Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

EMC Launches New Security and Risk Management Advisory Services

RSA Conference News

SAN FRANCISCO – RSA CONFERENCE 2012EMC today announced the availability of five new security and risk management advisory services designed to help organizations improve levels of trust and control for next-generation IT infrastructures such as cloud, virtualization, and mobile.

RSA Conference News

SAN FRANCISCO – RSA CONFERENCE 2012EMC today announced the availability of five new security and risk management advisory services designed to help organizations improve levels of trust and control for next-generation IT infrastructures such as cloud, virtualization, and mobile.

Developed by EMC’s consulting division, the new offerings will help customers keep information is secure, and be in compliance with regulations. The new Security and Risk Management Advisory Services include:

EMC LogoTrusted Cloud Advisory Services are designed to build trust in an organization’s next-generation IT architecture. These services leverage EMC’s deep experience in identity, information, and infrastructure security, providing visibility into, and control of, an organization’s private and public cloud environments.

Information Governance Advisory Services were created to enable the development of a cohesive approach to information governance. Organizations better understand where information lives, how it’s delivered and accessed, and how it’s used and governed in order to facilitate safe, efficient stewardship of high-value information.

Governance, Risk, and Compliance Advisory Services are designed to identify, analyze, manage, and mitigate risks. These services bring governance and visibility to risk management, providing confidence that information is secure, compliant with regulations, and meets specific business requirements.

Fraud and Identity Management Advisory Services help organizations cope with the complex, evolving threat landscape. Clients can protect sensitive information, while allowing trusted identities to freely and securely interact with online systems in ways that increase efficiency, improve customer satisfaction, and control costs. Business agility is balanced with the appropriate levels of security and authentication.

Mobile Device Security Advisory Services were developed to allow organizations to extend their current enterprise security policies and controls to help mitigate the rapidly escalating risks associated with providing mobile devices access to sensitive data and resources.

“Security culpability is no longer the responsibility of just the CISO. The demand for broadened information access and an increasingly interconnected mobile workforce is exposing sensitive corporate data to new forms of risk and leakage,” said Chris Christiansen, Program Vice President, Security Products & Services, IDC. EMC’s new Security and Risk Management Services are the ideal remedy to lock down access control and identify IT infrastructure security gaps before they become problematic or worse, irrevocably damaging.”

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.