fbpx
Hybrid Email Technology Implementation at a Manufacturing Company
August 23, 2024

Achieving a Lean and Cost-Effective IT Infrastructure for an MSME

 

Overview:

This case study details how a forward-thinking MSME implemented a comprehensive yet economical IT infrastructure to meet critical business needs. Through an “IT in a Box” solution, the company tackled stringent compliance requirements, centralized data, ensured business continuity, and prevented data leakage, all while maintaining a lean budget.

Background :

With increasing client expectations for data protection, the MSME needed a cost-effective solution that didn’t compromise security, functionality, or compliance. This new IT framework covered all essentials: hardware, software, firewall VPN, file servers, tally servers, endpoint controls, backups, email, and domain controllers. The solution also had to meet several key objectives aligned with both customer and operational requirements.

Core IT Requirements and Objectives :

The MSME outlined several objectives for its IT infrastructure to ensure both operational efficiency and compliance with cybersecurity and data protection standards:

  1.  Data Protection and Cybersecurity Compliance
    Many of the MSME’s larger clients mandated strict ISMS (Information Security Management Systems) standards, requiring the company to provide cybersecurity audit reports and regular documentation. Ensuring compliance became a top priority.
  2.  Data Centralization
    To streamline data management and backup processes, all files, designs, and documents needed to be centralized. This avoided duplication, minimized storage complexity, and provided a secure, singular data source.
  3.  Business Continuity Planning
    The company needed to safeguard against accidental data deletion, ransomware attacks, hardware failures, and disasters. This demanded a robust backup and recovery system capable of restoring data under various adverse conditions.
  4. Data Leakage Prevention
    Protecting intellectual property was critical, especially from threats like unauthorized USB, email, and internet-based data transfers.
  5. Cost-Effective Software Solutions
    Balancing genuine software licenses, antivirus needs, and office tools in a budget-friendly manner was essential.

User-Specific IT Needs:

  •  20% of employees required advanced design tools like AutoCAD.
  •  20% required high-end MS Office functions.
  •  40% used MS Office for basic tasks.
  •  20% needed large mobile mailboxes.
  •  40% accessed email via a client.
  •  20% worked remotely on company-provided laptops.
  •  20% needed remote access to tally and file data.

Achievement of Data Protection and Cybersecurity Compliance Objectives

In order to achieve the objectives of Data Protection and Cybersecurity Compliance they had to invest in multiple systems like File Server Hardware, Tally Server Hardware, Microsoft Server Operating System, Microsoft Server Client Access Licenses, NAS Storage, Backup Software, VPN Firewall, End Point Controls, Remote Access Terminal Server, RDP Client Access Licenses, and Email Control System. It required investment in multiple hardware products and software services.
They adopted “IT in a Box” Technology and avoided procurement of multiple hardware and software solutions. They invested in BLACKbox with addon BLACKbox AAA (Access Applications Anywhere), which is a leading “IT in a Box” Solution and avoided procurement of multiple systems and their integration. BLACKbox served in leu of File Server Hardware, Tally Server Hardware, Microsoft Server Operating System, Microsoft Server Client Access Licenses, NAS Storage, Backup Software, VPN Firewall, End Point Controls, Remote Access Terminal Server, RDP Client Access Licenses, and Email Control System.

Compared to the cost of multiple hardware and software systems, “IT in a Box” solution was procured at one third of the cost, i.e. 66 percent savings.

Achievement of Data Centralization Objectives
The investment in BLACKbox packed Device Hardening Technology to force the users to store data on central location only. This technology greatly helped achieve data centralization without being impacted by users negligence or ignorance while storing data at central location.

Achievement of Business Continuity Planning Objectives
The investment in BLACKbox packed multiple technologies to maintain Business Continuity in the most reliable manner.

Business Continuity in event of Accidental or Intentional Deletion of Data

Active Recycle Bin technology packed with BLACKbox helped the enterprise to confidently restore the accidentally deleted data immediately. It also empowered the MSME to find out who deleted the data in case of intentionally deleted data.

Business Continuity in event of Ransomware Attack
This is how the enterprise covered the risk of Ransomware Attack at two levels.

By implementing antivirus on each computer
They implemented McAfee Antivirus on each system at INR 400 per user per year to protect the systems from known ransomware

By deploying Primary-Hidden Chamber technology of BLACKbox
They ensured the plan B to recover data in case antivirus cannot detect a new ransomware.

Business Continuity in event of Disaster or Hardware Failure
They covered the risk of loss of business continuity due to disaster or hardware failure by subscribing to data center backup services of BLACKbox. Compared to the services like AWS, GCS, AZURE, ACRONIS, they saved 70% cost on yearly basis.

Achievement of Data Leakage Prevention Objectives
The investment in BLACKbox packed multiple technologies to mitigate Insider Threats and Data Leakage. Its comprehensive device hardening technology ensured data leakage prevention over USB Port, Email Attachment, Blind Carbon Copy, and Internet Drives.

Cost Effective Email Subscription
They opted for hybrid email system to take care of their email needs. Majority of the users used emails in an email client with minimalistic needs. They provided hybrid email system to these users and provided Google Workspace Account to the 5 users. They could use both email systems on the same domain name. It saved the cost by 70%.

Cost Effective Procurement of Computer Systems with Geniuine OS
They opted to purchase refurbished computers that are installed with genuine operating systems. It resulted in the savings of almost 50%. Check this link to find out options in refurbished computers.
https://www.unitedsmes.in/shop

Cost Effective Procurement of Office Products
They provided MS Office Subscription to 5 users and provided WPS Office Subscription to the users who needed basic features of MS Office. They have given the feedback that the users did not have to go through the learning curve while user WPS office as it is intuitive and has seamless compatibility with MS Office.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Demo

Want to know More?

Ask for Demo








    captcha

    Check

    IT INFRASTRUCTURE AUDIT

    Reality Check Voucher worth INR 20000 NOW FREE

               








      captcha