Skip to content

Sandfield strengthens IT security and automates monitoring with LogRhythm

Established in 1989, Sandfield has grown to become a leading provider of software applications for operational businesses looking to differentiate themselves through the use of technology.

The company’s services and product portfolio includes software and website development, application delivery, database administration, mobile app development and integration services. Sandfield supports clients throughout New Zealand and around the world.

The challenge

As it has grown during the past few years, Sandfield has increasingly been taking on larger and more complex client projects. This has required an expansion of the company’s cloud operations     and an increase in processing and storage capacities.

Justin Knight, Head of IT Operations at Sandfield, said this growth had also led to the need for increased IT security measures to ensure client applications and data were fully protected from external threats. At the same time, the organization benchmarked its protocols against an international standard to ensure their capabilities would be protected.

“About 18 months ago, we achieved our ISO27001 certification,” he said. “As a part of that, and to ensure we had all the required controls in place, we realized we needed better insight into and management of our security measures.”

Initially, the company’s IT team assessed whether this could be achieved using internal staffing and resources. However, it quickly became apparent that this would not be the most effective approach.

Click here to read more about the solution.

Facebook
Twitter
LinkedIn

Related Posts

Secure, optimized work from anywhere is already recognized as a necessity and a primary business opportunity for all IT teams. SSE successfully enables this by converging Web Proxy (SWG), ZTNA, CASB, and DLP into one, powerful, high-performing solution.
Overland’s security is up against the unique challenges of a retail environment. Anyone can walk up to a point-of-sale system and try to gain access when no one’s looking, a problem that’s amplified when staff share passwords to serve customers quickly.
Something interesting caught my eye, and it is the intersection between misinformation, disinformation, and cyber security and the World Economic Forum’s perceived level of the threat we all face.