Description
Using adapted solutions to guarantee security during data exchange and storage
Requirements
- Implementing solutions for pragmatically and effectively dealing with governance and compliance
- Defining indicators and measures in order to prove security coverage and the value of investments
Services
- Security dashboard
- Conceptual security architecture
- State-of-the-art technologies and security products
- Implementation of the ISO 27002 standard
- Recommendations for solutions
- Support in implementing solutions
- Design of technical security architecture
Types of missions performed for clients
1. Management review of high privilege accounts (code review, account review, etc.)
2. Design review
3. Architecture analysis of Internet access points
4. Security architecture review
5. Information system security