Sixteen Companies Earn CompTIA Security Trustmark
<strong>Oakbrook Terrace, Ill. </strong><br />CompTIA, a trade association for the world’s information technology (IT) industry, announced that 16 technology service and solution provider companies have attained the <a href="http://www.comptia.org/sections/trustmark" target="_blank">CompTIA Security Trustmark</a>. <br /> <br />The CompTIA Security Trustmark validates that the companies use the security processes identified by the IT industry as generally accepted best practices.<br /> <br />“The complexity of the security landscape is leading many organizations to question whether they have the in-house capabilities to handle that complexity. But they are often uncertain about the qualifications of service providers, particularly when it comes to security,” said Todd Thibodeaux, president and chief executive officer at CompTIA. <br /> <br />“The CompTIA Security Trustmark is the standard of quality for information security,” Thibodeaux added. “Companies that attain this accreditation adhere to our industry’s highest standards for security practices and processes.” <br /> <br />Companies earning the CompTIA Security Trustmark include:<br /> <br /><ul><li>AHR Consulting, Oakland, N.J. </li><li>Alvaka Networks, Irvine, Calif.</li><li>Black Box Computer Consulting, Ithaca, N.Y.</li><li>Cat-Tec, Markham, Ontario, Canada</li><li>Computer Transition Services, Lubbock, Texas</li><li>Jenaly Technology Group, Portsmouth, N.H. </li><li>MSPSN, Omaha, Neb. </li><li>Network Management Group Inc., Hutchinson, Kan. </li><li>Preferred IT Group, Columbia City, Ind. </li><li>Ron Cook's Connecting Point Technology Center, Las Vegas, Nev. </li><li>Secure My Company, Encino, Calif. </li><li>TeamLogicIT, Mission Viejo, Calif.</li><li>Technology Specialists, Fort Wayne, Ind.</li><li>tekjet LLC, Denver, Colo.</li><li>Vernon Technology Solutions, Markham, Ontario, Canada</li><li>Vital Signs Technology, San Ramon, Calif.</li></ul> <br />To attain the CompTIA Security Trustmark, companies are independently audited by IT security experts to assess their security policies, capabilities, practices and processes in areas such as business continuity planning; access management; incident management; personnel security; security awareness and training; data protection; technical infrastructure; partner management; physical and environmental security; compliance; and service delivery. <br />
Viewed 6829 times.