Not too long ago, it was the network perimeter which got much of the attention. Whilst this is of course still an absolute necessity, the perimeter has now moved and it is important to focus on, and be ready for that. The ‘perimeter’ exists wherever, or more accurately at whoever the user is.
Users also expect to be able to work, wherever they need to, on a plethora of different devices and operating systems. It is great that today’s technology allows for this extra productivity, but it does of course come with security concerns.
With that being said, security should first and foremost always align with business goals and should be implemented in a way which does not counteract the additional productivity gained from mobile and modern ways of working. Sgurity aligns with this way of thinking.
We have many years experience securing and managing end user devices in many different environments and industries and hold various qualifications such as Certified Information Systems Security Professional (CISSP), and Microsoft Certified Solution Expert (MCSE).