[Case Study] Cambridge Biotech

Technium was brought in as the managed network and operations partner to get this growing biotech a proven, systematic approach to security.

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

[Case Study] Cambridge Biotech

An early-stage biotech company in Cambridge, MA was planning for growth and preparing for a move to a new location. The transition allowed them to stop and think about their security posture and how it could be improved.

The IT Director on staff was managing too much: network configuration and maintenance, investigations, and handling of all issues and symptoms. He was left to solve and manage at every level. 

When searching for a security partner, the goals were to not only take some of the weight off of the IT Director but also to:

  • Proactively maintain network equipment
  • Ensure proper security configuration of the network
  • Actively monitor for signs of a security incident
  • Put an incident response plan in place

Once the Technium team got a thorough understanding of their security posture and goals, we were able to guide them through obtaining the correct equipment for their next phase and future growth. We then collaborated to put a proven, systematic approach in place to manage security and improve it over time. Now, the Cambridge Biotech and Technium meet regularly to review reporting and discuss actionable items to keep security well maintained and relevant to how the biotech is operating.

Results of the Partnership

PROTECT 

  • Maintain all network equipment, actively monitor for vulnerabilities and perform patch/upgrade as required
  • Configure firewall and all network hardware based on best practices

DETECT

  • Monitor internal network, endpoints, AWS, and Office365 for abnormalities
  • Set up rules and exceptions are set up to avoid false positives

RESPOND

  • Alerts are managed and remediated 
  • Emergency access via cellular out-of-band device in case external network access is down

“Working with your team has given me the trust to step back and focus on other things knowing that you've got me covered. That's pretty hard to come by and super valuable. Greatly appreciated.”

Jarrod M., IT Director

Systems vs. Software

Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.

Read More »

Choosing the Right MSP

To understand how your Managed Services Provider (MSP) stacks up from a security standpoint, here are some levels, observations, and questions to identify what you may currently have.

Read More »

DIY Security: Know When to Call in Experts

Deciding between keeping IT security tasks in-house or relying on a partner with specialized expertise, can be compared to managing home improvement projects. There are many things you can try to repair using the Do-It-Yourself approach. If everything goes just right, you might save yourself some money, and hopefully, you’ve got time left over to relax. But what if everything goes wrong?

Read More »

Systems vs. Software

Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.

Read More »

Choosing the Right MSP

To understand how your Managed Services Provider (MSP) stacks up from a security standpoint, here are some levels, observations, and questions to identify what you may currently have.

Read More »

DIY Security: Know When to Call in Experts

Deciding between keeping IT security tasks in-house or relying on a partner with specialized expertise, can be compared to managing home improvement projects. There are many things you can try to repair using the Do-It-Yourself approach. If everything goes just right, you might save yourself some money, and hopefully, you’ve got time left over to relax. But what if everything goes wrong?

Read More »