Case Study
Zeppelin Airship Technology
(Germany)

Since 1993, the ZLT Zeppelin Luftschifftechnik GmbH & Co KG (ZLT) has been developing, manufacturing and marketing Zeppelins of New Technology.
Based on the technology introduced by the very company founded over 100 years ago by Count Ferdinand von Zeppelin, ZLT has kept intact the business combination for airship development and manufacturing to this day, preserving the memory of the world famous airships built in the early 20thcentury.

The Challenge

About 100 Windows XP workstations within ZLT offices, all with interfaces and ports such as USB or CD/DVD devices, have been available for easy access by all users. Accidental loss or deliberate data theft of company data via standard interfaces through the endpoints was theoretically possible for everyone. Our challenge was to prevent this from actually happening.

The use of portable programs and even executing files and applications from portable storage devices need to be controlled and monitored carefully. Additional protection against the introduction of malware such as Stuxnet (Conficker) by such devices was also required by ZLT.

The Solution

The ZLT Zeppelin Luftschifftechnik GmbH had been using for quite some time the Endpoint Protector 2009 software solution to ensure the security of their PC interfaces.

To further optimize the internal IT infrastructure, the IT Director has decided to switch to the now available Endpoint Protector Hardware Appliance.

Other software solutions that were evaluated in the process have been DeviceWatch, DeviceGuard, and Safend.

By using the Endpoint Protector Hardware Appliance for the central management of all interfaces and ports, the internal protection of the company network and the transparency of user activity in connection with portable device use has become even easier for the IT department.

Administration and management are rendered extremely easy by the intuitive Web-based reporting and administration interface. Through its device control and data loss prevention features such as file tracing and file shadowing, the appliance provides a consistent record of all activities, allowing an ongoing investigation of any activity related to port and portable device use and possible reporting to the company's management in the event of irregularities.

Why Endpoint Protector Appliance?
  • Central Management of ports and interfaces
  • Internal Protection of the company network
  • Traceability of all actions at ports and interfaces
Let’s talk about your use case

Fill in the form below to get in touch with one of our DLP experts
Check your email to download .
If you don't see it please check your spam or junk folders.



Please use a valid email address!
Data Loss Prevention Best Practices
Download our free ebook on
Data Loss Prevention Best Practices

Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.

The case study is also available for download