Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

EMC Rolls Out 5 GRC-Centered Security Services


EMC's consulting arm is introducing five security and risk management advisory services.

"When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions ... framed under the broader umbrella of GRC--governance, risk, and compliance," said Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."

The five services, available now, are: Trusted Cloud Advisory Services to provide visibility into and control of an organization's private and public cloud environments; Information Governance Advisory Services to facilitate a safe, efficient stewardship of high-value information; Governance, Risk, and Compliance Advisory Services to bring governance and visibility to risk management; Fraud and Identity Management Advisory Services to protect sensitive information while allowing trusted identities to freely, securely interact with online systems in ways that increase efficiency, improve customer satisfaction, and control costs; and Mobile Device Security Advisory Services to help mitigate the rapidly escalating risks associated with providing mobile device access to sensitive data and resources.

[ See our complete RSA
2012 Security Conference coverage
, live from San Francisco. ]

EMC says the new services are an extension of the security offerings of both the consulting and RSA units, backed by hundreds of certified security professionals with extensive governance, risk, compliance, and security management experience.

Security analyst Ginny Roth, CISSP, Enterprise Strategy Group, thinks EMC's customers want security services period, whether they come from RSA or some other vendor. "Security should be a natural adjunct to almost any vendor with offerings that either host or manage data, and hardware vendors should be no exception. EMC saw that years ago when they invested in RSA and this is the natural evolution of that vision."

She adds that most of the enterprise storage vendors also have security either built in to their offerings or as a P&L division within their organization (i.e. Dell-SecureWorks, HDS-HitachiID, HP-Enterprise Security Division, IBM-IBM Security Solutions).

Read the rest of this article on Network Computing.

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)