Preview

Open Pro

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Open Pro
According to OpenPro.com, OpenPro is a system that is fully designed to run on the Web. This provides the company with real time analysis to help drive efficiency, organization and customer satisfaction using one entire system management database. Below is an example of a Distribution module of how information flows through the OpenPro system:

Internet and Mobile Access Components

OpenPro is described on OpenPro (2012) as a “fully web-based ERP solution.” As an entirely web-based multipurpose program, the diversity of the program has few limitations. However, this also puts OpenPro at a range of security risks. Riordan information technology and security areas will be required to be available to not only safely transition the company to OpenPro use, but also to continue monitoring and implementation of security measures. As previously discussed, OpenPro is an open source program, meaning that it has a public use doctrine, allowing it to be used and manipulated in any way the buyer sees fit. This creates great versatility, but puts the program at risk of manipulation and may create security loopholes. You will find as you read further what these security loopholes may be and what can be done to minimize the risk. The OpenPro program is also completely online-based, meaning that all data “always on” and will stored in a cloud via the secure Riordan data center based in San Jose, CA (University of Phoenix, 2013). As many employees across a wide range of departments will be accessing this cloud from a variety of workstations (mobile phones, approved home terminals, laptops, and on-site workstations), adequate security measures will be enabled at all times. These security measures include user-specific logon information, multi-level encryption, and a human resources-based accountability clause (mandatory for all employees). Since OpenPro is completely online-based these security measures are required for a company’s success and constant ability to



References: University of Phoenix. (2013). Riordan Manufacturing, Inc. [Multimedia]. Retrieved from University of Phoenix, CIS319 website. OpenPro. (2012). OPENPRO ERP SOFTWARE MODULES. Retrieved From http://www.openpro.com/products_modules.html OpenPro. (2012). OpenPro’s Rapid Implementation Method. Retrieved from http://www.openpro.com/products_implementation_rim.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    | * OS Update appliance * Patch/Configuration appliance * Embedded biometrics * Remote policy management * Endpoint Encryption * Secure browser * Secure Email * Incremental backup…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First and foremost all files need to be encrypted and password protected. The Playstation Network was taken down easily because routers were left unprotected and the data belonging to users was not encrypted. Everything needs to be locked down digitally. Riordan conducts business in many places and hackers are everywhere. Finance and accounting use outdated systems and manually enter information. Integration of the systems through a secure pipeline will decrease the security risks but the files still need to be encrypted to secure ensure that all security holes are no longer open.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protecting this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers’ loan applications and other personal data files are a must protect! These are open-sources too, so basically all of these server requirements are open source, no surprise. But protecting all these will require a lot of attention especially the SMTP, file server for customers’ and the database server.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    HP open view is a network and systems management monitoring tools. Also has a bundle of applications that perform a big range of services for a big network. It is mainly used for monitoring servers, devices, networks, databases & applications to make sure that faults are detected and alerted upon in a reasonable time. To control the situation when monitoring to make sure alerts is received before a fault happens. This give you time to fix a problem before it grows into a bigger problem and affects the business.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Compiere and Open Source Erp

    • 2917 Words
    • 12 Pages

    In today's business world, all the companies are looking for new software to do business. They want new software to help them save money and at the same time, work more efficient than before. During the 1990's, Gartner Group employed the first definition of ERP. The ERP system growing rapidly during the year 1990 to 2000 since the countries all around the world are working closer and closer and the global business environment changed a lot. Companies start to notice that they are dealing with a whole new world and they need some really powerful tools to help them finished tasks. Therefore, ERP system itself also changed a lot and starts getting better and better. Then we have open source ERP. I think open source ERP changed the ERP market even though there are lots of people think open source ERP is an dead end. During my research and the presentation of the classmates, I find out that open source is a really important breakthrough for the whole IT industry. I will explain my reason in detail later in my paper. There are some major open source ERP brands on the market like, compiere, OpenERP, ERP5 etc. These are also really popular vendor in the market.…

    • 2917 Words
    • 12 Pages
    Powerful Essays