Main Page

From The Secure Arc Wiki

(Difference between revisions)
Jump to: navigation, search
(Highlighted our experience with IDM design more on the front page. Included a better summary of our 'value add' and included deeper links into the specific areas of the ref arc.)
(Just restructured and cleaned up a bit)
Line 1: Line 1:
[[Image:ZoneModel.png|400px|right]]
[[Image:ZoneModel.png|400px|right]]
-
Secure Arc offer Security Architecture consulting services primarily in the Identity Management (IDM) and J2EE space for large enterprises, typically in the finance and telecommunication markets. These services span the entire software development life-cycle, including [[The_Secure_Arc_Methodology|methodology,]] infrastructure and software design, deployment guidance and software development.
+
Secure Arc offer Security Architecture [[Consulting_Services|consulting services]] primarily in the Identity Management (IDM) and J2EE space for large enterprises. These services span the entire software development life-cycle, including [[The_Secure_Arc_Methodology|methodology,]] infrastructure and software design, deployment guidance and software development.
-
All stages involve some form of [[Information_Asset_Classification|Information Asset Classification,]] [[Threat_Model|Threat Modeling]] and [[Architectural_Decisions|Risk Assessment.]]
+
All stages can involve some form of [[Information_Asset_Classification|Information Asset Classification,]] [[Threat_Model|Threat Modeling]] and [[Architectural_Decisions|Risk Assessment.]]
-
Secure Arc have significant experience with large scale, customer facing critical systems. With our repeatable and adaptable [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given solution are clearly identified and mitigated where practical.
+
With our repeatable and adaptable [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given system are clearly identified and mitigated where practical. Our [[Logical_Security_Zone_Pattern|Trust Model]] has been adopted as the enterprise wide network security architecture for the entire organisation at one of our clients.
-
This Reference Architecture is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations spanning security system vendors and large financial institutions. Our [[Logical_Security_Zone_Pattern|Trust Model]] has been adopted as the enterprise wide security architecture at some of our clients after being successfully introduced on an initial project.
+
This [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations.

Revision as of 03:55, 19 August 2008

Secure Arc offer Security Architecture consulting services primarily in the Identity Management (IDM) and J2EE space for large enterprises. These services span the entire software development life-cycle, including methodology, infrastructure and software design, deployment guidance and software development.

All stages can involve some form of Information Asset Classification, Threat Modeling and Risk Assessment.

With our repeatable and adaptable Security Reference Architecture we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given system are clearly identified and mitigated where practical. Our Trust Model has been adopted as the enterprise wide network security architecture for the entire organisation at one of our clients.

This Security Reference Architecture is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations.

Personal tools