Taking Out The Trash While Securing Customer Data

Agriculture. Fuel transport. Water management. Garbage collection. These are all basic, hands-on industries that have been in place for centuries to create the infrastructures that help us live safe, comfortable lives.

We don’t normally consider any of these areas of activity to have any part in today’s disruptive technologies. These are usually considered to be “manual” or blue-collar industries. But increasingly, we would be wrong.

Take Waste Industries, a provider of non-hazardous solid waste and recycling in the southeast United States, and more recently in Colorado. We had a conversation with the company’s Vice President of Information and Technology, Hubert Barkley. “Some say we are a waste company, a service provider that simply picks up a commodity – garbage, nothing more,” Barkley says. “My view is that we are a technology company in the business of picking up waste. We cannot successfully operate our business in the digital economy, in a competitive manner, without the use of innovative technology solutions.”

But handling so much residential and private information – as well as company data – means that a key to Waste Industries’ business is assuring complete cybersecurity.

“Useful, actionable information is king,” says Barkley. “We need to protect our assets, our proprietary information, and our customer data. Securing our environment builds trust and allows us to make better business decisions. Protecting this information is paramount to our success and reputation.”

“Some say we are a waste company, a service provider that simply picks up a commodity – garbage, nothing more.

My view is that we are a technology company in the business of picking up waste.”

Image courtesy of Waste Industries

NorthState supports Waste Industries against today’s ever-expanding attack surface with a Security Everywhere architecture aligned with the U.S. Cybersecurity Framework from the National Institute of Standards and Technology (NIST). This Identify-Protect-Detect-Respond-Recover methodology is designed to comprehensively cover government and industry during all phases of a cybersecurity attack.

Within the NIST framework, NorthState protects Waste Industries with a powerful set of security capabilities, assuring continuous risk mitigation, real-time responsiveness, and well-rounded training and education for employees. This not only secures the company perimeter, but also its internal network, systems, and users.

“In these industries, success lies in serving others,” Barkley says. “It’s our customer’s information and our reputation. They place great trust in us that we will be good stewards of their data. We do not want to breach their trust or confidence in our ability to serve them. As we expand our footprint into new markets, protecting our data is more important than ever.”

download document

Interested in learning more?

Share your email address to download the full case study.