Information Security
It presents an information security system that prevents leakage of technical and management information and enables knowledge activities that are the basis of corporate competitiveness. Based on the rich experience of security consultants who have experience in information security under various management environment conditions, the company's management environment is built. It provides differentiated information security consulting services such as realistic and systematic security systems considered and deployment methodologies.
-
Information Security
Master Plan EstablishmentInformation security master plan establishment support consulting services are provided through environmental analysis, vulnerability analysis, and risk factor evaluation of customers. Assess current information security levels, define an enterprise security To Be model appropriate for the customer environment, and differentiate accordingly. We support the establishment of a master plan for the information security system and its implementation.
-
Technical information security
Measures establishedConsulting to support the establishment of technical information security measures analyzes security vulnerabilities in the structure and setting of information assets, Assess the level of technical security through process-specific vulnerability analysis and internal and external simulation hacking. Support one-stop services to help you establish and deploy technical security measures
-
Establishing strategies for building information technology security control systems
Information technology control system establishment support consulting is a consulting service that supports the risk management and control system establishment of information technology resources within a company.
This enables customers to build a systematic and effective risk management system for information technology, which enables business continuity and stability, and
Maximize reliability -
Information security level management support
Information security level management continues to manage and narrow the security gap between policies in the security management area and current security levels. It is one of the mid- to long-term work areas to do, and regular vulnerability checks and level diagnosis, which are areas that absolutely require the help of professional personnel, It is a service that provides services such as education, audit, and intrusion response to customers as a stable adaptation and economically.
-
Information security management system construction/certification support
Information security management system that can systematically establish/manage/operate an information security management system and improve/secure external image and reliability Systematic preparation for obtaining BS7799/ISO17799 certification, the Global Standard of (ISMS) can be carried out. It's a service that helps you to do that.
Administrative Security | Technical Security | Physical Security | |
---|---|---|---|
CEO/CIO | Administrative Security Strategy/Vision Security Architecture Principles Security Policy Description |
Technical security strategy/vision Technology Adaptation Principles |
Physical Security Strategy/Vision Principles of Application of Facilities and Equipment |
Manager | Administrative Security Concept Definitions Security management plan Security Guidelines/Security Procedures Security Audit and Assessment Report |
Technical Security Concept Definitions Security Technical Definitions Technical Security Implementation Plan |
Physical Security Concept Definitions Physical Security Implementation Plan |
Architect | Management Security Rescue Description Administrative Security Model Definitions Security Management Model |
Technical Security Rescue Technical Guide Technical Security Model Definitions Security Technology Model |
Physical Security Architecture Description Physical Security Model Definitions Secure Environment Model |
Developer | Information Security Management System Security Operations Model Administrative Security checklist |
Development Security Framework Security Quality Management Framework System/Network Management Model Technical security checklist |
Facility and Equipment Installation Model Physical Access Control Model Physical Access Control Model Physical Security checklist |