Menu
.: Risk Management & Advisory


.: Audits & Assessments

.: Security Testing

.: Incident Response & Forensics

.: Enterprise Security & Policy




Services  
technology consulting information security
   
mobile innovation managed solutions

Enterprise Security

New services must be integrated into the corporate services strategy to operate effectively, while protecting internal assets and be facilitated by governing policies and procedures.

Secure Enterprise Architecture Objectives:

  • Provide availability, integrity, maintainability and security
  • Develop and implement security policies and operational procedures based on People, Processes and Technology
  • Prevent access to resources by unauthorized parties
  • Permit access to resources by authorized parties
  • Provide centralized, policy-based system management
  • Provide monitoring, alerting, and logging of system and security events
  • Integrate with other elements of the enterprise and security infrastructure

A Secure Enterprise Architecture provides the foundation and cornerstone of an efficient, reliable and supportable network systems enterprise.

It encompasses all components in an organization's network. The architecture and its implementation protects and ensures the integrity of internal systems and services while providing supportable and safe access to the internet and business partners. The Firewall, DMZ, VPNs, IDS and associated information security policies and operational procedures define this protection and access, while integrating network services throughout the organization.

As part of the enterprise network, organizations connecting to the internet, wireless and mobile must implement safeguards to secure themselves from unauthorized network intrusions and protect proprietary information. We work with organizations to assess, design and implement security structures and network architectures that reflect the parameters of required information security and network functionality.

Netrus takes a pragmatic approach and considers the existing business, risk identification, mitigation and management, cultural and implementation requirements.

Policies, Procedures, Standards and Guidelines

Policies, procedures, standards and guidelines provide the foundation and set the baseline standards that must be adhered to by management, staff and contractors within an organization. Without a set of governing standards for technology, its implementation and uses, can cause inappropriate use of business assets and resources, resulting in lost revenues and productivity.

We work with our clients to design a complete set of policies, procedures and guidelines for their enterprise network, Internet, Portal, eServices, Web, Mobile, Wireless, Cloud and VoIP solutions and information security requirements that integrate into their existing infrastructure. We take a pragmatic approach and consider the existing business, cultural and implementation requirements.

Information Classification and Privacy

The classification of information assets within an organization allows organizations to make critical decisions surrounding the level of protection that each category will require - business critical, confidential, top secret, internal or public. A stronger security architecture would need to be implemented for information that may impact share price, brand image or customer privacy. Whether it is a transaction system or new privacy legislation, Netrus works with their clients to ensure that their electronic information assets are identified, and adequately protected.

Information Security Program Implementation

We specialize in assisting organizations to achieve and sustain an optimum level of information security within their businesses - which is user friendly, easy to implement, non-intrusive to business operations and cost effective.

When designing an information security organization, program and its implementation, we focus on People, Processes and Technology. We work with our clients to assess their organizational requirements, develop a comprehensive implementation plan and provide expert interim resources to stop gaps as the organization grows.