Transforming Network Infrastructure Industry News

TMCNet:  Secure Enterprise Computing Launches New Risk-based Security Assessment for Bring Your Own Device (BYOD)

[December 13, 2012]

Secure Enterprise Computing Launches New Risk-based Security Assessment for Bring Your Own Device (BYOD)

(PR Web Via Acquire Media NewsEdge) MORRISVILLE, N.C. (PRWEB) December 13, 2012 Secure Enterprise Computing announced today a new offering focused on providing assessment of mobile security for companies seeking to reduce the risk of “bring your own device” (BYOD) personal computing devices, including iPhones, Smartphones, tablets and new laptops. The Mobile Security Risk Assessment service from Secure Enterprise Computing answers the need for companies to determine what level of exposure their workforce is adding to the company’s overall security level. The assessment determines threats and vulnerabilities, delivers checklists and recommendations on mobile security policies and procedures consistent with industry best practices and surveys the organization’s stakeholders in support of policy and strategy development. In addition to a custom report, SEC experts work with internal resources to ensure the development of practical recommendations and policy.

The growth of mobile devices is well known. The increasing use of these personal productivity devices for work purposes is creating additional risk for companies. BYOD security breaches are occurring at an alarming frequency. Business email is increasingly done on smartphones. Critical enterprise data is accessed via tablet browser applications. The benefits in productivity gains, employee satisfaction and process efficiencies are easily recognized. However, the need for equivalent security compliance levels as that found on internal IT assets is less understood and far less implemented.

About Secure Enterprise Computing Secure Enterprise Computing delivers industry recognized services and consulting expertise in information security. The Company has supported thousands of clients since its inception in 1998. The team of professional specialists delivers security expertise and thought leadership in retail, healthcare, government and financial industries. Clients seek Secure Enterprise Computing for unparalleled service delivery of technical and business insight, with an emphasis on business planning impacts of security risk management. Headquartered in Morrisville, NC the Company provides clients with high value-added services throughout the Southeast.

Read the full story at (c) 2012 PRWEB.COM Newswire

[ Back To Transforming Network Infrastructure's Homepage ]

Featured Blog Entries

Reflections from an Interop Veteran and Alum

When I returned to the Fiber Mountain™ offices in Connecticut after exhibiting at Interop Las Vegas 2015, I couldn’t help but think about how much the event has evolved through the years. I have been attending this seminal IT and networking conference since its inception in 1986 when it was called the TCP/IP Vendor Workshop, focused on interoperability of various TCP/IP program stacks.

What Fiber Mountain's Interop Recognition Means for Our Industry

When Fiber Mountain™ began its journey with a launch at Interop New York last fall, we certainly believed that we had a solution that would make a significant impact in the data center space.

What On-Board Optics Means for Density and Flexibility

This past week I read an article in Lightwave Magazine and another in Network World about the formation of the Consortium for On-board Optics (COBO), a group that seeks to create specifications and increase the faceplate density of data center switches and adapters.

Scaling Hyperscale in an Age of Exponential Growth and Virtualization

Over the past several years server, network, storage and application virtualization has revolutionized the way hyperscale data centers are built by consolidating workloads. The trend has simplified network architecture significantly and resulted in huge cost savings as well.

Video Showcase