October 31, 2014 – The leading provider of cloud-based fully managed and self-managed unified IT service solutions for mid-market enterprises is seeking assistance in becoming a HIPAA Business Associate (BA), as a first step toward full compliancy, and chose C2 Company to help them with achieving their goal.
October 30, 2014 – After started an installation of SolarWinds, this on‑demand (cloud-based) human capital management and financial management software vendor sought C2 Company’s expertise, requesting assistance in completing the installation and configuration of devices for alerts and monitoring and also requested assistance with the configuration of an existing Splunk system, as well as adding an IT services dashboard.
October 13, 2014 – Once again turning to C2 Company, the 100th largest credit union in the US, requested assistance with the implementation of their Folsom, CA site, as their VoIP Disaster Recovery (DR) site.
October 10, 2014 – An American information technology company based in Mountain View, California, that provides flash-based storage products specifically designed for virtualized and cloud environments has turned to C2 Company’s security expertise and requested C2 Company to conduct a business security risk assessment. The goal of the assessment is to assist the customer in making decisions about existing business practices and policies, and provide recommended risk control measures for business practices.
October 8, 2014 – This software solutions company, that enables a more connected and collaborative world by infusing cognition into computing to create boundary-less highly scalable and resilient services distributed across heterogeneous infrastructure, turned to C2 Company to provide support for their network design, configuration, troubleshooting and maintenance.
October 7, 2014 – C2 Company was selected by a leading provider of enterprise level, on-demand automated solutions for the residential mortgage industry to provide support for network design, configuration, and troubleshooting.
October 6, 2014 – This technology consulting company specializing in data center design, implementation, and optimization turned to C2 Company expertise for the configuration and implementation of their F5 Load Balancers.
September 29, 2014 – The worldwide leader of intent-based solutions that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time has, once again, turned to C2 Company to provide support for network design, configuration, and troubleshooting.
September 18, 2014 – After C2 Company successfully completed Phase I of their Cisco ISE POC Implementation, this Government Agency returned to C2 Company to complete the remainder of their Cisco ISE POC implementation.
September 18, 2014 – This employee owned resource recovery and recycling company that manages municipal disposal processes and services that span the needs of urban, suburban and rural communities, has requested access to C2 Company consultants to provide services related to their PCI / CDE Project (pre-startup). Services are to include conducting network discovery with the goal of outlining the CDE design.
September 12, 2014 – Once again the largest national grocery store chain turned to C2 Company for assistance with an internal project. For this project, they required C2 Company to provide technical engineering/management services to assist with their VoIP deployment.
September 12, 2014 – After requesting additional network support from C2 Company, the largest national grocery store chain returned to C2 Company for their security expertise and requested assistance with Checkpoint firewall rule investigation and migration activities in support of their data center migration.
September 12, 2014 – The largest national grocery store chain has, once again, requested assistance from C2 Company to provide support with network operational, tactical, and strategic projects in the area of network switching, routing, and security.
September 8, 2014 – An American privately held application performance management (APM) company based in San Francisco, CA, has plans to migrate a portion of their data and environment, from hosted physical data centers, to the Amazon AWS cloud. They sought assistance with their objective to provide recommendations, and assistance in implementing controls, policies, and practices to secure data as it is transferred, stored, and utilized in the Amazon AWS cloud. Additionally, they required efforts to classify data, map data practices to required controls, determining gaps in controls, and remediating any gaps discovered. C2 Company was contacted to provide them with Amazon AWS Security services to complete their objectives.
September 3, 2014 – The number 1 independent real estate company in Southern California, has sought C2 Company’s network and security expertise to support network design, configuration, and troubleshooting of their network.
August 29, 2014 – A company that provides personalized customer experience solutions for multi-channel retailers requested assistance from C2 Company to provide them with on-site staff augmentation and technical professional services.
August 11, 2014 – Seeking to integrate wireless access into their existing Cisco ISE 1.2 POC lab environment this leading global interactive entertainment software company reached out to C2 Company to design and plan an upgrade their production ISE from ver 1.1 to 1.2 as well as rollout ISE wireless access.
