Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Second SaaS Is the Charm for Dairy Queen Franchisee

Initial security as a service solution crashed PCs at DQ, so franchisee found another SaaS

Disaster was not what Roundtable Corp., a Dairy Queen franchisee, was expecting when it first deployed a security software-as-a-service (SaaS) solution, but that's what it got: The service kept knocking its PCs offline. So Roundtable had to nix its SaaS service less than a week after deploying it.

Roundtable had chosen the SaaS route after having trouble with employees turning off security software on the store PCs and visiting unauthorized Websites, which led to infected PCs and productivity drain. The independently owned franchisee has been growing rapidly, from 12 stores in 2003 to its current 46 stores and over 1,000 employees. As the company spread out from its Lubbock, Texas, headquarters across the state and into New Mexico and Oklahoma, seemingly minor security inconveniences turned into major productivity drains.

“Antivirus software is only so effective,” says Mike Stump, director of information technology at Roundtable. “Employees could go to unauthorized Websites and find ways to turn off the security software, so viruses and other types of malware found their way onto our computers.”

IT technicians were driving out to the stores about once a week to clean up diseased machines, and because of the distance involved, some trips required overnight stays. Employee productivity also dipped. Workers spent a lot of time (in some cases, multiple hours each day) surfing the Web and downloading MP3 files rather than focusing on their jobs. Consequently, the company needed to find a way to limit where employees could go on the Internet.

A couple of PCs are stationed at each Dairy Queen. “We have a PoS system and have also written a few other applications to collect HR data, such as employees clocking in and out,” he says. The applications transmit their data back to Microsoft Windows servers sitting in the company’s data center in Lubbock via the Internet.

In early 2006, Roundtable began searching for a Web filtering tool. The company did not want to install the software on its PCs, and preferred a SaaS solution. “We looked at a few off-the-shelf products, but they would have required too much ongoing maintenance,” Stump says. And the number of inappropriate sites grows daily, so Roundtable would have had to continually update its banned sites list.

SaaS was also attractive because it typically works in tandem with local routers. Roundtable had installed various inexpensive SOHO routers at its locations and found that the hardware was not totally reliable. If problems arose, technicians would have to be dispatched to the sites to reconfigure these devices.

The SaaS software seemed to run fine in its initial testing, so the company rolled it out to its stores. But then the trouble began. “In about three days, all of our PCs were dead,” Stump says. Problems arose due to how the unnamed SaaS company edited Windows files. The problem started small and was cumulative, eventually crashing each PC.

The company went back to the drawing board and did a Google search to see what other SaaS offerings were available, and found ScanSafe’s ScanSafe Web Malware Scanning. “The cost was reasonable: about $3 to $4 per month for each PC,” Stump says. “That was much less than we were paying to fix our PCs.”

Roundtable tested the ScanSafe SaaS on a few PCs in the IT department for a few weeks first. With the service working well, the ice cream franchisee wrote a script so its computers automatically go to the ScanSafe site before accessing the Internet. Getting all of the computers onto the service took about a week. Now whenever users access the Internet, their PCs are locked down and allowed to access only the company’s servers.

Consequently, Roundtable's malware and MP3 downloading problems have disappeared as well. “We learned a few lessons the hard way, but going with a SaaS solution was the best option for us,” Stump says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • ScanSafe

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 10/23/2020
    Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
    Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
    David Pearson, Principal Threat Researcher,  10/21/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-27187
    PUBLISHED: 2020-10-26
    An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related command...
    CVE-2020-7752
    PUBLISHED: 2020-10-26
    This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
    CVE-2020-7127
    PUBLISHED: 2020-10-26
    A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
    CVE-2020-7196
    PUBLISHED: 2020-10-26
    The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the ur...
    CVE-2020-7197
    PUBLISHED: 2020-10-26
    SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) 3.7.0.0 is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software 3.7.0.0* U...