Professional Documents
Culture Documents
Overview
As the global financial crisis stabilizes and those
affected governments, industries, consumers
take stock, talk is increasingly focused on how
to prevent such a crisis from happening again.
And without question, a flood of wellintentioned regulations which increase corporate
transparency and risk management are expected
to appear which will further complicate
compliance with current, overlapping controls.
In fact, about 80% of today s global IT-relevant
regulations share control goals and directives.
Business as usual needs to be reconsidered in
the context of the complexity, overlap and the
heightened scruitiny expected as this flood of
new regulations is unleashed. Frameworks and
approaches for IT best practices such as ISO
27001 and 27002 can offer guidance but will
require that organizations actually implement
them and that they map appropriately to new
regulations.
EMC Consulting
Risks
Endpoint
Network
Applications
Databases
Storage
Loss/theft
Eavesdropping
Unauthorized
access/activity
Unauthorized
access/activity
Unavailability
Unavailability
Unauthorized
access/activity
Media loss/theft
Device takeover
Intercept
Unavailability
Fraud
Leakage
Leakage
Leakage
Corruption
Corruption
Unavailability
EMCSolution
EMCSolution
EMCSolution
EMCSolution
EMCSolution
Strong authentication
Strong authentication
Digital rights
management
Consumer security
Data-in-flight security
Web access
management
Compliance
Web access
management
Compliance
Translation security
Strong authentication
Encryption and key
management
Web access
management
Translation security
Content management
Secure storage
Media security
Media encryption
Compliance
Consulting Services
Security Policy Development: Information Security Policy
forms the basis for an organization's entire information
security program.
This service develops and establishes appropriate polices
that are aligned with the objectives of an overall information
Service Overview
Service Overview
Summary
Let the experts in security consulting assist you in moving
your security posture to the next level and gain a sustainable
competitive advantage. The RSA Security Practice of EMC
Consulting is a global leader, offering comprehensive
services that are tailored to your specific requirement.
www.rsa.com
EMC, RSA, RSA Security and the RSA logo are registered trademarks or
trademarks EMC Corporation in the U.S. and/or other countries. All other
trademarks mentioned herein are the properties of their respective owners.
SC SOV 0510
About RSA
RSA, The Security Division of EMC, is the expert in
information-centric security, enabling the protection of
information throughout its lifecycle. RSA enables
customers to cost-effectively secure critical information
assets and online identities wherever they live and at
every step of the way, and manage security information
and events to ease the burden of compliance.
For more information, please visit www.RSA.com and
www.EMC.com.