Richard Fleischman & Associates Unveils Mobile Device Management Offering
April 23, 2012
By Rajani Baburajan
, TMCnet Contributor
Mobile device management (MDM) solutions allow organizations to grow their enterprise mobility environment securely, while simultaneously meeting compliance requirements. MDM helps to significantly reduce the cost and complexity associated with managing a wide variety of mobile devices including smartphones, tablets and wireless devices.
To rake in profits from the growing opportunity in the mobile device management space, Richard Fleischman & Associates (RFA), a provider of information technology (IT) solutions for financial services companies, launched its own mobile device management offering.
Offered as part of RFA’s Security Suite, the mobile device management solution complements the other four products already in the company’s portfolio, which offer comprehensive data protection from internal and external threats.
Some of the vital components of RFA's Security Suite include Managed Security Service, Intrusion (News - Alert) Detection, Data Access Auditing and Email Encryption.
"With the entry of consumer-grade smartphones, tablets and other devices in the workplace, employees increasingly access both personal and business information over a single mobile device,” said Richard Fleischman, president and founder of RFA, in a statement.
“This presents serious security and compliance issues, particularly for hedge funds and other alternative asset managers as we approach registration deadlines," Fleischman added. "With the addition of best-in-class MDM tools, we can now provide our clients with seamless mobile integration and the control required for today's highly-regulated marketplace."
The company assists enterprises in powering a highly scalable and flexible network monitoring solution that adapts to changing enterprise threats and meets ongoing requirements to ensure network security.
The managed security service collects and correlates event data from a variety of sources including network devices, systems, software, and filtering tools, as well as Windows, Unix and Linux servers and workstations, while the intrusion detection solution offers protection against malware and other common types of attacks. In addition, data access auditing provides IT with security auditing to reduce corporate risk and ensure compliance with regulatory requirements and email encryption prevents unauthorized access to confidential information.
Edited by Jamie Epstein