Skip to content

Sandfield strengthens IT security and automates monitoring with LogRhythm

Established in 1989, Sandfield has grown to become a leading provider of software applications for operational businesses looking to differentiate themselves through the use of technology.

The company’s services and product portfolio includes software and website development, application delivery, database administration, mobile app development and integration services. Sandfield supports clients throughout New Zealand and around the world.

The challenge

As it has grown during the past few years, Sandfield has increasingly been taking on larger and more complex client projects. This has required an expansion of the company’s cloud operations     and an increase in processing and storage capacities.

Justin Knight, Head of IT Operations at Sandfield, said this growth had also led to the need for increased IT security measures to ensure client applications and data were fully protected from external threats. At the same time, the organization benchmarked its protocols against an international standard to ensure their capabilities would be protected.

“About 18 months ago, we achieved our ISO27001 certification,” he said. “As a part of that, and to ensure we had all the required controls in place, we realized we needed better insight into and management of our security measures.”

Initially, the company’s IT team assessed whether this could be achieved using internal staffing and resources. However, it quickly became apparent that this would not be the most effective approach.

Click here to read more about the solution.

Facebook
Twitter
LinkedIn

Related Posts

Personal data protection is more important than ever in this digital world. The dark web is a secret part of the internet that is very dangerous because it is often used for illegal things like selling personal information.
Every morning, I stand before my coffee machine, a humble supplicant seeking caffeine. Sound familiar? Probably because you find yourself in much the same position (though in your home, not mine). But the coffee machine is wiser than it appears: It doesn’t care that I’ve spent years navigating the wilds of cybersecurity while exploring select espressos from Brazil and beyond.
A throwaway joke got me thinking recently. Any system that appears secure might just be that way because it hasn’t yet been compromised. And as we say in this game, there’s only two types of companies out there, those that have been breached and those that don’t know they’ve been breached.