Blog Layout

SHAW Advances to ServiceNow Premier Partnership

Aug 06, 2020

This is a subtitle for your new post

SHAW Data Security has advanced its relationship with ServiceNow to the level of Premier Partner, which authorizes access to greater benefits and resources to better serve our customers’ business and mission needs.

The ServiceNow partnership has enabled SHAW to provide customers with cloud-based advanced automation and process workflow capabilities in a single platform. Service relationships are optimized not only within IT, but also across the enterprise.

“We have quickly earned the reputation of being problem solvers, redefining poor implementations, helping our clients build strong, realistic, long-term strategies to adopt the ServiceNow platform. We are excited about the new Premier Partnership Level which brings our certified and experienced team new opportunities to serve customers," said Brian Bailey, co-founder of SHAW.

SHAW Data Security is a Boston-based ServiceNow Premier partner specializing in automating Cyber Governance, Risk Management, and Compliance (GRC) and Security Operations (SecOps) programs with ServiceNow workflows.
By Peg Bailey 12 Jul, 2024
There are many consultants who would be happy to sell you GRC, but are inexperienced in the implementation of it. They will charge you more to factor in the unknown to “figure it out” as they go. A partner who is qualified with a ServiceNow GRC Product Line Achievement will guarantee competency, efficiency, and experience. Don’t hire someone who “dabbles,” work with someone who does this for a living. At SHAW Data Security, GRC and SecOps implementations are our specialty, and we know the best ways to integrate ITSM, CMDB and ITOM into the process as well. We advise and guide our customers through an efficient GRC implementation, customizing to their specific needs in the most efficient way. SHAW Data Security is a Boston-based ServiceNow Premier partner, one of only 10 partners in the world with the GRC Product Line Achievement. We help customers modernize, optimize, and automate digital workflows.
23 Mar, 2021
Here are 3 key areas to consider when looking at your current compliance posture. 1. Figure out where you are. Compare against standards like NIST CSF or CIS top 20 self-assessment . Better yet, get help from a third party who does this all the time and can help you understand how you stack up against other companies. 2. Be objective about your maturity in the context of meeting the standards. If you currently have manual processes, how are you going to scale? Are you able to get other departments to participate? What are your priorities and how will you make progress over time? 3. Evaluate systems you have in place now in the context of scale and staying up with standards. This is not the time to incur technical debt by purchasing something that is going to limit you from getting to your ultimate goal – taking the labor out of the process through automation. Look at platforms like ServiceNow that have the tools to modernize, optimize, and automate your processes all the way. SHAW Data Security is a US-based ServiceNow Premier partner, specializing in Security Operations and Governance Risk and Compliance (GRC). SHAW provides experience and expertise in bringing functional, standards-based Information Security and IT compliance programs to companies to execute their missions.
10 Nov, 2020
An important first step in establishing a security program is recognizing the need for one. You want to get started and continue to progress in maturity over time. A good Information Security program governs the company’s security practices, information technology, application development, privacy, and compliance. So how do you establish a baseline information security program and address urgent security concerns? Consider the following: Virtual CISO ( vCISO ). If your company doesn’t have the resources for a full-time CISO, a vCISO provides expert security guidance in as little as 5- 10 hours per month. Having a regularly scheduled dialogue will help you put your program in context. The vCISO helps interpret Penetration Testing results as well as to oversee information security program development, risk treatments, and remediations. Penetration Testing provides a baseline to understand your application’s ability to defend against attacks threatening the confidentiality, integrity, and availability of information. The testing is done using a “do no harm” approach and is based on standard Web Application Testing methodologies. Continuous Security Monitoring is a threat intelligence approach that automates the monitoring of information security controls, vulnerabilities, and other cyber threats. Using a tool like NormShield , you’ll be able to see what outside entities see when they evaluate your security program. We recommend these steps for a basic foundation for a security program. It doesn’t have to be a lot of labor, just get it going and keep moving forward. SHAW Data Security provides experience and expertise in bringing functional, standards-based Information Security and IT compliance programs to companies to preserve their ability to execute their missions.
