Connect your business network with next-gen collaboration technology
Do you want to deeply modernize your collaboration technology without disruption? To help connect businesses together, we are pleased to…
Generix named in the 2024 Gartner® Magic Quadrant™ for Warehouse Management Systems (WMS) for the sixth consecutive year. View the press release.
An IS project is considered sensitive if it involves any data — whether personal or not — for which a loss of integrity would have an impact on the host company. The consequences of a security breach could be legal, financial, or operational in nature. Whatever the case, they will be damaging to the brand image.
To protect against the most common cyber-attacks, MANQUE LE LIEN >> such as ransomwares, your service provider must implement a cyber-resilience approach with the security manager right from project launch. The ISO 27001 standard and indications provided by the CNIL should be considered minimum best practices when evaluating your cybersecurity.
Beyond the kick-off phase, data safety should remain an important part of company policy, meaning that a designated contact should be assigned to it at every project milestone.
During project development, the MANQUE LE LIEN >> rules to implement in order to secure your system are defined by the SaaS service provider:
At Generix Group, these cyberprotection actions are performed in-house: all information is stored on the company’s SaaS server, except for passwords.
Access must also be secured client- and provider-end. Companies must remain vigilant with respect to professional equipment theft and notify service providers so that they can restrict access remotely. When employees leave the company, it is imperative to revoke their rights to services and software they had access to.
At Generix Group, a single procedure offers connection to a client’s internal address book. When an employee leaves the company, the client address book transmits this information to the Generix Group address book automatically. The information is deleted instantly, thus ensuring data security. Conversely, new company arrivals are managed directly so that they are immediately operational in the company.
Right before production launch, care must be taken to verify that the commitments made by project teams were made operational.
This is the case at Generix Group, where project teams implement test phases for all applications. Code audits and intrusion testing are also carried out by an ethical hacker in lean startup mode (continuous improvement) shortly before production launch. The goal is to refine the data security measures implemented late in the game.
Do you want to deeply modernize your collaboration technology without disruption? To help connect businesses together, we are pleased to…
Understanding what it means to be EDI capable is essential for businesses looking to streamline their operations and improve supply chain efficiency. This guide covers everything from the definition and benefits of being EDI capable to the steps involved in implementing a robust EDI system.
While lesser known than accounts payable automation software, accounts receivable automation solutions automate the capture, validation and process of invoices…
Work with our team to build your ideal supply chain software stack and tailor it to your unique business needs.