IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users. Click here to read more…
“Kaseya has empowered IT operations to run more smoothly. Tasks that took hours or days before now just take moments. That results in fewer interruptions to the business; allowing thecompany to focus on business objectives rather that a “tech”taking up their workday installing patches and upgrades.”
– Jon Morgan, Manager of Information Technology, Cano Petroleum.
As a publicly traded oil and gas company, Cano Petroleum, Inc. must comply with the Sarbanes-Oxley Act of 2002, reliably accounting for all revenue streams and corporate expenditures in an effort to ensure transparency throughout the accounting process. The company uses innovative technology to extract additional oil and gas from mature fields throughout Texas, New Mexico and Oklahoma, necessitating the need to centralize compliance efforts through its headquarters in Ft.Worth.
For the IT department, ensuring SOX compliance means being able to account for all IT assets, making sure systems are maintained regularly and consistently, protected from malicious security threats like spyware and viruses, backed up properly and can be recovered easily in case of data loss. Cano also has to ensure that help desk issues are dealt with accordingly, corporate resources are not being used for personal use (within reason) and the company is in compliance with the software licensing agreements it has in place with vendors. Read more on Cano Petroleum Inc
Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their digital innovation. The Symantec Global Language Services Centre is responsible for company‐wide localisation management along with ongoing research and development efforts. In 2006 Symantec approached Invent DCU with a problem statement dealing with multilingual customer support. Due to demands on time, Symantec can currently only provide security alert information to many of its global customers in English. The time required for human translation means that translation is often not possible and, therefore, Symantec’s customers do not receive critical information on security threats, in their native language. Click here to read more…
Today’s supply chains are vulnerable to security threats and the uncertainties associated with them. While governments and the private sector are working together to launch new initiatives to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID towards the same goals.
We conducted a study based on a panel of leading shippers to understand better the key problem areas faced by shippers in international shipping, the current capabilities of shippers in gaining control of their supply chain information, the potential of RFID in addressing these problems areas, and the investment plans in RFID of the shippers.
Our shippers’ biggest performance objectives are still the ultimate dual goal of reducing stockouts and inventory. These two objectives directly impact a company’s bottom line. In pursuing these objectives, our shippers found that the biggest pain points faced by them are uncertainties and lead time in customs and transit, as well as the visibility of their products en route from the origin ports to the destination ports. While some capabilities to give visibility in a supply chain exist today, they are still quite limited. Click here to read more…
Risk management, regulatory compliance, and IT security services are booming. In fact, with rising IT security threats, the increased dependence on technology to run business, and the demands of attaining regulatory compliance, continue to push demand for security services—including risk assessments, consulting, and vulnerability management services—that are growing at a double-digit clip. Analysts expect the global market for security services to exceed $32 billion by 2010, as more organizations seek the strategic guidance needed to assess their level of IT risk, vet their security and privacy policies, and gain third-party insight through IT audits. View more..