Three services offered individually or as part of a end to end engagement.

Analysis

If you would like to understand how robust your organisation’s cyber security is we can evaluate your current capabilities and provide you with a….

  • Summary of organisational data sensitivity, utilisation & flows​

  • Review of current technical and procedural security measures in place​

  • Summary of potential risks and weaknesses of the current cyber security​

  • Recommendation of options of solutions to improve organisational security​ that match your budget

Design

If you have a cyber security solution or capability that you would like in your organisation to improve your security, we can work with you to…

  • Define the the specific requirements and use cases for the solution/capability within your organisation

  • Translate these business requirements into effective technical designs

  • Establish architect patterns for the solution, leveraging existing systems and infrastructure

  • Provide a roadmap for solution maturity

  • Work with any delivery teams present in your organisation to ensure alignment to the design and your requirements.

Implementation

If you have a cyber security solution but need some assistance getting it up and running then we can manage the activities required for a successful implementation including…

  • Manage the delivery of the solution into production

  • Supply expertise and resources required for technical work​

  • Coordinate with existing IT teams to ensure alignment, mitigate dependencies and remove constraints

  • Remapping of information & access management processes​

  • Upskill / train any operational teams or users

  • Provide full visibility of the progress of the implementation​