August 8, 2014 – After successfully triaging their existing ISE MACSec and posturing issues, this Government Agency returned to C2 Company to implement their Cisco ISE solution.
July 24, 2014 – This company that powers the cloud marketplaces of trusted companies around the globe and has helped to connect millions of businesses with today’s leading web-based applications sought out C2 Company’s network and security expertise to assist them with the design and implementation of their office network infrastructure expansion.
July 22, 2014 – This American privately held application performance management company has once again turned to C2 Company experts to provide security and compliance consulting services.
July 11, 2014 – After using the services of C2 Company on multiple occasions, the largest national grocery store chain has, once again. turned to C2 Company to assist them with network operational, tactical, and strategic projects in the area of network switching, routing, and security.
June 6, 2014 – The worldwide leader of intent-based solutions that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time has, once again, turned to C2 Company to provide support for network design, configuration, and troubleshooting; on an as-needed and on-call basis.
June 5, 2014 – A technology consulting company, specializing in data center design, implementation, and optimization, sought the services of C2 Company to provide as-needed technical consulting for their internal team.
June 5, 2014 – Seeking to take advantage of the vCMP guest flexible allocation capabilities in BIG-IP: VIPRION v11.4.1+, this global scientific research and development company that supports the introduction of new technology used in the growing fields of genomics, proteomics, drug discovery, food safety, medical diagnostics, and more, turned to C2 Company to implement the F5 VIPRION upgrade.
June 3, 2014 – Once again turning to C2 Company, the 100th largest credit union in the US, needed assistance with the setup of one 20MB Internet line and one 100MB VPLS line.
May 30, 2014 – An American retailer of home improvement and gardening products had been seeking assistance with the design and implementation of DMVPN connectivity between their corporate offices, distribution center, ‘test store’, and an initial pilot store. C2 Company was brought in to design and implement a DMVPN solution that met the requirements of the customer.
May 29, 2014 – C2 Company was contacted by an Amazon Web Services consulting partner, reseller, and managed services provider, to provide assistance for their customer who wished to have a design and implementation of a proof of concept for a highly scalable and secure infrastructure that enables large volumes of VPN connected clients access to internet apps and sites while capturing and storing user behavior without adversely affecting user experience.
May 28, 2014 – The leading global expert services and consulting firm that provides independent expert testimony, litigation and regulatory support, authoritative studies, strategic advice, and document and data analytics to major law firms, Fortune 500 corporations, government agencies, and regulatory bodies around the world was seeking assistance to determine adherence to the requirements of the Health Insurance Portability and Accountability Act (HIPAA) security rule with the associated relevant Health Information Technology for Economic and Clinical Health (HITECH) Act additional requirements. C2 Company was contacted and was brought in to conduct a HIPAA/HITECH Readiness Assessment.
May 21, 2014 – A company that simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications sought out C2 Company’s security expertise to provide assistance with general network and security infrastructure assessment and configuration support.
May 16, 2014 – Seeking to migrate from their existing ACS 4.x servers, to two new ACS 5.x Virtual appliances in a high-availability (HA) configuration, the leading manufacturer of 3d design and rendering software has once again turned to C2 Company’s network security expertise to implement the migration.
May 12, 2014 – To help ensure user access switch ports are secured via authentication, this company that develops a pre-pregnancy genetic testing to reduce and eliminate genetic diseases, sought out the expertise of C2 Company to develop a proof of concept design and deployment of an 802.1x wired infrastructure at their headquarters.
April 30, 2014 – After completing a comprehensive SSAE 16 SOC 2 assessment, this American privately held application performance management company has requested assistance, once again, from C2 Company to continue assisting them as they work to achieve compliance. During this phase, C2 Company has been asked to execute remediation activities and assist with the preparation of the SSAE 16 SOC 2 audit.
April 28, 2014 – The largest employee owned resource recovery and recycling company, in the industry, has returned to C2 Company to assist them with the implementation of a new, Cisco Unified Computing System (UCS) based, Virtual Desktop Infrastructure (VDI) solution.
