Information Security at Cincom Systems: Analysis of IT Threats

1285 Words5 Pages
Information Security at Cincom Systems Introduction As a global leader in the design, development, implementation and support of enterprise software, Cincom Systems has over two thousand customers globally. The majority of these are foreign governments who use Cincom software to better manage their departments of defense, complex manufacturing operations critical to their national growth, and elements of their national security. Cincom has been able to attain significant sales throughout the U.S., United Kingdom (UK), France and Australia by offering government and private industry customers in these nations an exceptionally high level of confidentiality, integrity and availability (CIA) of data and information security. Using the Confidentiality, Integrity, and Availability (CIA) Triad Model to manage the compliance, security and reporting requirements of their international software development, Cincom also has been able to attain a high level of trust with new foreign government customers as well. My experiences were gained from working at Cincom for two years as an IT technician part time. During that time I was able to see how information and data security strategies, threats, and ongoing system monitoring are all managed within the Cincom Corporate Data Center located in Cincinnati, Ohio. While working there I was also able to see how Cincom actively monitors computer usage today and learn how the restrictions on access to company data are managed. Insights from

More about Information Security at Cincom Systems: Analysis of IT Threats

Open Document