Envisa http://www.envisa.com We enable success. Wed, 28 Sep 2016 18:02:43 +0000 en-US hourly 1 https://wordpress.org/?v=4.5.3 Envisa Welcomes Hattie Llavina to the Team http://www.envisa.com/index.php/envisa-welcomes-hattie-llavina-to-the-team/ Wed, 28 Sep 2016 18:02:01 +0000 http://www.envisa.com/?p=16357

We are pleased to announce that Hattie Llavina has joined the Envisa team as a Technology Solutions Manager.  Hattie comes to us from the Massachusetts Bay Transit Authority where she worked for the past ten years as a Senior Web Application Developer.

Holding a B.S. degree in Writing and Cognitive Science from the Massachusetts Institute of Technology and an M.A. degree in English Literature and Writing from Boston University, Hattie brings with her over twenty years of technical industry experience as well as strong communication skills. We are excited to add Hattie’s knowledge and experience to the Envisa team.

]]>
Envisa Tees Off to Support the American Cancer Society http://www.envisa.com/index.php/envisa-tees-up-to-support-cancer-research/ Wed, 13 Jul 2016 14:34:23 +0000 http://www.envisa.com/?p=16177

With the sponsorship of two teams in the annual NEMOA (National Etailing and Marketing Organization of America) charity summer golf outing, Envisa helped the event raise $2000 for The American Cancer Society. Envisa has been a participant or co-sponsor of the NEMOA charity golf outing for most of the event’s sixteen year history.

]]>
A. T. Cross Chooses Envisa for Next-Generation E-Commerce http://www.envisa.com/index.php/a-t-cross-chooses-envisa-for-next-generation-e-commerce/ Tue, 05 Jul 2016 18:54:52 +0000 http://www.envisa.com/?p=16153 the market-leading Sitecore Experience platform, and will oversee the integration of the recently-acquired Sheaffer brand into the company's online portfolio.]]>

Long-time client and iconic American brand A. T. Cross has once again chosen Envisa to lead the design, implementation and delivery of next-generation e-commerce solutions for the company’s global B2C and B2B channels. Envisa will lead the migration of Cross’s online architecture to the market-leading Sitecore Experience platform, and will oversee the integration of the recently-acquired Sheaffer brand into the company’s online portfolio.

]]>
We’re Hiring! http://www.envisa.com/index.php/were-hiring/ Tue, 28 Jun 2016 14:07:52 +0000 http://www.envisa.com/?p=16085 contact Envisa to learn more.]]>

If you or someone you know is a software engineer with .NET or Java skills, we may have an opening for you!  We are looking for a quality-driven, detail-oriented, experienced professional to join our team. Please contact Envisa to learn more.

]]>
Stoneside Posts Record Sales in May http://www.envisa.com/index.php/stoneside-posts-record-sales-in-may/ Wed, 15 Jun 2016 18:31:19 +0000 http://www.envisa.com/?p=16150 contact a Stoneside design consultant to learn more.]]>

Powered by Envisa’s advanced online product configurator, Stoneside—an emerging leader in custom-made blinds and shades—posted record sales in May, demonstrating the power of its unique vertical integration model to deliver unparalleled quality and value in the home décor market. If you’re looking for beautifully-designed, US-made blinds and shades, contact a Stoneside design consultant to learn more.

]]>
Envisa Will Take to the Links on July 11th http://www.envisa.com/index.php/envisa-will-take-to-the-links-at-nemoa-golf-tournament/ Mon, 13 Jun 2016 13:54:49 +0000 http://www.envisa.com/?p=16075 NEMOA Charity Golf Outing. Now in its 16th year, the NEMOA Charity Golf Outing offers a great opportunity to reconnect with industry colleagues while enjoying a relaxing afternoon at Wentworth by the Sea Golf Club in Rye, NH. We hope to see you there on July 11th!]]>

Once again, Envisa is looking forward to the annual NEMOA Charity Golf Outing.  Now in its 16th year, the NEMOA Charity Golf Outing offers a great opportunity to reconnect with industry colleagues while enjoying a relaxing afternoon at Wentworth by the Sea Golf Club in Rye, NH.  We hope to see you there on July 11th!

