Welcome!

@CloudExpo Authors: Pat Romanski, Liz McMillan, Elizabeth White, Roger Strukhoff, Philippe Abdoulaye

News Feed Item

CONZebra Rolls Out BYOD Risk Assessment Service for Organizations

New Service Delivers a Baseline That Provides Organizations With a Foundation That Enables Them to Establish a Common Set of Procedures to Create a BYOD Policy

KUALA LUMPUR, MALAYSIA -- (Marketwire) -- 02/20/13 -- CONdition Zebra, Inc. (aka "CONZebra") (www.conzebra.com), a provider of risk management and critical infrastructure security solutions, today announced its Bring Your Own Device Baseline Policy (BYOD-BP) (www.conzebra.com/policy-and-grc-consulting), a risk assessment service for organizations who want to develop and implement a successful comprehensive BYOD usage policy to protect their business critical data and assets.

"CONZebra recognizes the popularity of the BYOD movement but also understands it introduces an element of risk to organizations through the possibility that data security could be compromised, which could severely damage a brand," said CONZebra President and CEO, Drew Williams. "CONZebra is dedicated to providing organizations with the risk assessment services they need to establish, implement and manage a successful corporate BYOD policy to protect their reputation and the integrity of their assets."

Today many enterprises allow personal devices to connect to the enterprise network. CIOs like this trend because it reduces the cost of hardware, empowers the employee, improves productivity and responsiveness as well as increases employee satisfaction. However, this also introduces a non-standard environment to the mission critical IT infrastructure, plays havoc with the technology roadmap, impacts support and has the potential to expose organization to increased security threats.

CONZebra's BYOD-BP Service Offering
CONZebra's new BYOD Baseline Policy service addresses data theft, malware, wireless exploits, and provides proprietary data loss monitoring and access management. BYOD-BP, based on the COBIT framework, is designed to help organizations create a common set of procedures that form a foundation for establishing a corporate BYOD policy. CONZebra will work closely with an organization to:

  • Evaluate Each Operation: Organizations need to take inventory of their critical infrastructure and documents that are vital to business decisions and then determine their risk exposure levels. In addition organizations need to take a physical inventory of their devices.
  • Map Everything: Every organization needs a map to identify responsible pathways to reduce exposure to risky business practices. In addition it is important to define virtualization parameters for operation to make sure these align with your map and to create a key to identify key applications for BYOD access.
  • Develop a BYOD Policy: Once a baseline is determined an organization needs to create a corporate BYOD policy that includes acceptable usage policies.
  • Implement it: Once ethical user guidelines have been established they need to be applied.
  • Conduct Audits: Once a quarter an inventory of critical infrastructure needs to be conducted and reviewed as well as the policy to make sure it is still appropriate.

Availability
CONZebra's BYOD-BP risk management service is available now for a flat fee. Please contact [email protected] for additional details.

CONZebra is headquartered in the United States (Utah), with its APAC headquarters located outside Kuala Lumpur, Malaysia; additional offices are being opened in Australia, Taiwan and Thailand.

About CONZebra
CONZebra provides risk management and critical infrastructure security solutions that reduce risk to manageable and resolvable levels, and which focus on international and industry-specific compliance standards and frameworks. The company's strategy of combining key technologies with exclusive expertise in policy development and critical infrastructure services help mitigate operational, legal and financial threats to organizations, creating a safe harbor from which our clients can manage risk as part of their daily operations. For more information, visit www.conzebra.com.

Contact:
Christina Guilbert Klaubert
aMate Communications
001-781-759-0017
Email Contact

Ven Ping
CONZebra
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
So you’ve heard how click-to-call widgets can really enhance a website’s potential for customer interaction and you want to try it out for yourself. Or you’re considering offloading pieces of your VoIP infrastructure, but want to see how that would unfold first. Where can you find this technology, that’s free and available to try out? Spotting the potential in a space where customers can experiment with these types of features, Voxbone is launching The Workshop.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficie...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...