Our Procore + Xero Integration ensures that data flows automatically between each system, without the need for manual data. At the foundation, the integration syncs Vendors, Projects, Cost Codes, Commitments, Requisitions, Check Payments, Direct Invoices and Journal Entries.
Sentinel Hydrosolutions had a web application to act as an interface to their leak detection devices. The application was having issues due to the vendor selecting a third party software vendor that facilitated direct communication with the devices taking a different approach. The new approach meant that the system could no longer directly communicate with the IoT devices. There were also some data collection strategies that were not in sync. Sentinel Hydrosolutions desired historical data for the IoT device users but had no means to host the API or Application.
To resolve this, Calance built an API and web application. The API serves as the gateway for the IoT devices. The IoT devices communicate with the API at regular intervals uploading data. The web application is a responsive design application that allows the user to complete several operations related to the IoT devices such as:
1. Register device(s) / create an account
2. View current device data for each device registered
3. Receive email or optional SMS messages in the event a leak is reported by a device
4. Send commands to a device
a. Clear Alarm
b. Change certain device parameters
c. Shut water off remotely
The API receives over 600K uploads a day, the number is expected to increase as more devices come online. The client was behind schedule in release of the web application due to issues with prior vendors.
To implement this, Calance met with Sentinel Hydrosolutions several times on location to understand their vision for the application. Then, the user interface was prototyped early in the design phase for feedback and to drive the visual design. Sentinel's head of engineering made sure that the design of the API matched the present and planned future functionality. The web application was built using Rapid Application Development (RAD); which allowed Sentinel to test working variations of the application over the course of its development. Using this approach, Sentinel was able to use parts of the application and provide feedback that was quickly incorporated into the ongoing development and minimize the chance of failure due to varying visions between development team and client on implementation of specifications.
The web application was written using MVC.Net, AngularJS and Bootstrap and the API as an MVC.Net API Project. For hosting, Calance assisted the client in setting up AWS EC2 instances while maintaining and monitor the systems.
Sentinel was able to get the application to release in very short time reducing the further delay. They currently use the system today and expanding upon it.
This is not the first project that we have picked up after another vendor has ‘dropped the ball’. Integral to Calance’s strength is our ability to analyze a client’s needs both immediate and future. This analysis goes beyond acquiring specs from the client, rather engages the client with discussion on the intended use, rebuttal if a particular intention/desire seem unnecessary or detrimental and building upon ideas that are vague. Calance’s provides all clients with the utmost attention despite differences in size or financial capacity. Calance strives to deliver the best product for a client’s need.
Law firms possess vast quantities of highly sensitive information that puts them at the top of hackers’ hit lists. Everything from trade secrets, to personally identifiable information, to private information that can be used for extortion are considered high-value material on the dark web.
You’ve heard the old adage, “Any PR is good PR.” Well, just ask Equifax if that’s true. Its recent breach affected some143 million Americans. But it’s hardly the first time personally identifiable information (PII) was stolen through a financial-related entity–and it won’t be the last
Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit.
Cyberattackers have been “aggressively targeting”law firms since 2016. In fact, in a survey of more than 200 law firms,every single respondentreported being targeted in 2016-2017 by criminal hackers. What’s more, the report also found that 40 percent of respondents were unwittingly infiltrated.
Unfortunately, many law firms develop a false sense of security due to a lack of visibility and awareness into InfoSec operations. This also means that yesteryear’s knee-jerk reactions to feeling threatened–continually adding the latest “state-of-the-art” tools–doesn’t work because it fails to address the problem at its source. Law firms don’t need to bolster perimeter defenses; they need to budget their investments in cybersecurity wisely, and holistically improve their security postures through better threat detection and response.
Debunking the ‘Prevention-First’ Myth
In a perfect world, law firms would focus solely on attack prevention, completely eliminating the need for mitigation. But global numbers tell a very different story. Every year, cybersecurity spend increases. This year, Gartner estimates worldwide security spendingto reach $93 billion, and a staggering $1 trillion by 2021. It raises the question: If cybersecurity spend is increasing at such an incredible pace, then why does the number of confirmed attacks–and associated damages–also rise every year?
