SlideShare a Scribd company logo
2
Most read
3
Most read
© RapidValue Solutions 
Mobile Device Management Strategy & Mobile Security Strategy
Mobile Device Management Strategy (MDM) 
•MDM strategy creates a holistic view in managing devices and applications used by the enterprise that will allow IT teams to extend their ‘wired’ security strategy and policies to all devices, wherever they happen to be. 
•The strategy will be directed to employ user-defined ‘rules’ mapped to specific policies that cost-effectively automate vital management and control tasks such as device configuration, asset management, software updates, backup/restore. 
•Using Mobile Iron MDM solution, RapidValue will wrap mobile applications with the desired agents of MDM to support the below set of features through strong governance. 
Over-the-air (OTA) Configuration 
Troubleshooting & Reporting 
Monitoring and Alerts 
Integration Management 
Internal App Store 
Remote Software Distribution and Updates 
Blacklist / Whitelist Applications 
Manage Applications through Enterprise App Store (App Restore / Version Control) 
MDM 
MAM
Mobile Device Management Strategy (MDM) 
•Defining Strong IT policies – Define and enforce policies in a granular, flexible way – e.g. apply different policies to different users and groups, according to their needs. Create mobile-specific policies that clearly define, among other things: 
oHow the device will be deployed? 
oWhat data will be accessible by mobile workers? 
oWho can do what on company networks? 
oWhat procedures will be implemented in the event of device loss or theft? 
•Asset and Inventory Management – With either approach of ‘BYOD’ or ‘company-owned mobile device program’ asset management is critical for IT teams to manage the devices and prevent any security threat to the data in mobile applications. Through effective MDM profiling, RapidValue targets to segment and categorize the following: 
oIdentify make and model of mobile devices, the operating system, version, and firmware release being used – for mobile devices, feature phones, smartphones, and tablet computers. 
oSegmenting by job function, mobility requirements, geographic location, device type/class or any other criteria. 
oManage and track devices remotely through location services or Over the Air (OTA) configuration. 
•Configuration Management – Remote setup and configuration of mobile devices is an essential element of MDM for IT teams to manage access into applications and connection parameters. 
oEnabling/disabling hardware capabilities such as GPS, camera, or Bluetooth or new application download. 
oSecurely access and manage enterprise documents residing in a variety of content repositories, including SharePoint, email, messaging, and web browsing (proxy information).
Mobile Security Strategy 
•Unlike personal laptops, mobile devices present a significant security risk for many organizations unless they are secured and managed. 
•Since these devices/apps hold sensitive corporate data they should be as secure as information stored behind the firewall on the corporate network. 
•To mitigate this risk, RapidValue will enable IT staff to control all aspects of mobile device security . 
•This includes the ability to mandate passwords for mobile device users, encrypt data stores, and erase data from mobile devices remotely. 
Malware Protection 
Jailbreak Detection 
Tunnel Gateway 
Password Policies 
Support VPN 
Data Encryption (On-Device & OTA) 
Remote Wipe 
Inventory of Application downloads
Mobile Security Strategy 
Key considerations for a mobile security strategy are: 
•Authentication - Mobile device authentication and mandatory passwords are the easiest, most effective IT policies to enforce. 
•Remote Locking/Wiping - Important mobile security element is the ability to remotely lock and/or wipe a mobile device that has been lost or stolen 
•Encryption - File level, application level, or even full disk encryption can protect sensitive data in the event of a lost or stolen mobile device. 
•Virus and other Malware Protection - Malware threatens information confidentiality, endangers system passwords, and increases the risk of data loss or compromise.
© RapidValue Solutions 
About RapidValue 
RapidValue is a leading provider of end-to-end mobility solutions to enterprises worldwide. Armed with a large team of experts in mobility consulting and application development, along with experience delivering global projects, we offer a range of mobility services across various industry verticals. RapidValue delivers its services to the world’s top brands and Fortune 1000 companies, and has offices in the United States and India. 
www.rapidvaluesolutions.com 
www.rapidvaluesolutions.com/blog 
+1 877.690.4844 
contactus@rapidvaluesolutions.com 
This document contains information that is confidential and proprietary to RapidValue Solutions Inc. No part of it may be used, circulated, quoted, or reproduced for distribution outside RapidValue. If you are not the intended recipient of this report, you are hereby notified that the use, circulation, quoting, or reproducing of this report is strictly prohibited and may be unlawful. 
Disclaimer: 
6

More Related Content

PPTX
Mobile device management and byod – major players
Waterstons Ltd
 
PDF
Mobile Device Management (MDM)
Network Intelligence India
 
PPTX
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
PPTX
Pros and Cons of Mobile Device Management
Xperteks
 
