April 30, 2014 – After completing a comprehensive SSAE 16 SOC 2 assessment, this American privately held application performance management company has requested assistance, once again, from C2 Company to continue assisting them as they work to achieve compliance. During this phase, C2 Company has been asked to execute remediation activities and assist with the preparation of the SSAE 16 SOC 2 audit.
April 28, 2014 – The largest employee owned resource recovery and recycling company, in the industry, has returned to C2 Company to assist them with the implementation of a new, Cisco Unified Computing System (UCS) based, Virtual Desktop Infrastructure (VDI) solution.
April 28, 2014 – In an effort to secure their corporate users and resources, this mobile shopping platform service provider sought C2 Company’s security expertise for a secure infrastructure solution assessment and requirement mapping which would include and involve Mobile Device Management (MDM), client provisioning and posturing, network admission control, end-point protection, VPN and network segmentation technologies.
April 18, 2014 - A manufacturer of new generation, highway capable, electric vehicles has returned to C2 Company to continue the support and troubleshooting of their PKI infrastructure.
April 9, 2014 – This worldwide leader of intent-based solutions, that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time has once again turned to C2 Company to provide support for their network design, configuration, and troubleshooting.
March 31, 2014 – The leading provider of Motion Tracking devices for consumer electronics products has turned to C2 Company to provide on-site and/or remote production network support, as well as on-site and/or remote general IT support, troubleshooting, and maintenance of the network infrastructure.
March 27, 2014 – After purchasing new network infrastructure devices, this market leader in digital personalized photo products and services needed assistance with the integration of their new devices into their existing architecture. They chose C2 Company based upon their reputation for strong network and security expertise.
February 25, 2014 – An American privately held application performance management company was seeking assistance with conducting an objective and comprehensive evaluation of their policies, processes, practices, and technology to determine posture and alignment of their practices to SSAE 16 SOC 2 Trust Principles control objectives. They turned to C2 Company’s expertise and requested a comprehensive SSAE 16 SOC 2 assessment.
January 7, 2014 – The Leading Social Media Site sought out C2 Company’s expertise with network and security design for the design and implementation of their four new global remote office infrastructures.
January 7, 2014 – A 50 year old California nonprofit public benefit corporation was the victim of a VoIP security breach and Cisco Call Manager hard drive crash. They requested assistance from C2 Company to provide VoIP security and troubleshooting services.
December 26, 2013 – An organization specializing in data privacy and information security regulations and frameworks, focused on healthcare and financial sectors has requested assistance, from C2 Company, to provide PCI compliance services for their customer – a provider of software and services for communications, media and entertainment industry service providers.
December 19, 2013 – Once again this independent, nonprofit organization, that conducts research, development and demonstrations relating to the generation, delivery and use of electricity for the benefit of the public, has sought assistance from C2 Company for the purpose of upgrading their existing active/stand-by pair of F5 LTMs to the latest OS software version.
December 19, 2013 – After having recently performed a PCI DSS assessment for this worldwide leader of intent-based solutions, that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time; certain gaps were identified requiring remediation. C2 Company was tasked to provide assistance in the remediation efforts as well as provide Project Management oversight for all remediation tasks.
December 19, 2013 – Familiar with C2 Company’s vast knowledge of Cisco products, this provider of strategic, on-demand, subscription billing solutions for digital merchants, has requested assistance from C2 Company to provide Cisco network and firewall support, as well as any troubleshooting efforts.
December 16, 2013 – Once again turning to C2 Company, the 100th largest credit union in the US, sought DMVPN services for their secondary and tertiary hubs, as well as assistance with the design and implementation of their new ARIN IP assignments.
December 16, 2013 – A manufacturer of new generation, highway capable, electric vehicles has turned to C2 Company for the support and troubleshooting of their PKI infrastructure.
December 6, 2013 – In an effort to locate their potential intellectual property files, residing on either CIFS or NFS repositories across their company network, this leading provider of optical products and test and measurement solutions for the communications industry has turned to C2 Company to conduct a wide area scan of their internal network to locate open NFS and CIFS servers.
December 5, 2013 – Wishing to resolve their DMVPN redundancy issues, the 100th largest credit union in the US, utilized C2 Company’s expert knowledge of networking and security to provide for their remediation efforts.
December 3, 2013 – An on-line fraud protection company, that helps on-line businesses verify new accounts, authorize payments and transactions and authenticate user logins in real-time without relying on PII, has requested a systems engineer, from C2 Company, to provide for support and troubleshooting services.
December 3, 2013 – A leading dental/medical device manufacturer has once again turned to C2 Company’s security and network engineering expertise, to internally scan their network, using “trusted” scans, to identify possible vulnerabilities.