]]>
Globalization http://www.envisa.com/index.php/globalization/ Sun, 01 May 2016 16:05:05 +0000 http://www.envisa.com/?p=12037
Click the image to learn more>>]]>

Are You Ready to “Grow Global?”

International commerce is the fastest growing component of online sales today. According to Internet Retailer, 71% of online retailers are selling overseas. Whether you are looking to expand into a new market, launch a business overseas or improve your global efficiency, Envisa can help. We aid our clients in understanding global opportunities and putting the systems in place to acquire customers, transact online and seamlessly fulfill orders around the globe.

The Fundamentals

From the Outset, Design Your Solutions for Future Globalization

  • Does your e-commerce design allow for global character sets?
  • Can your design flex to accommodate global currencies?
  • Can you accommodate varied shopping preferences and consumer behaviors dictated by local customs?

Take the Time to Understand the Unique Features of Emerging Markets

  • What is the status of internet access in new target markets?
  • What kind of payment systems are available and frequently used by customers in new markets?
  • How developed is the delivery landscape?

Understand Local Customs, Laws and Practices Governing Logistics

  • Landed Costs — How do calculate VAT and duties?
  • Usability — What kind of web experience do international consumers expect?
  • Payment Methods — How do you provide foreign payment options?
  • Fulfillment — Are you warehousing internationally or direct shipping?
  • Customer Service — How do you handle inquiries and returns?

Centralize Your Site for Global Brand Consistency and Optimal Technology Maintenance

  • Can a single global solution work for you?
  • What are the pros and cons of networked local solutions vs. one global solution?
  • How are your worldwide e-commerce solutions supported and maintained?

In the News

The Envisa Difference

  • We’ve designed, developed, and implemented single global solutions that are centrally maintained, yet locally tailored.
  • From taxation to shipping costs, our global solutions are flexible enough to address localization needs, yet standardized enough to maintain brand consistency.
  • Behind the scenes, we design and deliver secure, robust and flexible technical architectures as the foundation of whatever global approach you choose.

What We Do

Featured Project

]]>
Omni-Commerce http://www.envisa.com/index.php/omni-commerce/ Fri, 01 Apr 2016 15:01:33 +0000 http://www.envisa.com/?p=12490
Click the image to learn more>>]]>

Does Your Cross-Channel E-Commerce Make Sense?

Omni-commerce is the customer-driven trend-of-the-moment, but it’s not a passing fancy. Consumers are savvy, and the retail experience continues to evolve with available technology.  Whether through personal mobile devices, kiosks or in-person shopping, consumers are browsing, comparing, locating, and purchasing products through a variety of channels, and they expect their experiences to be the same wherever they choose to shop.

The Fundamentals

Build A Consistent Presence And A Coherent Strategy

  • How do your mobile, online and in-store branding and shopping experiences compare?
  • Are you setting accurate customer expectations across all channels?

Ensure The Complex Mix Of Systems And Stakeholders Are All Working In One Direction

  • Are your store managers, marketing executives and e-commerce gurus working to one vision?
  • Are all all corporate e-commerce initiatives knit together to support one digital presence?
  • Is there a clear manager for all the e-commerce vendors and suppliers you’ve chosen?

Provide Well-Equipped Sales Support And Easy Checkout Wherever Your Customers Shop

  • Can your in-store sales clerks support the consumer with access to all products and endless aisle capabilities?
  • Can customers purchase your products anywhere they can find them with an easy, one-click buying experience?
  • Is your purchasing process simple and streamlined across all channels?

