Security

Our team of experts and partner support helps in the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

Some of the services we offer include:

Define conceptual architecture:

  • Governance, policy and domain architecture
  • Operational risk management architecture
  • Information architecture
  • Certificate management architecture
  • Access control architecture
  • Incident response architecture
  • Application security architecture
  • Web services architecture
  • Communication security architecture

Define physical architecture and map with conceptual architecture:

  • Platform security
  • Hardware security
  • Network security
  • Operating system security
  • File security
  • Database security, practices and procedures

Define component architecture and map with physical architecture:

  • Security standards (e.g., US National Institute of Standards and Technology [NIST], ISO)
  • Security products and tools (e.g., antivirus [AV], virtual private network [VPN], firewall, wireless security, vulnerability scanner)
  • Web services security (e.g., HTTP/HTTPS protocol, application program interface [API], web application firewall [WAF])

Define operational architecture:

  • Implementation guides
  • Administrations
  • Configuration/patch management
  • Monitoring
  • Logging
  • Pen testing
  • Access management
  • Change management
  • Forensics.