Information Security

Information Security Consulting Service Overview

It presents an information security system that prevents leakage of technical and management information and enables knowledge activities that are the basis of corporate competitiveness. Based on the rich experience of security consultants who have experience in information security under various management environment conditions, the company's management environment is built. It provides differentiated information security consulting services such as realistic and systematic security systems considered and deployment methodologies.

Key Strategy for Information Security Consulting
  • Information Security
    Master Plan Establishment

    Information security master plan establishment support consulting services are provided through environmental analysis, vulnerability analysis, and risk factor evaluation of customers. Assess current information security levels, define an enterprise security To Be model appropriate for the customer environment, and differentiate accordingly. We support the establishment of a master plan for the information security system and its implementation.

  • Technical information security
    Measures established

    Consulting to support the establishment of technical information security measures analyzes security vulnerabilities in the structure and setting of information assets, Assess the level of technical security through process-specific vulnerability analysis and internal and external simulation hacking. Support one-stop services to help you establish and deploy technical security measures

  • Establishing strategies for building information technology security control systems

    Information technology control system establishment support consulting is a consulting service that supports the risk management and control system establishment of information technology resources within a company.
    This enables customers to build a systematic and effective risk management system for information technology, which enables business continuity and stability, and
    Maximize reliability

  • Information security level management support

    Information security level management continues to manage and narrow the security gap between policies in the security management area and current security levels. It is one of the mid- to long-term work areas to do, and regular vulnerability checks and level diagnosis, which are areas that absolutely require the help of professional personnel, It is a service that provides services such as education, audit, and intrusion response to customers as a stable adaptation and economically.

  • Information security management system construction/certification support

    Information security management system that can systematically establish/manage/operate an information security management system and improve/secure external image and reliability Systematic preparation for obtaining BS7799/ISO17799 certification, the Global Standard of (ISMS) can be carried out. It's a service that helps you to do that.

information security Architecture
Administrative Security Technical Security Physical Security
CEO/CIO Administrative Security Strategy/Vision
Security Architecture Principles
Security Policy Description
Technical security strategy/vision
Technology Adaptation Principles
Physical Security Strategy/Vision
Principles of Application of Facilities and Equipment
Manager Administrative Security Concept Definitions
Security management plan
Security Guidelines/Security Procedures
Security Audit and Assessment Report
Technical Security Concept Definitions
Security Technical Definitions
Technical Security Implementation Plan
Physical Security Concept Definitions
Physical Security Implementation Plan
Architect Management Security Rescue Description
Administrative Security Model Definitions
Security Management Model
Technical Security Rescue Technical Guide
Technical Security Model Definitions
Security Technology Model
Physical Security Architecture Description
Physical Security Model Definitions
Secure Environment Model
Developer Information Security Management System
Security Operations Model
Administrative Security checklist
Development Security Framework
Security Quality Management Framework
System/Network Management Model
Technical security checklist
Facility and Equipment Installation Model
Physical Access Control Model
Physical Access Control Model
Physical Security checklist