Professional Documents
Culture Documents
Your challenges
Challenges
5 Optimize costs
Reduce OPEX of provided security
services
Select the most benefit ratio
TCO/quality related to IT security
architecture
Raise
awareness
Implementation
& Maintenance
1 Your objectives
Keep up to date with current worldwide security breaches
Have an overview of IT security solution evolving trends
Raise knowledge on how to develop an information security policy
strategy based on ISO 27001 international standard
2 Our method
3 Benefits
Assessment
Design
Our solutions
Raise
awareness
Implementation
& Maintenance
Assessment
1 Your objectives
Verify that sensitive services are not vulnerable to a security risk that could allow
unauthorized access to resource
Continuously identify vulnerabilities
Evaluate your current IT configuration & design security
Assess the effectiveness of your current information security management
Determine your compliance with ISO 27001 standards
Our solutions
2 Our method
Technical environment audit using tools by:
Assessing the vulnerability of the internet facing service(s) through network vulnerability
scanning
Ensuring penetration tests
Auditing the security level of applications and critical services
Evaluate your compliance with ISO27001 reference frameworks by
Understanding your processes, procedures and organizations
Interviewing employees departments
Assessing strenghts and weaknesses of the organization in accordance with reference
frameworks
3 Benefits
Design
Raise
awareness
Implementation
& Maintenance
Assessment
Design
1 Your objectives
Plan your IT security architecture strategy
Choose the best technical security solution (i.e. IPS/FW) in accordance with your
requirements
Design effective ISMS in order to protect information by ensuring confidentiality, integrity
and availability
Our solutions
2 Our method
3 Benefits
Get a high secured architecture design based on best practices
Have a clear vision of the architecture security development phasing aligned with IT Governance
and business requirements
Verification of real performances of technical security solution independently from vendor
Own a proven ISMS design methodology
1 Your objectives
Our solutions
2 Our method
We provide you high skill staff which efficiently
supports you within IT security management.
Raise
awareness
Assessment
3 Benefits
Implementation
& Maintenance
Design
1 Oranges challenges
2 Our method
Ensure a SOC for the whole organizations IT environment
Analyze business security expectations (including SLA requirements)
Design a complex security management strategy and roadmap
Build, implement and manage processes, procedures and organization
Choose and implement the right technology (SIEM - Security Information and Event
Management and support tools)
Ensure risks management by continuous monitoring
Tomasz Matua,
Manager of IT Infrastructure & ITN Security
Orange Polska
Guarantee high availability for critical business applications which ensure revenues
Provide a quick incident detection and response capabilities
Protect against cyber attacks which become more frequent and sophisticated
Manage a huge number of security notifications
Monitor distributed environments security
Business and IT processes complexity
Our successes
3 Benefits
Proactive support with real time 24/7/365 security monitoring and management
Improve detection time of security threats, risks and vulnerabilities
Quick security issues fixing by highly specialized team
Clear vision of security dashboard for critical business services
Post-incident analysis and increase know-how competencies
Prospective
Business
Consulting
IT solutions
Networks
& Services
Unique expertise
A global view of your challenges
45 years of experience
Our customers