We speak with security practice manager Lee Foster.
What IT security brands and services do you specialise in?
Insentra has a long-standing relationship with Symantec, offering professional services across Symantec’s entire portfolio. We recognise that our customers need a vendor-neutral trusted adviser, and that’s why Insentra provides a customer-focused security education program.
When did your company first get involved in this area?
Our consultants have many years of experience working in the security space, as well as with Symantec’s software.
What are your security credentials?
Insentra’s consultants are vendor certified and hold either Symantec certified professional or Symantec technical specialist certifications. As we work with companies to develop vendor-neutral security strategies, we have invested in vendor-neutral certifications such as CompTIA’s Security+ and are working towards advanced certifications such as certified advanced security practitioner or certified information systems security professional.
Heard about any cool trends in the security space recently?
The most interesting and exciting security solution is Symantec Gateway Email Encryption (SGEE), which allows for transparent encryption of email entering or leaving the enterprise. The other cool area is that of advanced threat protection against persistent threats.
Can you tell us about a recent security deployment you have done?
Insentra was engaged to assist a large customer protect information transferred to and held on a file server. The solution integrated many of Symantec’s software offerings, such as apps on mobile devices being secured with Symantec Mobility and Linux and Windows servers being encrypted with Symantec Encryption Desktop.
What is driving customers’ security projects?
Customers are recognising that just protecting their perimeter or their endpoints is not enough. CIOs want to protect their organisations from the loss of data and secure confidential information that is leaving the business.
Protecting the business’s information using well-designed policies, user education and the strategic/tactical use of security hardware and software.
As seen in