Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Second SaaS Is the Charm for Dairy Queen Franchisee

Initial security as a service solution crashed PCs at DQ, so franchisee found another SaaS

Disaster was not what Roundtable Corp., a Dairy Queen franchisee, was expecting when it first deployed a security software-as-a-service (SaaS) solution, but that's what it got: The service kept knocking its PCs offline. So Roundtable had to nix its SaaS service less than a week after deploying it.

Roundtable had chosen the SaaS route after having trouble with employees turning off security software on the store PCs and visiting unauthorized Websites, which led to infected PCs and productivity drain. The independently owned franchisee has been growing rapidly, from 12 stores in 2003 to its current 46 stores and over 1,000 employees. As the company spread out from its Lubbock, Texas, headquarters across the state and into New Mexico and Oklahoma, seemingly minor security inconveniences turned into major productivity drains.

“Antivirus software is only so effective,” says Mike Stump, director of information technology at Roundtable. “Employees could go to unauthorized Websites and find ways to turn off the security software, so viruses and other types of malware found their way onto our computers.”

IT technicians were driving out to the stores about once a week to clean up diseased machines, and because of the distance involved, some trips required overnight stays. Employee productivity also dipped. Workers spent a lot of time (in some cases, multiple hours each day) surfing the Web and downloading MP3 files rather than focusing on their jobs. Consequently, the company needed to find a way to limit where employees could go on the Internet.

A couple of PCs are stationed at each Dairy Queen. “We have a PoS system and have also written a few other applications to collect HR data, such as employees clocking in and out,” he says. The applications transmit their data back to Microsoft Windows servers sitting in the company’s data center in Lubbock via the Internet.

In early 2006, Roundtable began searching for a Web filtering tool. The company did not want to install the software on its PCs, and preferred a SaaS solution. “We looked at a few off-the-shelf products, but they would have required too much ongoing maintenance,” Stump says. And the number of inappropriate sites grows daily, so Roundtable would have had to continually update its banned sites list.

SaaS was also attractive because it typically works in tandem with local routers. Roundtable had installed various inexpensive SOHO routers at its locations and found that the hardware was not totally reliable. If problems arose, technicians would have to be dispatched to the sites to reconfigure these devices.

The SaaS software seemed to run fine in its initial testing, so the company rolled it out to its stores. But then the trouble began. “In about three days, all of our PCs were dead,” Stump says. Problems arose due to how the unnamed SaaS company edited Windows files. The problem started small and was cumulative, eventually crashing each PC.

The company went back to the drawing board and did a Google search to see what other SaaS offerings were available, and found ScanSafe’s ScanSafe Web Malware Scanning. “The cost was reasonable: about $3 to $4 per month for each PC,” Stump says. “That was much less than we were paying to fix our PCs.”

Roundtable tested the ScanSafe SaaS on a few PCs in the IT department for a few weeks first. With the service working well, the ice cream franchisee wrote a script so its computers automatically go to the ScanSafe site before accessing the Internet. Getting all of the computers onto the service took about a week. Now whenever users access the Internet, their PCs are locked down and allowed to access only the company’s servers.

Consequently, Roundtable's malware and MP3 downloading problems have disappeared as well. “We learned a few lessons the hard way, but going with a SaaS solution was the best option for us,” Stump says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • ScanSafe

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Commentary
    How SolarWinds Busted Up Our Assumptions About Code Signing
    Dr. Jethro Beekman, Technical Director,  3/3/2021
    News
    'ObliqueRAT' Now Hides Behind Images on Compromised Websites
    Jai Vijayan, Contributing Writer,  3/2/2021
    News
    Attackers Turn Struggling Software Projects Into Trojan Horses
    Robert Lemos, Contributing Writer,  2/26/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-18629
    PUBLISHED: 2021-03-04
    Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a com...
    CVE-2019-18628
    PUBLISHED: 2021-03-04
    Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow a user with administrative privileges to turn off data encryption on the device, thus leaving it open to potential cryptographic information dis...
    CVE-2021-21331
    PUBLISHED: 2021-03-03
    The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive info...
    CVE-2021-27940
    PUBLISHED: 2021-03-03
    resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
    CVE-2021-21312
    PUBLISHED: 2021-03-03
    GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/documen...