CASE STUDY

Financial advisory secures workflow for contract staff.

Financial-Hero-1200x470px

Financial advisory brings visibility and control to contract staff who access the server remotely.

The client is a Melbourne-based financial advisory providing strategic guidance to the corporate market (business is confidential in nature so they’ve asked to remain anonymous).

Founded in 1990, the firm employs 18 full-time staff and 12 contractors. Business owner Jeff Lawson is also responsible for administration including IT support.

His primary goal for engaging Emerging IT was to improve security for online file storing network, in particular for contract staff who access the server remotely.

Challenge: improve network reliability, security and reporting 

  • Assist, educate and provide tools for the owner in the administration and management of IT systems and staff to improve security and reduce time spend on administration.
  • Improve reliability to ensure maximum productivity of all employees, in-house and external.
  • Implement a cost effective solution within the budget of the company.

Solution: proactive monitoring and improved reporting and tracking

  • Conduct a thorough IT audit to assess current systems, diagnose problems and find untapped opportunities.
  • Recommend key modifications to the Financial Advisors’ computer network.
  • Integrate the Lanserve system, incorporating remote IT management and monitoring technology.
  • Report on all access to the network, allowing the client to monitor all activity on their server.
  • Implement policy-based controls.

Results: increased visibility across the network and users

  • Tighter security across the entire network – for internal staff and external contractors.
  • Complete tracking and reporting of all server activity with a full record of who is doing what, when and where.
  • Maximisation of network uptime, which goes hand-in-hand with team productivity and profitability.

"Complete tracking and reporting of all server activity with a full record of who is doing what, when and where. This results in tighter security across the entire network – for internal staff and external contractors."