Enterprise Information Security
Enterprise information security architecture is becoming a common practice within the financial institutions around the globe. The primary purpose of creating an enterprise information security architecture is to ensure that business strategy and IT security are aligned. As such, enterprise information security architecture allows traceability from the business strategy down to the underlying technology.
The practice of enterprise information security architecture involves developing an architecture security framework to describe a series of "current", "intermediate" and "target" reference architectures and applying them to align programs of change. These frameworks detail the organizations, roles, entities and relationships that exist or should exist to perform a set of business processes.
A strong enterprise information security architecture process helps to answer basic questions like:
- What is the information security risk posture of the organization?
- Is the current architecture supporting and adding value to the security of the organization?
- How might a security architecture be modified so that it adds more value to the organization?
- Based on what we know about what the organization wants to accomplish in the future, will the current security architecture support or hinder that?
Having documented the organization's strategy and structure, the architecture process then flows down into the discrete information technology components such as:
- Organization charts, activities, and process flows of how the IT Organization operates
- Organization cycles, periods and timing
- Suppliers of technology hardware, software, and services
- Applications and software inventories and diagrams
- Interfaces between applications - that is: events, messages and data flows
- Intranet, Extranet, Internet, eCommerce, EDI links with parties within and outside of the organization
- Data classifications, Databases and supporting data models
- Hardware, platforms, hosting: servers, network components and security devices and where they are kept
- Local and wide area networks, Internet connectivity diagrams
Order Enterprise Information Security Now...
Our ClientsTestimonials
Very smart people working on the project - they provided great insight and brought experience to the project.
Managing Directorhttp://www.nicer.co.za
Our income nearly doubled in one year. This made self-promotion easier for my clients
Chief Operational Officerhttp://www.mpsecurity.co.za
A great customer experience! The flexability and speed of response from the account manager, as well as the quality of the reports and reporting was exceptional
Bussiness Support Officerhttp://www.ohsam.co.za
Subscribe to Newsletter/Promo/Notification
Our Fulfilment Info
We have an established relationship with open source forums and open source frameworks, and will be able to take advantage of all discounts and promotions in order to keep our margins at roughly 49% throughout the operation.