Compile Customer History, Profiling And Lifetime Value Metrics To Inform Your Business

  • Do you recognize your customers regardless of which “door” they use?
  • Can browsing, purchasing, returning, and tracking be done effortlessly across channels?
  • Are you able to save the customer time by tailoring the shopping experience?

Create A Flexible Technical Architecture That Leaves You Poised for Growth

  • Is your technical architecture flexible enough to support new channels (kiosks? salesforce solutions? franchising?)
  • Are you putting in the necessary safeguards to protect your customer data?

In the News

The Envisa Difference

  • From on-location interior designers to sales clerks to tradeshow personnel, we’ve equipped front-line salespeople with fully-integrated tablet-based solutions for a seamless shopping experience across all channels.
  • We’ve designed and implemented flexible e-commerce technical architectures that support traditional channels as well as kiosk and franchising sales models
  • We’ve integrated our clients’ back-end data to provide complete customer history and lifetime value profiles to enable omnichannel marketing

What We Do

Featured Project

]]>
Security http://www.envisa.com/index.php/security/ Tue, 01 Mar 2016 17:21:17 +0000 http://www.envisa.com/?p=13254
Click the image to learn more>>]]>

Are You Doing Enough to Protect Your Data?

Data security breaches are on the rise, and e-commerce sites all-too-often provide an easy target.  From payment card information to personal identity and financial data, stolen information represents a constant and increasing threat to online commerce.


Preventing stolen data and providing ongoing monitoring are essential in ensuring that any data breaches are identified, contained and resolved immediately.  The good news is that preventing data theft has become much less daunting, and there are concrete steps every e-tailer can and must take right now. For a high level look at where to begin, see our whitepaper on Network Security 101.

The Fundamentals

Start You Data Security Begins with a Secure E-Commerce Platform

  • Is your platform PCI-compliant?
  • What payment gateways are natively supported by your e-commerce platform?
  • Where does your platform fall along the smooth user experience-optimal data security continuum?

Capitalize on Tools that Provide Enhanced Security

  • Payment card tokenization replaces payment data with an irreversible token identifier that can only be used by the targeted merchant.
  • Around the globe, online security standards are changing and many merchants are looking to 3D Secure technology to protect payment data.  Would this strategy work for you?

Be the First to Know About any Data Breach

  • Have you established system alerts to notify you immediately when suspicious activity occurs?
  • Are there real-time analytics tools installed to track how customers are interacting with your site?
  • Are you performing regular PCI scans to look for potential weaknesses in your security?

Take Action to Reduce or Remediate Data Violations Immediately

  • Do you have a communication plan to inform customers of data vulnerabilities?
  • Are you protected by a fraud management service?
  • Have you established and tested effective disaster recovery procedures in the event of a security failure?
  • Do you patch and update all site components immediately to ensure protection is optimized?

In the News

The Envisa Difference

  • Because our designers are also solution engineers, we design our e-commerce systems with security in mind and select robust and flexible technical architectures to ensure the highest level of security available.
  • We have been called on to provide security remediation when a breach has occurred, and have stood by remediation clients to provide ongoing support.
  • We’ve worked with our clients on payment card tokenization to improve data security.
  • For our clients with global solutions, we’ve led discussions on 3D secure capability to meet and exceed international security requirements.

What We Do

Featured Project

]]>
Improving Network Security: Where to Begin… http://www.envisa.com/index.php/security101/ Fri, 26 Feb 2016 15:11:02 +0000 http://www.envisa.com/?p=14265

Improving Network Security: Where to Begin…

If you’re reading this, you are presumably interested in what high-level steps you should be thinking about to make your organization’s network more secure than it is today, or perhaps you just have a passing interest in information security.  This is most definitely not an exhaustively complete how-to guide for anything.  What follows here are just a few very general thoughts about where one might begin if they were asked to improve the overall security of most networks.