Clearly there’s disconnect between what businesses spend and what they get in return. Case in point, ransomware raked inan estimated $1 billion in 2016, an unprecedented amount at the time. But fast-forward to the conclusion of 2017, and that value soars to almost $5 billion. That’s a five-fold annual increase.
The problem isn’t necessarily that preventative security has no place in security, but rather, the manner in which organizations, law firms included, are over-investing in these resources. Faced with a daunting shortage of cybersecurity expertise for hire, they’re being pressured to invest in the “latest and greatest” security solutions, which falsely promise to alleviate the need for active security expertise.
This thinking is especially dangerous for law firms, which are frequently the target of advanced persistent threats, zero-day attacks and other furtive intrusion tactics that infiltrate the network and extract sensitive materials. In many cases, it can take six months to a year to detect these stealthy intrusions.
Simply put, no amount of investment in new perimeter defenses, next-generation firewalls or plug-and-play intrusion detection systems will solve these problems. It takes a fully-staffed security operations center (SOC) with advanced threat detection and response capabilities to do so.
A New Market Dynamic: On-Demand Security Expertise
“Threat detection and response are no longer prohibitive costs for law firms.”
Cyberthreat detection requires a 24/7/365 effort, something most law firms don’t have the means to support. According to the American Bar Association, the costs of implementing and managing a cybersecurity program in a law firm can be overwhelmingly prohibitive. Security investment and oversight is typically relegated to one or two people who may already be responsible for a number of other IT-related tasks. Any tool or solution that promises to help, therefore, seems like a godsend–even if, in reality, it doesn’t make sense financially.
Enter SOC-as-a-service, a fully-staffed SOC that provides real-time threat detection, proactive threat hunting and incident response at a fraction of the cost to manage an in-house SOC. SOC-as-a-service enables law firms to benefit from detection and response capabilities they need to identify even the most difficult-to-detect cyberthreats. Included is 24/7 access to on-demand security experts, who continuously monitor network traffic and react immediately to indicators of compromise.
In addition to managed detection and response (MDR) services, SOC-as-a-service also provides ongoing vulnerability scans to help law firms make more effective security purchasing decisions. This also helps firms shed deadweight tools that don’t actively enhance security posture.
A Sound Investment with Demonstrable Results
Today’s law firms need a predictably-priced, cost-efficient cybersecurity service that’s truly effective to protect their sensitive data. And with SOC-as-a-service, that’s exactly what they get. Don’t waste another dollar on cybersecurity that doesn’t make sense.
Global Vendor Insurance: This links Vendor-level insurance in Sage with Global Company Insurance in Procore, and it can send information in either direction. If you are new to Procore, we can send all of your insurance information from Sage into Procore. Once those are in sync, you can then choose to send information from Procore back into Sage.
Project Insurance: If you create insurance at the project level in Procore, the integration will find all commitments in Sage to that same Vendor and Project, and update the commitment insurance to match Procore.
The integration can optionally send warnings about insurance that is about to expire or which has already expired. You can choose how far ahead to warn as well. Perhaps you need to know two weeks ahead of time, or perhaps a month ahead of time. The choice is up to you.
With your Procore + Sage Insurance Integration you can:
Remove the need to manually enter duplicate insurance information
Ensure that you are compliant in Sage
Increase flexibility and scalability
Set insurance expiration alerts
Calance began working with Sage in 2003, when Primavera announced that they were discontinuing support for their own Primavera-Timberline integration tool. As Primavera integrators, we took on the mantle of integrating Primavera with Sage for Primavera customers and many others. Since then, we have integrated with the different versions of Sage up to the current one. We tie jobs, vendors, commitments and changes, as well as owner contracts and changes, payment holds, and insurance.
Calance is an IT Services firm, providing Application Development & Support, IT Infrastructure Managed Services, pre-defined/pre-built Solutions, and IT Staffing. Operating in the United States and India, we help our clients bring their ideas and strategies to life through talent, technology and tenacity.