for its purity containing more than 100 trillion gallons of water.
The corporate network infrastructure at MLWG encompasses a broad array of IT and IoT assets: PCs, servers, virtual machines, switches, routers, and firewalls, along with scanners, cameras, TVs, and back-up uninterruptable power. To better secure and manage assets in this complex environment, Supervisor, Information Technology, Missy Burkes needed a tool that provided true visibility into unmanaged and rogue devices while accelerating cybersecurity mitigation by identifying vulnerabilities.
The Solution
Burkes learned about Armis Centrix™ for Asset Management and Security at a local workshop. Impressed with the scope of asset and vulnerability information that Armis provides, she prepared a presentation on its capabilities to upper management and won buy-in immediately.
Continue reading to learn how Armis Centrix™ gave the company comprehensive visibility and detailed insights into connected IT and IoT assets and resolving critical incidents.
Challenges
-
Lack of a complete view into IT and IoT assets
-
No reliable way to identify network connected unmanaged and rogue assets
-
Inability to pinpoint and remediate vulnerabilities
-
Disparate security solutions that slowed detection and remediation of threats and vulnerabilities
Results
-
Provided a comprehensive and accurate asset inventory of all IT and IoT assets
-
Discovered more than twice the number of assets previously accounted for
-
Drilled into the security posture of assets, speeding up vulnerability mitigation
-
Reduced time and effort involved in troubleshooting and issue resolution