Learn The Lay of the LAN

One of the most daunting aspects of computer security is the sheer scale of the problem space.  Every single device attached to every network has its own instances of running applications (client, server, or both), an operating system, a networking protocol stack, device drivers, and firmware.  Security vulnerabilities can potentially exist anywhere where code runs and even where it doesn’t when you consider physical security.  An initiative to improve the overall computer security of an organization should be rooted in a sound understanding of what devices exist on the network, what must run on each of these devices at each layer of the stack and why, and which users require access to services on those devices.  It might seem obvious, but you can’t secure a system if you don’t know it exists, who uses it, and how and why they use it.  Asset discovery utilities and port scanners can help you to ensure you have a complete and current picture of the devices and services in use on the network.  From there, system and application logs can often help to identify the de-facto user base.

Know Your External Attack Surface Area

Once you know what key assets need to be protected, you can begin to think about how best to control access to these systems.  Begin at the edges of the network and work your way inward.  Read through the NAT policies and access control lists on your edge firewalls and routers to determine which machines (if any) on your network are permitted to accept traffic from the outside world and to validate that these policies are still required.  Every system that needs to be accessible from the Internet is one more system that needs to be diligently patched, monitored, and isolated from other internal systems.  Consider using an application security vulnerability utility to scan your applications for known vulnerabilities.  If you have a web application that stores or processes credit card information, you are required to do this at least quarterly to be PCI compliant.  Consider protecting public-facing services with an application firewall in addition to or instead of an ordinary firewall.  While an ordinary firewall protecting a web application might be configured to allow all traffic from all IP addresses through to the web server when the destination ports are 80 or 443, a web application firewall can do this while also potentially recognizing and blocking HTTP requests consistent with common attacks such as cross-site scripting (XSS) and SQL injection.

Many organizations have moved their public-facing applications to cloud hosting providers in an effort to reduce or eliminate these administrative chores, but the cloud is not a magic bullet.  Know which security-related maintenance tasks any hosting providers are obligated to perform and which items are still your responsibility.  Examples might include activities such as patch management, firewall configuration support, DOS attack mitigation, and SSL certificate renewals just to name a few.

Client Device Security

Most organizations have a lot more desktops, laptops, tablets, and smartphones than they do servers, and a compromised mobile device can potentially be walked around the firewall to attack a network from within.  Consider restricting all wireless networks to the Internet so that it is impossible to reach any internal networks from any wireless access point without a VPN connection.  Mobile device management solutions exist which are capable of restricting which mobile apps users are allowed to install.  A typical use case would be defining a policy that forbids the installation of any VPN apps to the phones and pushes the deployment of an anti-virus app to the device.  Centrally managed host firewall software can help to protect laptops that are off-site.  Any device small enough to be mobile is also small enough to be lost or stolen, so use disk encryption whenever it is practical.

In most networks with lots of client workstations, centrally-managed antivirus is essentially a necessity, but it ideally should not be the only line of defense.  Most malware that finds its way on to workstations gets there because the user downloaded it without ever realizing it, so your goal should be to prevent the download from happening in the first place.  Use an e-mail provider that scans and scrubs infected attachments before delivery, or software to do the same if you operate your own mail servers.  Consider routing Internet traffic for workstations through a firewall that is capable of scanning and filtering executable downloads and blocking traffic to known malicious domains and/or requiring all web traffic to go through a proxy server.

Encourage an Information Security Aware Culture

Security researcher and expert, Bruce Schneier famously wrote that, “Security is a process, not a product.” There are lots of good products that can help you achieve your security goals, but none of them can stop users from storing all their passwords on a sticky note under their keyboard.  The process of maintaining security requires continued regular iterations, and ultimately depends on people who take the process seriously.  Make it your goal to devise security procedures that are so streamlined and easy that people have no excuse not to follow them.  This is not always possible, and some policies and procedures are bound to be unpopular.  In these cases, be prepared to clearly communicate and document the risks of using an insecure process.

© 2016-2020 Envisa® All Rights Reserved.

]]>