PDF
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
PPT
Mobile Device Management
John Rhoton
 
PPTX
Enterprise Mobile Device Management (MDM)
SPEC INDIA
 
PDF
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Mobile device management and byod – major players
Waterstons Ltd
 
Mobile Device Management (MDM)
Network Intelligence India
 
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
Pros and Cons of Mobile Device Management
Xperteks
 
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
Mobile Device Management
John Rhoton
 
Enterprise Mobile Device Management (MDM)
SPEC INDIA
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 

What's hot (20)

PPTX
MDM - airwatch
Bharat Sinha
 
PDF
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
PDF
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
PDF
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
PDF
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
PDF
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
PDF
Mobile Device Management for Dummies
Sybase Türkiye
 
PPTX
EPC Group Intune Practice and Capabilities Overview
EPC Group
 
PDF
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
PPTX
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
PDF
Citrix MDX Technologies Feature Brief
Nuno Alves
 
PDF
Securing Office 365
Symantec
 
PDF
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
PDF
Windows Intune webinar
Sentri
 
PPTX
Enterprise Mobility+Security Overview
Chris Genazzio
 
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
PPTX
A Non-Salesy Intro to the Ivanti Porfolio
Ivanti
 
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
PDF
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
PPTX
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
MDM - airwatch
Bharat Sinha
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
Mobile Device Management for Dummies
Sybase Türkiye
 
EPC Group Intune Practice and Capabilities Overview
EPC Group
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
Citrix MDX Technologies Feature Brief
Nuno Alves
 
Securing Office 365
Symantec
 
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Windows Intune webinar
Sentri
 
Enterprise Mobility+Security Overview
Chris Genazzio
 
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
A Non-Salesy Intro to the Ivanti Porfolio
Ivanti
 
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
Ad

Viewers also liked (17)

PPT
MDM : Mobile Device management
Monika Sinha
 
PDF
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
☁ ☁ Gautam T ☁☁
 
PPTX
Factors for City Transformation
Iram Aziz
 
PPTX
10 Benefits of Mobile Device Managment
MTG IT Professionals
 
PPTX
Startit Meetup #12 - Spark.me
Startit
 
PDF
ITIL V3 and Service Operation - ITSM Academy Webinar
ITSM Academy, Inc.
 
PPT
21st century skills
dsharpcasio
 
PPTX
Mobile device management presentation
ratneshsinghparihar
 
PPT
Green technology
richanema22
 
PDF
MDM- Mobile Device Management
Bala G
 
DOCX
Negative impacts of social media as my space and facebook on teenagers in th...
GeorgeDolezal
 
PPTX
The negative impact of social media
Proe24
 
PPTX
copycats
Farah Riaz
 
PPTX
Green technology
Syirah Dim
 
PPTX
Mobile dbms
Tech_MX
 
PPT
Negative impacts of social media
simardeepvath
 
PPTX
Green technology
bhavya5623
 
MDM : Mobile Device management
Monika Sinha
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
☁ ☁ Gautam T ☁☁
 
Factors for City Transformation
Iram Aziz
 
10 Benefits of Mobile Device Managment
MTG IT Professionals
 
Startit Meetup #12 - Spark.me
Startit
 
ITIL V3 and Service Operation - ITSM Academy Webinar
ITSM Academy, Inc.
 
21st century skills
dsharpcasio
 
Mobile device management presentation
ratneshsinghparihar
 
Green technology
richanema22
 
MDM- Mobile Device Management
Bala G
 
Negative impacts of social media as my space and facebook on teenagers in th...
GeorgeDolezal
 
The negative impact of social media
Proe24
 
copycats
Farah Riaz
 
Green technology
Syirah Dim
 
Mobile dbms
Tech_MX
 
Negative impacts of social media
simardeepvath
 
Green technology
bhavya5623
 
Ad

Similar to Mobile Device Management and Mobile Security Strategy - a presentation by RapidValue Solutions (20)

DOC
report on Mobile security
JAYANT RAJURKAR
 
PPTX
MoMobile Device Management (MDM) - Copy.pptx
HassaanSaleem13
 
PPTX
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
Enterprise Mobile
 
PDF
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
PPTX
Managing and securing mobile devices
Softchoice Corporation
 