April 28, 2014 – In an effort to secure their corporate users and resources, this mobile shopping platform service provider sought C2 Company’s security expertise for a secure infrastructure solution assessment and requirement mapping which would include and involve Mobile Device Management (MDM), client provisioning and posturing, network admission control, end-point protection, VPN and network segmentation technologies.
April 18, 2014 – A manufacturer of new generation, highway capable, electric vehicles has returned to C2 Company to continue the support and troubleshooting of their PKI infrastructure.
April 9, 2014 – This worldwide leader of intent-based solutions, that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time has once again turned to C2 Company to provide support for their network design, configuration, and troubleshooting.
March 31, 2014 – The leading provider of Motion Tracking devices for consumer electronics products has turned to C2 Company to provide on-site and/or remote production network support, as well as on-site and/or remote general IT support, troubleshooting, and maintenance of the network infrastructure.
March 27, 2014 – After purchasing new network infrastructure devices, this market leader in digital personalized photo products and services needed assistance with the integration of their new devices into their existing architecture. They chose C2 Company based upon their reputation for strong network and security expertise.
February 25, 2014 – An American privately held application performance management company was seeking assistance with conducting an objective and comprehensive evaluation of their policies, processes, practices, and technology to determine posture and alignment of their practices to SSAE 16 SOC 2 Trust Principles control objectives. They turned to C2 Company’s expertise and requested a comprehensive SSAE 16 SOC 2 assessment.
January 7, 2014 – The Leading Social Media Site sought out C2 Company’s expertise with network and security design for the design and implementation of their four new global remote office infrastructures.
January 7, 2014 – A 50 year old California nonprofit public benefit corporation was the victim of a VoIP security breach and Cisco Call Manager hard drive crash. They requested assistance from C2 Company to provide VoIP security and troubleshooting services.
December 26, 2013 – An organization specializing in data privacy and information security regulations and frameworks, focused on healthcare and financial sectors has requested assistance, from C2 Company, to provide PCI compliance services for their customer – a provider of software and services for communications, media and entertainment industry service providers.
December 19, 2013 – Once again this independent, nonprofit organization, that conducts research, development and demonstrations relating to the generation, delivery and use of electricity for the benefit of the public, has sought assistance from C2 Company for the purpose of upgrading their existing active/stand-by pair of F5 LTMs to the latest OS software version.
December 19, 2013 – After having recently performed a PCI DSS assessment for this worldwide leader of intent-based solutions, that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time; certain gaps were identified requiring remediation. C2 Company was tasked to provide assistance in the remediation efforts as well as provide Project Management oversight for all remediation tasks.
December 19, 2013 – Familiar with C2 Company’s vast knowledge of Cisco products, this provider of strategic, on-demand, subscription billing solutions for digital merchants, has requested assistance from C2 Company to provide Cisco network and firewall support, as well as any troubleshooting efforts.
December 16, 2013 – Once again turning to C2 Company, the 100th largest credit union in the US, sought DMVPN services for their secondary and tertiary hubs, as well as assistance with the design and implementation of their new ARIN IP assignments.
December 16, 2013 – A manufacturer of new generation, highway capable, electric vehicles has turned to C2 Company for the support and troubleshooting of their PKI infrastructure.
December 6, 2013 – In an effort to locate their potential intellectual property files, residing on either CIFS or NFS repositories across their company network, this leading provider of optical products and test and measurement solutions for the communications industry has turned to C2 Company to conduct a wide area scan of their internal network to locate open NFS and CIFS servers.
December 5, 2013 – Wishing to resolve their DMVPN redundancy issues, the 100th largest credit union in the US, utilized C2 Company’s expert knowledge of networking and security to provide for their remediation efforts.
December 3, 2013 – An on-line fraud protection company, that helps on-line businesses verify new accounts, authorize payments and transactions and authenticate user logins in real-time without relying on PII, has requested a systems engineer, from C2 Company, to provide for support and troubleshooting services.
December 3, 2013 – A leading dental/medical device manufacturer has once again turned to C2 Company’s security and network engineering expertise, to internally scan their network, using “trusted” scans, to identify possible vulnerabilities.