Portfolio Masonry Boxed

eLearning

RITZ offers engaging, interactive eLearning courses that cover a range of security topics including security awareness, compliance, secure coding and application development.

Our eLearning courses simplify your training initiatives, providing a cost-effective, easy-to-use solution that helps you meet compliance, maximize data security and ensure training best practices are in place.

Accessible

eLearning courses enable just-in-time learning anywhere, on any device.

Engaging

Designed by education and instructional professionals to be informative and fun.

Industry Leading

Our courses are recognized in Gartner’s Magic Quadrant for security awareness computer-based training.

 

Professional Development

Excellence requires expertise and education to transform dreams into realities. RITZ has the knowledge and know-how to help you advance your career or learn a new skill. Explore our professional development options today.

Prepare

Stay ahead of the game with qualified professional development training.

Educate

Our knowledgeable experts provide the quality instruction you’re looking for.

Advance

Professional certifications can help you take your career to the next level.

 

Security Awareness Training

RITZ provides training services that address the technical and human elements of your organization to ensure you’re operating in a secure environment. Our range of course topics help you meet compliance, maximize data security, manage vendor technologies and incorporate industry best practices. With instructor-led and computer-based options, it is easy and cost effective to learn anytime, anywhere.

Aware

Employees aware of the risks are less likely to commit security policy violations.

Protected

Providing training to your employees helps your organization stay protected.

Secure

Security awareness education should be a lynchpin of your comprehensive security effort.

 

Application Security

Web, email and mobile applications are increasingly targets of attack, making it necessary to advance your defenses beyond network and endpoint protection. Organizations should also address concerns arising from lack of visibility, poor application performance and limited application availability. We can assist your organization with these challenges by reviewing application policy, procedures and architecture, and design to identify immediate technical vulnerabilities. We can also evaluate and help optimize your non-technical controls that can impact security over time.

Expertise

With expert consultants for web, email and application security solutions, we have the skills to efficiently handle your needs.

Experience

With more than 30 application security certifications held by staff, we stay current on the latest techniques, technologies and approaches.

Insight

With more than 150 completed projects in 2014, our team has the insight to effectively solve your security problems and provide unprecedented value.

 

Security intelligence

In today’s world, breaches will succeed and the adversary is highly skilled in avoiding detection. The question is not “if,” but “when” an incident will occur. As IT complexity increases, skilled security analysts become harder to attract, keep and train. To address these advancing issues, we provide a wide range of security intelligence services and solutions to keep you protected, whether you’re concerned about meeting compliance requirements, internal and external threat management, or early breach detection.

Expertise

With more than 30 consultants dedicated to security intelligence solutions, we have the skills and expertise to efficiently handle your needs.

Experience

With various industry and technology certifications held by staff, we stay current on the latest techniques, technologies and approaches.

Insight

With more than 150 completed projects in 2014, our team has the insight to effectively solve your security intelligence problems and provide unprecedented value.

 

End Point Security

Enterprises support a wide range of endpoint devices including PCs, tablets and mobile phones that are both corporate- and employee-owned. Securing these devices can be incredibly difficult as they can be the target of malicious attacks and are also susceptible to unintentional information sharing, misuse and user error. We help you identify your endpoint security gaps and find the right combination of services and technologies to remediate those vulnerabilities.

Expertise

With more than 20 consultants dedicated to endpoint security solutions, we have the skills and expertise to efficiently handle your needs.

Experience

With more than 50 endpoint security certifications held by staff, we stay current on the latest techniques, technologies and approaches.

Insight

With more than 100 completed projects in 2014, our team has the insight to effectively solve your endpoint security problems and provide unprecedented value.