EMC Rolls Out 5 GRC-Centered Security ServicesEMC consulting arm appears to be going into competition with RSA by introducing five security and risk management advisory services.
EMC's consulting arm is introducing five security and risk management advisory services.
"When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions ... framed under the broader umbrella of GRC--governance, risk, and compliance," said Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."
- The Untapped Potential of Mobile Apps for Commercial Customers
- Get Actionable Insight with Security Intelligence for Mainframe Environments
White PapersMore >>
The five services, available now, are: Trusted Cloud Advisory Services to provide visibility into and control of an organization's private and public cloud environments; Information Governance Advisory Services to facilitate a safe, efficient stewardship of high-value information; Governance, Risk, and Compliance Advisory Services to bring governance and visibility to risk management; Fraud and Identity Management Advisory Services to protect sensitive information while allowing trusted identities to freely, securely interact with online systems in ways that increase efficiency, improve customer satisfaction, and control costs; and Mobile Device Security Advisory Services to help mitigate the rapidly escalating risks associated with providing mobile device access to sensitive data and resources.
[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]
EMC says the new services are an extension of the security offerings of both the consulting and RSA units, backed by hundreds of certified security professionals with extensive governance, risk, compliance, and security management experience.
Security analyst Ginny Roth, CISSP, Enterprise Strategy Group, thinks EMC's customers want security services period, whether they come from RSA or some other vendor. "Security should be a natural adjunct to almost any vendor with offerings that either host or manage data, and hardware vendors should be no exception. EMC saw that years ago when they invested in RSA and this is the natural evolution of that vision."
She adds that most of the enterprise storage vendors also have security either built in to their offerings or as a P&L division within their organization (i.e. Dell-SecureWorks, HDS-HitachiID, HP-Enterprise Security Division, IBM-IBM Security Solutions).
Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)