Download PDF
Contrast Security > Case Studies > Enhancing Application Security and Efficiency in E-commerce with IoT
Contrast Security Logo

Enhancing Application Security and Efficiency in E-commerce with IoT

Technology Category
  • Application Infrastructure & Middleware - Event-Driven Application
  • Cybersecurity & Privacy - Application Security
Applicable Industries
  • E-Commerce
  • National Security & Defense
Applicable Functions
  • Procurement
  • Product Research & Development
Use Cases
  • Tamper Detection
  • Time Sensitive Networking
Services
  • Cybersecurity Services
  • System Integration
The Challenge
Tillster, a global leader in self-service digital ordering, faced the challenge of improving and simplifying its application security. The company needed to incorporate a more active and dynamic vulnerability assessment system to ensure the security of its applications. The challenge also included providing guidance to Tillster’s DevOps team to achieve optimal protection within the entire Software Development Life Cycle (SDLC). The company had to balance internal and external practices, comply with OWASP’s top 10 application security risks and mobile application guidelines, and run scans and penetration tests to meet PCI standards. Patch management was critical for keeping Tillster’s applications safe, as 99% of software exploits are based on known vulnerabilities. Furthermore, Tillster had to deliver secure software on schedule, ensuring that security issues did not cause delays and that the software in production did not pose a risk to restaurants or consumer data.
About The Customer
Tillster is a privately held e-commerce company and a global leader in self-service digital ordering, improved customer insights, and guest engagement. The firm empowers casual dining and quick service multi-tenant restaurants and consumers to engage and transact anywhere, anytime, from any device. The company provides multi-channel, market-specific digital solutions for ordering, payment, loyalty and lifestyle management that integrate across online, mobile, tablet, kiosk and call center platforms. Tillster has partnerships with over 100 restaurant brands, supporting more than 40,000 locations, and providing over 35,000,000 digital orders per year. Some of its most noteworthy clients include the world’s leading brands such as Pizza Hut, Arby’s, Burger King, and Steak ‘n Shake.
The Solution
Tillster adopted Contrast Assess, a solution that enabled the company to effectively and efficiently maintain its applications such as Java and .NET without traditional legacy-based scanning or the need for expensive security experts. Contrast Assess allowed Tillster’s 75+ developers to address security issues during the development process, when the cost of doing so is lower. This solution helped Tillster find the latest code changes to improve application security systems and networks. It supported Tillster’s secure development processes by operating inside applications to uncover vulnerabilities, prevent data breaches, and provide security throughout the entire application lifecycle. As a result, Tillster’s developers had the tools to rapidly solve security problems wherever and whenever they arose.
Operational Impact
  • After successfully integrating Contrast Assess into the SDLC, Tillster enjoys 24/7 real-time monitoring, application analysis, and clear and specific instruction on how to fix vulnerabilities. Thanks to Contrast Security’s combination of interactive, static, and dynamic application security testing technology, Tillster can track and analyze vulnerabilities to a specific line of code and remediate them before they become a liability. As a result, Tillster has ongoing assurance that its customer-facing software is secure. Furthermore, their online and mobile ordering solution delivers a consistent, secure experience for every customer, every time, regardless of channel or device.
Quantitative Benefit
  • Deployment of agents that monitor code and report from inside applications
  • Identification of vulnerabilities with guidance to fix them
  • More efficient attack planning and tracking

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.