CIO Wall

Md. Tareq Hasan, PMP

Head of IT - Aristopharma Ltd. - Bangladesh

CIO Perspectives

The Pandemic triggered digital and remote working making Cyber Security one of the top priorities for organizations. In this context, tell us briefly how your organization managed the transition to remote working during the pandemic? How did you manage employees logging into the corporate network or accessing critical resources and remain protected from cyber-attacks? Tell us about some of the unique security best practices that you have implemented to protect your organization against cyber-attacks?

The major digital transformation at Aristopharma Ltd. started in 2017 with the implementation of SAP S/4 HANA as an ERP system with significant migration of secure core network infrastructure to ensure seamless transactions from local and remote locations. Employees could access the system from home for their day-to-day transactions during the pandemic. Aristopharma Ltd. is the first company in the history of Bangladesh to implement SAP Analytics Cloud Integration with SAP BW HANA during the COVID-19 period that helped a lot to increase analytical capabilities to drive strategic business decisions. By using VMware Horizon (VDI) and VMware Workspace ONE, Aristopharma could deliver personalized virtual desktops tailored to specific policies for each user, enabling employees to work seamlessly from anywhere, on any device during COVID-19. Around 3000 employees of the salesforce of Aristopharma have been using our own mobile application which is integrated with SAP S/4 HANA to ensure the supply of products at all levels in the market which has been effective in managing the on time product deliveries during the pandemic.

Aristopharma Ltd. has deployed various digital platforms considering major aspects of cyber security. By using CISCO high end firewalls and email security system along with end point protection has reduced most of the external and internal security threats. By deploying VMware Horizon (VDI) and VMware Workspace ONE, end users have to go through a certain level of policy and there are restrictions for unauthorized access. With this, we are managing the security for all our company owned devices through a single console.