05 Nov, 2020
Addressing regulatory requirements is not a technical problem, it’s a resource problem. You have to provide auditors proof that you are following the rules. Tracking people down to collect and approve the evidence is a huge amount of work, as well as a waste of your time and theirs. With ServiceNow Governance Risk and Compliance (GRC), the collection of compliance evidence is done by assigning tasks to appropriate departments and people. There is no need to chase down answers because automatic reminders are sent until a task is attested. You can see, review, and approve up-to-the-minute compliance status on a dashboard. Even better than that, ServiceNow can automate the whole process. How does that work? Many frameworks have control requirements for backups. Instead of asking your IT manager for screen shots to prove that a backup program is in place, ServiceNow monitors for backup process initiation and collects that information for you. If the backup program is not running, it can alert you that the control is not compliant. Your IT manager will be happy that they don’t have to answer a multitude of emails, and the auditor will be happy with non-repudiated evidence. Using ServiceNow, SHAW Data Security helps companies transform inefficient manual processes into labor-saving and scalable integrated risk programs. SHAW Data Security is a US-based ServiceNow Premier partner, one of only 10 partners in the world with the Governance Risk and Compliance (GRC) Product Line Achievement. We help customers modernize, optimize, and automate digital workflows.
20 Oct, 2020
Are you curious where you stand against a standard like CIS 20 or NIST CSF ? Maybe you are not feeling the pressure of audits or regulations right now, but you want to know where you stack up for things like data recovery, identity and access management, or incident response. You might have already started accumulating information from different departments and key players to see where you are. Does a spreadsheet seem like the easiest way to start? Sure. Will it help you in the long run? Definitely not. Starting out with spreadsheets is going to lead to an enormous duplication of effort. What happens when you add more employees in different locations? What about acquiring another company that is subject to different jurisdictions? As your systems grow, it’s going to require more and more resources to keep track of information, to the point that keeping track becomes your full-time job. Begin as you mean to go on and set yourself up for success with ServiceNow. It is the quickest way to get organized, roll out compliance, and be ready to scale for whatever complexities are coming your way. SHAW Data Security has worked with companies to get started with information security programs. We will help you figure out the best processes that fit your company with the least amount of pain and then custom-fit the implementation to your resources and regulatory requirements. SHAW Data Security is a US-based ServiceNow Premier partner, one of only 10 partners in the world with the Governance Risk and Compliance (GRC) Product Line Achievement. We help customers modernize, optimize, and automate digital workflows.
By Peg Bailey 02 Oct, 2020
Losing a multi-million dollar opportunity is painful, but it will help your company’s stakeholders understand the necessity of compliance. Now that you know that you are subject to regulation, how are you going to start? If you are a mid-sized company, you may not have the resources for a fully-staffed compliance department - but you still have to meet several hundred requirements. Before you buy a Governance Risk and Compliance (GRC) solution, it’s important to put your processes in place. Which framework will you choose? NIST-CSF? SOC2? Then which controls are you going to start with? Password policy, encryption, or something else? Will it be practical to take productive time away from your subject matter experts to answer hundreds of questions over and over again? It’s important to get the right kind of help with GRC implementation - someone who knows how to engineer processes and workflows and then automate them. Plenty of consultants would be happy to sell you a GRC solution, but they would be missing a huge step - putting your processes in place first. SHAW Data Security has worked with companies who are at square one in implementing GRC. We will help you figure out the best processes that fit your company with the least amount of pain and then custom fit the GRC implementation to your resources and regulatory requirements. SHAW Data Security is a US-based ServiceNow Premier partner, one of only 10 partners in the world with the GRC Product Line Achievement. We help customers modernize, optimize, and automate digital workflows.
By Peg Bailey 22 Sep, 2020
