下载PDF
Enhancing Application Security and Efficiency in E-commerce with IoT
技术
- 应用基础设施与中间件 - 事件驱动型应用
- 网络安全和隐私 - 应用安全
适用行业
- 电子商务
- 国家安全与国防
适用功能
- 采购
- 产品研发
用例
- 篡改检测
- 时间敏感网络
服务
- 网络安全服务
- 系统集成
挑战
Tillster 是自助数字订购领域的全球领导者,面临着提高和简化其应用程序安全性的挑战。该公司需要采用更加主动和动态的漏洞评估系统来确保其应用程序的安全。该挑战还包括为 Tillster 的 DevOps 团队提供指导,以在整个软件开发生命周期 (SDLC) 内实现最佳保护。该公司必须平衡内部和外部实践,遵守 OWASP 的十大应用程序安全风险和移动应用程序指南,并运行扫描和渗透测试以满足 PCI 标准。补丁管理对于保证 Tillster 应用程序的安全至关重要,因为 99% 的软件漏洞利用都是基于已知漏洞。此外,Tillster 必须按时交付安全软件,确保安全问题不会导致延误,并且生产中的软件不会对餐厅或消费者数据构成风险。
关于客户
Tillster 是一家私营电子商务公司,是自助数字订购、改进客户洞察和宾客参与度方面的全球领导者。该公司使休闲餐饮和快速服务多租户餐厅和消费者能够随时随地通过任何设备进行参与和交易。该公司为订购、支付、忠诚度和生活方式管理提供多渠道、针对特定市场的数字解决方案,这些解决方案跨在线、移动、平板电脑、信息亭和呼叫中心平台集成。 Tillster 与 100 多个餐厅品牌建立了合作伙伴关系,为 40,000 多个餐厅提供支持,每年提供超过 35,000,000 个数字订单。其一些最值得注意的客户包括必胜客、Arby's、汉堡王和 Steak 'n Shake 等世界领先品牌。
解决方案
Tillster 采用了 Contrast Assess,该解决方案使该公司能够有效且高效地维护 Java 和 .NET 等应用程序,而无需传统的基于遗留的扫描或昂贵的安全专家。 Contrast Assess 使 Tillster 的 75 名以上开发人员能够在开发过程中解决安全问题,而这样做的成本较低。该解决方案帮助 Tillster 找到最新的代码更改,以改进应用程序安全系统和网络。它通过在应用程序内部运行来发现漏洞、防止数据泄露并在整个应用程序生命周期中提供安全性,从而支持 Tillster 的安全开发流程。因此,Tillster 的开发人员拥有能够随时随地快速解决安全问题的工具。
运营影响
数量效益
相关案例.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Digital Transformation of Atlanta Grout & Tile: An IoT Case Study
Atlanta Grout & Tile, a Tile, Stone & Grout restoration company based in Woodstock, Georgia, was facing challenges with its traditional business model. Despite steady growth over the years, the company was falling behind the web revolution and missing out on the opportunity to tap into a new consumer base. They were using independent software from different vendors for each of their department information and workforce management. This resulted in a lot of manual work on excel and the need to export/import data between different systems. This not only increased overhead costs but also slowed down their response to clients. The company also had to prepare numerous reports manually and lacked access to customer trends for effective business decision-making.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
IFFCO Boosts IT Performance and Innovates Agriculture with Oracle Cloud
Indian Farmers Fertiliser Cooperative Ltd. (IFFCO), the world’s largest manufacturer and marketer of fertilizers in the cooperative sector, was facing several challenges in its quest to innovate and improve the livelihood of farmers in India. The organization had recently launched a new product, nano urea, which brought new demands to IFFCO’s cloud computing needs. The organization needed a reliable cloud vendor to support the processes of 6–7 new manufacturing plants during the upcoming year, enhancing its production capability 300–350 million bottles of nano urea to meet increasing demand. IFFCO’s cloud adoption was driven by a need to innovate. The organization wanted capabilities for a dynamic business that can adapt to the changing needs of the market while growing fast. However, it was inhibited by rigid on-premises data center deployments and the overhead of maintaining legacy systems. IFFCO wanted to apply the elasticity and availability of cloud for improving overall performance of applications at lowest possible operational overhead. Lastly, IFFCO needed to provide the benefits of its technology to all its stakeholders, including employees, members, transporters, and farmers, some of whom have limited literacy. To accommodate all stakeholders, IFFCO wanted to add a voice interface to its applications.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.