Projects
  1. Home
  2. Projects

Manufacturing Efficiency & Security Through Technology | Case Study

Case Study Overview

Client: Manufacturing Company

Industry: Manufacturing

Locations: 4 Locations throughout the Midwest

Objectives

  • Money: Save the customer thousands of dollars per month.
  • Cyber Security: Provide better cyber security solutions to ensure business continuity.
  • Support: Provide better support than the previous IT provider.
  • Efficiency: Reduce downtime by replacing aging and failing hardware. Use technology to automate and improve the customer's business processes.
  • Communication: Improve the customer's ability to communicate internally and externally with their customer's.

The Problem

The manufacturing company faced several critical IT issues:

  • Servers: Outdated software, unlicensed software, using old antivirus software, no Endpoint Detection and Response (EDR), no encryption, and overall lack of security.
  • Networks: Outdated firewalls, switches in walls, default credentials, mismatched hardware, and weekly outages.
  • Computers: Old, outdated, not being maintained, no EDR, no encryption.
  • Staff: Untrained, unaware of cyber security risks, no dark web monitoring.
  • Cloud Applications: No Multi-Factor Authentication (MFA), low security configuration.
  • vCIO/IT Leadership: No regular C-level or director-level IT meetings.
  • Internet & Phones: Phones go down if the main location loses network or internet, costing over $4000/month.

The Solution

To address these issues, a comprehensive IT overhaul was implemented by Grand Rapids Tech:

  • Servers: Fully updated all server software, ensured all software is licensed, installed and properly configured EDR, locked down and secured servers.
  • Networks: Deployed new, modern, single-pane hardware, installed new cabling, implemented MFA and backup internet, ensured no outages and highly secure network.
  • Computers: Scanned hardware and implemented FIFO/EOL policy, replaced computers as needed, configured EDR and encryption on all devices, ensured all computers are secure.
  • Staff Training: Conducted annual and weekly cybersecurity trainings, implemented phishing simulations, set up 24/7/365 dark web monitoring.
  • Cloud Applications: Configured MFA, enhanced security settings, achieved dramatic improvement in security.
  • vCIO/IT Leadership: Scheduled monthly to quarterly vCIO meetings.
  • Internet & Phones: Moved phones to the cloud at all locations, ensuring zero downtime, upgraded internet to fiber with backup at all locations, reduced costs to under $2000/month.

Results

The comprehensive IT overhaul resulted in significant improvements:

  • Enhanced Security: The organization now has a secure IT environment with up-to-date software, EDR, encryption, and a robust firewall.
  • Improved Network: A professional-grade network infrastructure ensures reliable and secure connectivity.
  • Modernized Devices: New, high-performance computers with regular maintenance schedules.
  • Trained Staff: Employees are now aware of cybersecurity risks and the organization has dark web monitoring in place.
  • Secure Cloud Applications: Transition to secure cloud applications with MFA.
  • Effective IT Leadership: Regular IT meetings and a dedicated vCIO ensure strategic oversight.
  • Reliable Internet and Phones: A cost-effective and reliable internet and phone solution ensures business continuity.

Customer Feedback

“Awesome team and service! We recently switched to Grand Rapids Tech and couldn’t be happier. Thank you Justin, Dave, Jack and the team!”

This is the topology of a network.
This is the topology of a network.
Manufacturing Network Location 2