Phoenix IT Group Case Study

Superior Essays
1 .Phoenix overview
Phoenix It Group is one of the UK’s leading providers of hosting, Cloud, managed IT services and business continuity. The company has been established in 1979 as Phoenix Computers Limited as a designer and manufacturer of computer hardware and through a number of acquisition broadened the scope of services to end us at the point where it is at the moment in 2012 after merge with ICM.
The business is split into three business units – Business Continuity, Managed Services and Partner. Each of the units focuses on its market segment, Business Continuity and Managed Services address it services directly to end user, where partner BU operates through system integrators such as BT, IBM, HP, Atos delivering large scale project
…show more content…
Risk and challenges associated with data security
Pheonix’s flagship service delivered through Partner BU to the end users includes desk-side support and break/ fix assistance. These service requires engineers to be located at the client side or in remote locations and respond to end user IT issues. These can range in the scope but in general include software & hardware support and act as a response to the issue raised through the call centre.
As a result of delivering this type of service, Phoenix is constantly accessing customers’ data and also faces challenges that were described in the previous section. There are a number of risks are associated with this type of service some of which are listed below:
 Data leak as a result of Phoenix employee interference with customer data
 System breakdown as a result of engineer interference
 Data loss when not handled in a right manner
 Data misuse and breach of confidentiality agreements
 Unforeseen environmental issue can cause data security breach
 When servicing devices or applications that may be out of date, this brings a risk of data security or simply being unable to fix the problem without dealing with data security
…show more content…
 Outsourcing opportunities – Phoenix constantly look for ways to engage with SME’s through outsourcing various parts of not core business that helps to achieve cost saving and improve effectiveness. The business CEO, Steve Vaughan is very keep to listen to employees suggestions in this area
These initiatives puts Phoenix at the forefront of the competition when cooperating with partners who require a company to deliver the last part of customer project in the best possible manner and at the same time will meet the government initiatives to support and promote local

Related Documents

  • Improved Essays

    Wgu Est1 Task 2

    • 787 Words
    • 4 Pages

    As a consulting company, our expertise is engaged in delivering preplanned programs to meet the needs of our clients. Some of the services we offer as a company are: win and win solutions, end to end solutions. I will use our company knowledge to help our clients grow. Your company will have the opportunity to gain benefits in many ways. Our industry is focused on providing your company a better understanding of changes that must occur within the company.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    firewalls need to be upgraded quite often, since hackers will find out new ways to get through security barriers. Privacy issues are also another acute issue when dealing with company data, and it does not just pertain to information of patients, it can also include information of its employees. Misuse of company data by its employees can also become a type of breach of data. no matter what ype of data breach is involved with a company's data it is the ethical and legal responsibility of each company to implement a sound deterent by either having the best anti breach threat from a particular software or IT support to keep risks to a minimum. Once data is secure it can be such an essential part of a healthcare organization to have all data in one location so that it can make both financial and staffing decisions, and most importantly patient data that allows for the decisions of accurate patient care.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Is3350 Unit 1

    • 190 Words
    • 1 Pages

    1. Critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a general understanding, and distinguish user requests from the underlying true needs using tools such as Entity relationship diagram, Flow charts, workflow modelling. 2. Investigate and analyze business processes, organization & services. 3.…

    • 190 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    A Strategic Analysis of Five9 BUS 477N-112 Fall 2014 Five9 is an innovator and leading supplier of cloud contact center software. The company’s highly accessible and secure Virtual Contact Center (VCC) cloud platform delivers an inclusive set of easy-to-use applications that enables both simultaneous management and the augmentation of consumer interaction across email, social media, web, voice, and mobile channels through application programming. This strategic analysis was produced with the purpose of thoroughly exploring the cloud contact center as an industry, classifying and analyzing both external and internal opportunities and threats, and establishing where the company stands in relation to their key competitors.…

    • 830 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    CIO Large health care organizations are in need of a CIO (chief information officer) to help to stay up to date on latest updates and making sure that everything is working properly. In the current organization of my employment I know we have one because it is a large facility and everything is done through electronic systems. CIO makes sure that IT support is performing their duties are they are assigned to and provide much needed help.…

    • 204 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Unit 9 P1

    • 1364 Words
    • 6 Pages

    Introduction In this report I will be talking about why organisations need to update their IT systems and their hardware and software, how did organisation responded to Information technology coming into a business, did any of the IT systems made any impact to the business . Also I will be analysing the way the business managed their risks from having IT systems and the recent development of IT systems coming into business. At the final section of the report I will be giving my ideas on how to make a good interactive website and interesting features and modern development added into the website.…

    • 1364 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    INFO498 Final Case Studies Name:_Chris Harlan____ Instructions: Your essays will be graded on content to include grammar and spelling. Each case should take 1-2 pages including diagrams. The essay answers for both #2 and #3 should be 500 to 700 words each, in order to completely answer the questions. Please submit as one document.…

    • 1517 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Introduction International Business Machine (IBM) Corporation is one of the world’s largest multinational computer technology and IT consulting corporation. In 2011 it celebrated 100 years in age and $100 billion in sales. Interbrand rated IBM as the fourth value brand of the 2013 (2013 Best Global Brands, 2014). The company is proud of its contribution to the “ideas that shaped a century” (IBM, 2014).…

    • 1659 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Business Continuity Management (BCM) – Key Performance Indicators (KPI's) By: Arunkumar Durairaj 14-Nov-16 1. Introduction The purpose of BCM KPI's are to monitor and measure the performance of Business Continuity Management(BCM) program based on the refernces obtained through achivement of processes or goals . These indicators are used to help organization evaluate its progress and / or performance (in terms of efficiency, effectiveness, robustness, and so on) of its BCM processes while pursuing short term, medium term and / or long-term goals / plans.…

    • 1403 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Infosys Consulting in 2006: Leading the Next Generation of Business and Information Technology Consulting Dhinesh E -139278037 Holistic View The case is set in early 2006. An overview about the Information Technology (IT) services landscape is provided for this period.…

    • 1591 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Hr Audit Paper

    • 1056 Words
    • 5 Pages

    HR Audit Strategic Management of Human Capital Jasmine Flores [Date Submitted] HR Audit Introduction Any organization faces an essential requirement to follow a certain number of rules, regulations, practices and other detailed procedures for staying on the path of success. For an organization to be successful, some of the most significant aspects which can assist it in relation to this include different instances of HR metrics. By following and monitoring significant HR metrics, a company can deal with issues effectively and raise the standards of its operations and outcomes in an informed manner.…

    • 1056 Words
    • 5 Pages
    Improved Essays