Company Size:

  • 小型

Products Used:

Web Security
Email Security
Forcepoint DLP

The implementation of the Forcepoint solution was very simple and has reduced the risk of information being accidentally released to zero.

Andrea Cappelloni
IT Manager


Toyota Motor Corporation, based in Japan, is one of the world’s largest automotive manufacturers. In 2014, the multinational corporation employed over 338,000 individuals worldwide and, as of November 2014, was the 11th-largest revenue generating company in the world. 

In 1990, Toyota Motor Italia S.P.A was created as a direct subsidiary of the Toyota Motor Corporation. Since it opened its doors, the company has seen nothing but exponential growth, becoming the best-selling Japanese car brand in Italy with more than 1.7 million vehicles sold. The company is headquartered in Rome, with approximately 230 sales and service points throughout the country.

The customer will always be the focus of Toyota’s business model so as to guide its research and development on the principle of Human Innovation: In addition to the revolution of the hybrid vehicle, the most recent example of attention to the protection of the customer is the development of the Toyota Safety Sense, a new set of technologies designed to prevent and reduce collisions. 

Toyota continues to demonstrate extraordinary innovation, revolutionizing the automotive industry. This level of global attention attracts high-level threats to its most crucial intellectual property and sensitive data. Knowing its current threat potential, Toyota Italia began a project focused on three different areas: Internet management, device and data control, and log management.


In today’s rapidly changing technological landscape, assets now include highly sensitive, confidential data. Information is being stored and retrieved on a variety of devices such as laptops, smartphones, and tablets for users on or off the corporate network. Protecting this information effectively, consistently, and in compliance with industry and government regulations is an increasingly difficult and costly challenge as the average total cost of a data breach is $3.8 million.

“The wealth of information at Toyota, including intellectual property and other sensitive data, is essential to our business. Our innovative projects are crucial to further our growth, which means protection of these resources is absolutely necessary.”
— Andrea Cappelloni, IT Manager, Toyota Motor Italia S.P.A

Andrea and the IT Department at Toyota recently reviewed their overall security posture to identify all possible points of weakness leading to leakage of sensitive information in an unauthorized manner. Their conclusion was clear: In order to efficiently monitor and block the transfer of company data while preventing data loss and data theft, Toyota needed the unique benefits of a unified security solution.


After a series of meetings, demos and workshops organized by various vendors, Toyota found the Forcepoint solution ideally suited to respond to its most crucial data security needs while coordinating inbound and outbound defenses across web and email channels.

From inbound attack activity to outbound data loss, Forcepoint architecture protects web and email communications against advanced threats across the entire kill chain. As a result of implementing the Forcepoint solution, Toyota has been able to block malicious attachments and downloads, protect against sensitive data loss through web uploads and email, and apply additional controls for designated channels not authorized by the company — such as an employee’s private email. In addition, Forcepoint architecture provides employee education of threat awareness. When attempting to access high-risk content online, as well as sharing “deactivated” phishing emails with the intended recipients, users get real-time exposure to how threats work through on-screen notifications.

In addition to the data-in-motion defenses for web and email, Forcepoint Security allows the IT department at Toyota to control data-in-use and data-at-rest on endpoints. All copies of data and documents transferred to USB devices are automatically encrypted — access to these files is allowed only inside the enterprise perimeter — controlling the printing of sensitive material to mitigate potential data loss.

“Through this solution we activated a series of logs, such as a ‘Network Printing Log’ — all documents sent to network printers are logged with the ability to retrieve a printed attachment.”
— Andrea Cappelloni

Finally, Forcepoint enabled Toyota to easily apply and manage the same policies to its mobile workforce as those on the corporate network. This allows the company to remain fully productive while operating remotely on the road or after hours and provides an enhanced level of protection.

“We use Forcepoint to protect employees from the latest cyber-attacks thanks to real-time protection. Additionally, the protection extends to workers remotely, saving the time it would take to return to the office in case their computers were infected.”
— Andrea Cappelloni


Toyota uses Forcepoint solutions to ensure that the implementation of corporate policies reaches all employees, on all devices, even if they are working outside the network. Forcepoint allows Toyota employees to enjoy the same level of real-time security from advanced threats, on and off the network. Furthermore, the company is now able to control unauthorized platforms such as private mailboxes. Lastly, the Forcepoint solution allows Toyota to control all use or movement of critical or sensitive data.

“The implementation of the Forcepoint solution was very simple and has reduced the risk of information being accidentally released to zero. Forcepoint provides us with the tools necessary to defend against advanced threats.”
— Andrea Cappelloni

Toyota has relied on Forcepoint security solutions since 2012.


Forcepoint DLP

通过Forcepoint 数据泄漏防护(DLP),让员工能够跨设备工作,连接到多个网络,并在云应用程序中工作。

Email Security

Forcepoint电子邮件安全使用高级分类引擎(ACE) 来识别各种威胁,从恼人的垃圾邮件到高级恶意软件、网络钓鱼和商业电子邮件入侵(BEC) 攻击。

Web Security

通过本地管理控制,为受到严格监管的组织的网络和漫游员工提供高级 Web 威胁防护。