Modern Architecture

STAY AHEAD OF YOUR SECURITY RISK

The way our review process works

On the Phone

Scoping

Step 1

We have a quick chat to understand the type of review you need.  We gauge together the scope, where we address the architecture, attack surface and business critical assets involved.  We articulate how you gain value from this gap analysis

Brainstorming

Planning

Step 2

We decide together on logistics, work span and time tables

In a Meeting

Kickoff

Step 3

We have a kickoff meeting where we finalise timelines, participants and prerequisites for success

Man Working at Desk

Review

Step 4

We undertake the review based on systems, processes, interviews and tools used

Documents and Blurred Business Men

Reporting

Step 5

We compile a report addressing recommended framework and security posture, risk rating, common practices and proposed remedies based on levels of criticality

Business Meeting

Executive report

Step 6

We include an executive report that explains the necessity for recommended action

Similing Team

Ongoing support

Step 7

Once completed, we will still be here to advise and guide you through implementation of any remedies