DOCX
Different Types Of Network Security Devices And Tools.docx
SameerShaik43
 
PDF
[Brochure ] mobi manager mdm_software
Syeful Islam
 
PDF
Samsung SDS IAM & EMM for Healthcare
Samsung SDS America
 
PPTX
R ramya devi cloud computing
PriyadharshiniVS
 
PPTX
Mobile Security for the Enterprise
Will Adams
 
PDF
Mobile Security
James Sutter
 
PPTX
Mobile Phone & Tablet Support
Felix Yanko
 
PDF
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Sierraware
 
PPTX
Why Is Mobile Device Management (MDM) Important.pptx
BluechipComputerSyst
 
PDF
Enterprise App Development_ Securing Your Mobile Workforce with EMM.pdf
Ewenjlin Smith
 
PDF
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
Michael Antinozzi
 
DOCX
Optimize & Protect: Comprehensive Remote Infrastructure Management Services
HEX64
 
PDF
Websense: A 3-step plan for mobile security
arms8586
 
PPTX
A strategic view of mobile device management
Jason Murray
 
PPTX
Enterprise Mobility Management and its Challenges - Phdassistance.com
PhD Assistance
 
report on Mobile security
JAYANT RAJURKAR
 
MoMobile Device Management (MDM) - Copy.pptx
HassaanSaleem13
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
Enterprise Mobile
 
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
Managing and securing mobile devices
Softchoice Corporation
 
Different Types Of Network Security Devices And Tools.docx
SameerShaik43
 
[Brochure ] mobi manager mdm_software
Syeful Islam
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS America
 
R ramya devi cloud computing
PriyadharshiniVS
 
Mobile Security for the Enterprise
Will Adams
 
Mobile Security
James Sutter
 
Mobile Phone & Tablet Support
Felix Yanko
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Sierraware
 
Why Is Mobile Device Management (MDM) Important.pptx
BluechipComputerSyst
 
Enterprise App Development_ Securing Your Mobile Workforce with EMM.pdf
Ewenjlin Smith
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
Michael Antinozzi
 
Optimize & Protect: Comprehensive Remote Infrastructure Management Services
HEX64
 
Websense: A 3-step plan for mobile security
arms8586
 
A strategic view of mobile device management
Jason Murray
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
PhD Assistance
 

More from RapidValue (20)

PDF
How to Build a Micro-Application using Single-Spa
RapidValue
 
PDF
Play with Jenkins Pipeline
RapidValue
 
PDF
Accessibility Testing using Axe
RapidValue
 
PDF
Guide to Generate Extent Report in Kotlin
RapidValue
 
PDF
Automation in Digital Cloud Labs
RapidValue
 
PDF
Microservices Architecture - Top Trends & Key Business Benefits
RapidValue
 
PDF
Uploading Data Using Oracle Web ADI
RapidValue
 
PDF
Appium Automation with Kotlin
RapidValue
 
PDF
Build UI of the Future with React 360
RapidValue
 
PDF
Python Google Cloud Function with CORS
RapidValue
 
PDF
Real-time Automation Result in Slack Channel
RapidValue
 
PDF
Automation Testing with KATALON Cucumber BDD
RapidValue
 
PDF
How to Implement Micro Frontend Architecture using Angular Framework
RapidValue
 
PDF
Video Recording of Selenium Automation Flows
RapidValue
 
PDF
JMeter JMX Script Creation via BlazeMeter
RapidValue
 
PDF
Migration to Extent Report 4
RapidValue
 
PDF
The Definitive Guide to Implementing Shift Left Testing in QA
RapidValue
 
PDF
Data Seeding via Parameterized API Requests
RapidValue
 
PDF
Test Case Creation in Katalon Studio
RapidValue
 
PDF
How to Perform Memory Leak Test Using Valgrind
RapidValue
 
How to Build a Micro-Application using Single-Spa
RapidValue
 
Play with Jenkins Pipeline
RapidValue
 
Accessibility Testing using Axe
RapidValue
 
Guide to Generate Extent Report in Kotlin
RapidValue
 
Automation in Digital Cloud Labs
RapidValue
 
Microservices Architecture - Top Trends & Key Business Benefits
RapidValue
 
Uploading Data Using Oracle Web ADI
RapidValue
 
Appium Automation with Kotlin
RapidValue
 
Build UI of the Future with React 360
RapidValue
 
Python Google Cloud Function with CORS
RapidValue
 
Real-time Automation Result in Slack Channel
RapidValue
 
Automation Testing with KATALON Cucumber BDD
RapidValue
 
How to Implement Micro Frontend Architecture using Angular Framework
RapidValue
 
Video Recording of Selenium Automation Flows
RapidValue
 
JMeter JMX Script Creation via BlazeMeter
RapidValue
 
Migration to Extent Report 4
RapidValue
 
The Definitive Guide to Implementing Shift Left Testing in QA
RapidValue
 
Data Seeding via Parameterized API Requests
RapidValue
 
Test Case Creation in Katalon Studio
RapidValue
 
How to Perform Memory Leak Test Using Valgrind
RapidValue
 

Recently uploaded (20)

PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 

Mobile Device Management and Mobile Security Strategy - a presentation by RapidValue Solutions

  • 1. © RapidValue Solutions Mobile Device Management Strategy & Mobile Security Strategy
  • 2. Mobile Device Management Strategy (MDM) •MDM strategy creates a holistic view in managing devices and applications used by the enterprise that will allow IT teams to extend their ‘wired’ security strategy and policies to all devices, wherever they happen to be. •The strategy will be directed to employ user-defined ‘rules’ mapped to specific policies that cost-effectively automate vital management and control tasks such as device configuration, asset management, software updates, backup/restore. •Using Mobile Iron MDM solution, RapidValue will wrap mobile applications with the desired agents of MDM to support the below set of features through strong governance. Over-the-air (OTA) Configuration Troubleshooting & Reporting Monitoring and Alerts Integration Management Internal App Store Remote Software Distribution and Updates Blacklist / Whitelist Applications Manage Applications through Enterprise App Store (App Restore / Version Control) MDM MAM
  • 3. Mobile Device Management Strategy (MDM) •Defining Strong IT policies – Define and enforce policies in a granular, flexible way – e.g. apply different policies to different users and groups, according to their needs. Create mobile-specific policies that clearly define, among other things: oHow the device will be deployed? oWhat data will be accessible by mobile workers? oWho can do what on company networks? oWhat procedures will be implemented in the event of device loss or theft? •Asset and Inventory Management – With either approach of ‘BYOD’ or ‘company-owned mobile device program’ asset management is critical for IT teams to manage the devices and prevent any security threat to the data in mobile applications. Through effective MDM profiling, RapidValue targets to segment and categorize the following: oIdentify make and model of mobile devices, the operating system, version, and firmware release being used – for mobile devices, feature phones, smartphones, and tablet computers. oSegmenting by job function, mobility requirements, geographic location, device type/class or any other criteria. oManage and track devices remotely through location services or Over the Air (OTA) configuration. •Configuration Management – Remote setup and configuration of mobile devices is an essential element of MDM for IT teams to manage access into applications and connection parameters. oEnabling/disabling hardware capabilities such as GPS, camera, or Bluetooth or new application download. oSecurely access and manage enterprise documents residing in a variety of content repositories, including SharePoint, email, messaging, and web browsing (proxy information).
  • 4. Mobile Security Strategy •Unlike personal laptops, mobile devices present a significant security risk for many organizations unless they are secured and managed. •Since these devices/apps hold sensitive corporate data they should be as secure as information stored behind the firewall on the corporate network. •To mitigate this risk, RapidValue will enable IT staff to control all aspects of mobile device security . •This includes the ability to mandate passwords for mobile device users, encrypt data stores, and erase data from mobile devices remotely. Malware Protection Jailbreak Detection Tunnel Gateway Password Policies Support VPN Data Encryption (On-Device & OTA) Remote Wipe Inventory of Application downloads
  • 5. Mobile Security Strategy Key considerations for a mobile security strategy are: •Authentication - Mobile device authentication and mandatory passwords are the easiest, most effective IT policies to enforce. •Remote Locking/Wiping - Important mobile security element is the ability to remotely lock and/or wipe a mobile device that has been lost or stolen •Encryption - File level, application level, or even full disk encryption can protect sensitive data in the event of a lost or stolen mobile device. •Virus and other Malware Protection - Malware threatens information confidentiality, endangers system passwords, and increases the risk of data loss or compromise.
  • 6. © RapidValue Solutions About RapidValue RapidValue is a leading provider of end-to-end mobility solutions to enterprises worldwide. Armed with a large team of experts in mobility consulting and application development, along with experience delivering global projects, we offer a range of mobility services across various industry verticals. RapidValue delivers its services to the world’s top brands and Fortune 1000 companies, and has offices in the United States and India. www.rapidvaluesolutions.com www.rapidvaluesolutions.com/blog +1 877.690.4844 [email protected] This document contains information that is confidential and proprietary to RapidValue Solutions Inc. No part of it may be used, circulated, quoted, or reproduced for distribution outside RapidValue. If you are not the intended recipient of this report, you are hereby notified that the use, circulation, quoting, or reproducing of this report is strictly prohibited and may be unlawful. Disclaimer: 6