Tag Archives: Security Threats

Case Study on Cano Petroleum Inc

Kaseya has empowered IT operations to run more smoothly. Tasks that took hours or days before now just take moments. That results in fewer interruptions to the business; allowing thecompany to focus on business objectives rather that a “tech”taking up their workday installing patches and upgrades.
– Jon Morgan, Manager of Information Technology, Cano Petroleum.



As a publicly traded oil and gas company, Cano Petroleum, Inc. must comply with the Sarbanes-Oxley Act of 2002, reliably accounting for all revenue streams and corporate expenditures in an effort to ensure transparency throughout the accounting process. The company uses innovative technology to extract additional oil and gas from mature fields throughout Texas, New Mexico and Oklahoma, necessitating the need to centralize compliance efforts through its headquarters in Ft.Worth.






For the IT department, ensuring SOX compliance means being able to account for all IT assets, making sure systems are maintained regularly and consistently, protected from malicious security threats like spyware and viruses, backed up properly and can be recovered easily in case of data loss. Cano also has to ensure that help desk issues are dealt with accordingly, corporate resources are not being used for personal use (within reason) and the company is in compliance with the software licensing agreements it has in place with vendors. Read more on Cano Petroleum Inc






Register to mark your Comments


Case Study on Symantec

Symantec
is
the
world
leader
in
providing
solutions
to
help
individuals
and
enterprises
assure
the
security,
 availability,
 and
 integrity
 of
 their
 digital
 innovation. The
 Symantec
 Global
 Language
 Services
 Centre
 is
 responsible
 for
 company‐wide
 localisation
 management
 along
 with
 ongoing
 research
 and
 development
 efforts.

 In
 2006 Symantec
approached
Invent
DCU
with
a
 problem
 statement
 dealing
with
multilingual
 customer
 support. 
Due
to
demands
on
time,
Symantec
can
currently
only
provide
security
alert
information
to
many
 of
its global customers
in
English. 
The
time
required
for
human
translation
means
that
translation
is
often
 not
 possible
 and,
 therefore,
 Symantec’s
 customers
 do
 not
 receive
 critical
 information
 on
 security
 threats, in
their
native
language. Click here to read more…

Register to mark your Comments

Case Study on Supply Chain Security

Today’s supply chains are vulnerable to security threats and the uncertainties associated with them. While governments and the private sector are working together to launch new initiatives to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID towards the same goals.

We conducted a study based on a panel of leading shippers to understand better the key problem areas faced by shippers in international shipping, the current capabilities of shippers in gaining control of their supply chain information, the potential of RFID in addressing these problems areas, and the investment plans in RFID of the shippers.

Our shippers’ biggest performance objectives are still the ultimate dual goal of reducing stockouts and inventory. These two objectives directly impact a company’s bottom line. In pursuing these objectives, our shippers found that the biggest pain points faced by them are uncertainties and lead time in customs and transit, as well as the visibility of their products en route from the origin ports to the destination ports. While some capabilities to give visibility in a supply chain exist today, they are still quite limited. Click here to read more…

Register to mark your Comments

Case Study on Joel Lanz, CPA, P.C.

Risk management, regulatory compliance, and IT security services are booming. In fact, with rising IT security threats, the increased dependence on technology to run business, and the demands of attaining regulatory compliance, continue to push demand for security services—including risk assessments, consulting, and vulnerability management services—that are growing at a double-digit clip. Analysts expect the global market for security services to exceed $32 billion by 2010, as more organizations seek the strategic guidance needed to assess their level of IT risk, vet their security and privacy policies, and gain third-party insight through IT audits. View more..






Register to mark your Comments


Case Study on Privileged User Management


IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users. Click here to read more…

Register to mark your Comments