FPG Technologies Harps on Business Agility
FPG Technologies and Solutions Limited, one of the Nigeria’s foremost information technology (IT) company known for providing mobile, cloud and IT security solutions, along-side its partners, Check Point Software Technologies Limited, has stressed the need for business agility and confidence at every level of business.
Both companies gave the advise at a recently held IT Connect event organised by FPG Technologies in Abuja.
The event focused on the government sector and IT decision makers and stakeholders across various governments parastatals and agencies in Abuja. The IT Connect event theme was ‘Delivering Extreme Business Agility with Confidence’.
Check Point’s security Consultant, Raphael Adaka, emphasised the importance of organisations investing in mobile threat defence solutions in today’s business environment, using mobile devices as a business requirement and an employee expectation. “Most companies allow personal devices to connect to corporate networks. Employees use these devices to download personal apps and email – these pose security challenges and expose business networks to phishing scams and malware infections. One compromised device can let cyber criminals steal sensitive information, or even spy on closed-door meetings using device microphones or cameras. Breaches are detrimental to organisations and corrode brand reputation and competitive advantage. Remediation is costly and some loss may be irreversible,” the security companies said. According to CEO of FPG Technologies and Solutions Limited, Rex Mafiana, the design allows for more comprehensive protection from known and unknown threats, and shifts resource-intensive analysis to the cloud to minimise any impact on user experience and device performance.
“Organisations are also adopting techniques such as encryption and digital signing—or shifting from software-based encryption and digital signing to high assurance hardwarebased solutions.
Cryptography protects data effectively only if keys are secure and well managed. Cryptographic keys are a critical component of an organization’s ability to protect data from malicious attack while ensuring that the data is ready for use when needed.