Published on 5-Jun-2013
“ While software audits initially drove our search for a new solution, we discovered that we needed endpoint management consistency throughout the entire enterprise. IBM BigFix provided all that in a single tool. ”
Jeff Lemke, director of IT site operations, Career Education Corporation
Career Education Corporation
Career Education Corporation (CEC) offers doctoral, master’s, bachelor’s and associate degrees as well as diploma and certificate programs to more than 75,000 students across the world online, through its campuses and in a hybrid environment.
Career Education Corporation (CEC) used a fragmented endpoint management system to track thousands of endpoints at 80 campuses and 10 offices. It needed to centrally manage software and hardware assets.
CEC selected the IBM BigFix solution as its software asset management tool and extended it to hardware asset management, patching, antivirus updating and laptop encryption.
By replacing manual patching, testing, deploying and remediating processes for more than 20,000 endpoints, CEC gained the visibility and control necessary to confirm software and security compliance.
IBM products and services that were used in this case study.
IBM BigFix Inventory
IBM, the IBM logo, ibm.com, and BigFix are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Microsoft, Project, Visio and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. The content in this document (including currency OR pricing references which exclude applicable taxes) is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. WGC12422-USEN-00