Services provide secure hosting and consulting.

Press Release Summary:



Information Security and Risk Management Services help users assess, plan, architect, implement, and operate secure environments. They include Single-Sign On, Auditing, and Access Controls; Vulnerability and Patch Management; Incident Response and Forensics Services; and Managed Security Services. Risk and Vulnerability Assessments assist enterprises with regulatory and privacy compliance, while Identity Management Services ensure enterprises maintain complete control over user access.



Original Press Release:



USi Launches Information Security and Risk Management Practice



Leveraging Experience Managing Security for Millions of Users to Meet Increasing Market Demand for Managed and Consulting Security Services

ANNAPOLIS, Md., March 8 / -- USinternetworking, Inc. (USi), a premier provider of Software-as-a-Service (SaaS), today announced the launch of its Information Security and Risk Management Practice. USi already provides secure hosting services to more than 150 clients and millions of end- users within client organizations. Now, USi is expanding its offerings to provide secured hosting and consulting services beyond its own data centers and client infrastructure.

"USi has built its reputation by delivering secure, reliable, integrated and continuously-supported services to our clients. We live and breathe security 24/7," says Curtis Hampshire, USi, General Manager, eBusiness. "Today -- more than ever -- responsible executives understand the true importance of security to their organizations. USi's Information Security and Risk Management Practice provides visibility into business, technical and operational risk so managers can make informed decisions and cost effective investments in information security and mitigation efforts."

By leveraging the combination of deep security and privacy expertise with world-class, secure data center operations, USi enables enterprises to defend against a variety of emerging threats to information security. These include organized hacking and phishing attacks; ongoing proliferation of worms and viruses; targeted attacks on wireless networks and the increasing legal liability companies must take on for data protection.

Gartner's Hype Cycle for Information Security, 2005, (by Vic Wheatman, et al., 5 July 2005) details many of the considerations enterprises face when considering security technologies and investments. "Choosing and maintaining security technologies continue to be top priorities for enterprise executives and managers. Those same managers are under more pressure than ever to show business value and cost-effectiveness for security measures. Security spending is being driven by a variety of concerns, all of them pressing. Aside from the age-old need to 'keep the bad guys out' and 'let the good guys in,' compliance with new government regulations, such as the Sarbanes-Oxley Act, are now playing a significant role in security spending decisions. Furthermore, hackers continue to invent new ways to break into enterprise files and steal valuable data. Private individuals are also under increased threat of cybertheft, with schemes such as "phishing" putting more pressure on financial service providers to protect customers' personal information."

USi's Information Security and Risk Management Services include a multitude of offerings such as: Risk and Vulnerability Assessments to assist enterprises with regulatory and privacy compliance; Identity Management Services to ensure enterprises maintain complete control over user access; Single-Sign On (SSO), Auditing and Access Controls; Vulnerability and Patch Management; Incident Response and Forensics Services and Managed Security Services delivered in partnership with Counterpane Internet Security to help enterprises increase protection for critical assets with the benefit of a reduced, predictable cost model.

Enterprises taking advantage of USi's security solutions facilitate their own compliance with data privacy legislation, including Health Insurance Portability and Accountability Act (HIPAA), Sarbanes Oxley, Gramm-Leach-Bliley Act (GLBA) and Children's Online Privacy Protection Act (COPPA), European EC Directive and Safe Harbor among others. "By leveraging our experienced information security staff and technology, we can meet our clients' regulatory requirements and let them focus on core business and not maintenance tasks," adds Hampshire.

USi's services include assessing, planning, architecting, implementing and operating secure environments, which evolve based on the client's business needs. Clients gain the ability to detect attacks and suspicious activity in real time; watch more points across the network and destination targets; enjoy real-time correlation and response and gain immediate ROI.

About USi
USi...Demand More! (TM)
USi, the largest independent Application Service Provider (ASP), delivers application outsourcing, remote management, professional services, ISV enablement, eBusiness development and hosting, and information security and risk management services to more than 150 world-class organizations in over 30 countries. USi's clients have access to a broad, diversified portfolio of service offerings, including Ariba(R); Demandware(R); Microsoft(R); Oracle(R); PeopleSoft(R) and Siebel(R), as well as eCommerce solutions developed and delivered by USi. USi's TopLineISV program gives Independent Software Vendors (ISVs) the immediate advantage of Software-as-a-Service (SaaS) by delivering their software to a larger client base through USi's hosted model. For more information, visit www.usi.net.

NOTE: "USi" and the block logo "USi" are the registered trademarks of and the same entity as USinternetworking, Inc.

CONTACT: Karen Wentworth of USi(R), +1-410-897-4495, or karen.wentworth@usi.net

All Topics