In the previous blog, we wrote about the benefits of professional help. Rather than spending time and money to learn how to work a one-time software implementation, we recommend you: Estimate the amount of time it is going to take you, your staff, and other departmental users to complete the project. Measure it in hours of analyzing, figuring out the one-time installation, identifying and planning with known best practices, and implementing the nuances of software package that is new to you. It’s likely that an experienced team can save you 30-50% of the time while doing it correctly. We suggest that the value of the saved time can be used to calculate how much you should consider spending to do it right the first time. If you get an exorbitant quote for services from a qualified ServiceNow partner, ask them if it is possible to have smaller or partial engagements. Also, check that the partner is qualified or even has a GRC Product Line achievement, since inexperienced partners or consultants often charge more to factor in the unknown. Implementing is not operating, but implementation skills are very expensive to acquire and make no sense for someone who plans to implement only once. You can operate the system just as efficiently whether you have a qualified experience partner help or if you implement it yourself. Shaw Data Security is a Premier ServiceNow partner, one of only 10 partners in the world has the GRC Product Line Achievement. We help companies transform inefficient manual processes into labor-saving and scalable integrated risk programs. Learn more here about why having an expert in your corner makes all the difference.
By Peg Bailey 15 Sep, 2020
I have seen multiple posts on the ServiceNow GRC community website by employees of companies who want to automate their GRC workflows with ServiceNow and are asking for “how-to” documents. Does this sound daunting? Yes, and it should. It’s not an easy process. To “do-it-yourself,” these companies do the following time- and labor- intensive steps: Analyze and define their own objectives, priorities, and goals to drive a successful end-state with ServiceNow Take the time to learn the ServiceNow GRC platform themselves through reading documentation and community boards, completing multiple training courses, and experimenting with the software themselves Create a plan for meeting their needs both now and in the future with the single-use knowledge gained Implement their plan successfully the first time and roll it out to production or, if the plan was not successfully implemented, spend more time and resources on fixing the issue. Our customers have realized that having an experienced partner assisting with these steps is far more efficient and less risky than attempting to figure out and implement the workflows by themselves. In fact, reading the manual is a waste of your time. Click here to learn why. Don’t try to figure out how to hit a golf ball by watching YouTube videos - let us give you a professional golf lesson. Shaw Data Security is a Premier ServiceNow partner that helps companies transform inefficient manual processes into labor-saving and scalable integrated risk programs.
06 Aug, 2020
SHAW Data Security has advanced its relationship with ServiceNow to the level of Premier Partner, which authorizes access to greater benefits and resources to better serve our customers’ business and mission needs. The ServiceNow partnership has enabled SHAW to provide customers with cloud-based advanced automation and process workflow capabilities in a single platform. Service relationships are optimized not only within IT, but also across the enterprise. “We have quickly earned the reputation of being problem solvers, redefining poor implementations, helping our clients build strong, realistic, long-term strategies to adopt the ServiceNow platform. We are excited about the new Premier Partnership Level which brings our certified and experienced team new opportunities to serve customers," said Brian Bailey, co-founder of SHAW. SHAW Data Security is a Boston-based ServiceNow Premier partner specializing in automating Cyber Governance, Risk Management, and Compliance (GRC) and Security Operations (SecOps) programs with ServiceNow workflows.
23 Jun, 2020
Here’s why a single solution ServiceNow “ship” is the best solution for your company: Your business processes are interdependent. Security and Compliance are both dependent on IT operations. If they each have their own system, more things can break and it’s harder to maintain. It’s not an efficient use of resources. Buying point solutions may seem like a good fit for now. But business units with their own solutions tend to go in their own directions. You will eventually outgrow the solutions, and it’s going to be expensive and difficult to link them together at a higher level. Single solution software may look like the inexpensive choice. Unfortunately, other costs are going to catch up with you – including resources wasted with duplication of effort. More communication and oversight are needed to get information from the separate solutions and correlate them. There’s no need to maintain hundreds of “kayaks.” With ServiceNow, your modern SAAS “ship” is ready to get all your business processes on board. Buy it once and buy it right- it will scale with your company as it grows. ServiceNow will modernize your business processes, automate them, and give you the visibility to optimize them with reporting and performance analytics.
More Posts
Share by: