Grand Marnier gets on track with Aldata
Drinks multinational Grand Marnier is installing software to track goods along the supply chain to help it comply with new US...



From forensic cyber to encryption: InfoSec17
Security technologist Bruce Schneier’s insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken’s comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Under US anti-bioterrorism legislation introduced in April, companies exporting to the US must be able to locate and trace goods from raw material to finished product.
When trucks arrive at Grand Marnier's depot, staff scan the barcodes on the pallets inside using a handheld device which then transmits the data across a wireless network to the central warehousing system at head office.
Grand Marnier, which exports 90% of its production to the US and Canada, will use Aldata software to keep a tally of goods in the warehouse and to track progress along its supply chain. It will be installed on IBM AS/400 servers in Grand Marnier's head office in the Eure region of France. The Aldata software will link to Grand Marnier's production system.
Arnaud Mabire, IT manager at Grand Marnier, said the US export law meant an update of the technology used in its warehouse became a priority.
"Several months ago we had a project consisting of an optimisation of warehouses and an automated follow-up of products. This law, as well as other European rules, made this project a priority," Mabire said.
Read more on IT risk management
-
Why businesses must think like criminals to protect their data
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
-
Security Think Tank: Human, procedural and technical response to fileless malware
Start the conversation
0 comments