Digital information security is a management issue with global business implications. To succeed in today's network economy requires more than simply a focus on IT issues - it also requires a focus on security strategy and management. The associated risks of business today need to be clearly understood and managed in order to make the most of your opportunities. This requires a global perspective, industry and business insight and a deep technical knowledge of security products and solutions.
Our services include:
- Informaiton Security Management System (BS7799/ISO17799)
- Business Continuity Management
Ordinary recovery plans focus on data backup and system recovery with less consideration of the supporting resources. We at Deloitte are committed to addressing risks to your business by ensuring that key business activities can continue at an acceptable level even if key business processes or resources become unavailable.
- IT Service Management System (BS15000/ITIL)
Our methodology evolves from our extensive experience in delivering high-quality IT services for all kinds of IT environments. We embody best practices as defined by the IT Infrastructure Library (ITIL) to develop a BS15000-compliant management framework with strong maintenance features.
- Digital Asset Management and Due Diligence
As industries evolve into technology-driven businesses, many companies are reaching a critical pain threshold to control and manage their vast amounts of digital media assets. We have developed a risk-based approach and methodology to help in the many facets of digital asset management.
- Data Privacy
It is estimated that more than half of any company’s intellectual capital, financial and employee data, is in digital format. We at Deloitte can assist you in creating a comprehensive approach to data privacy in conjunction with rules and regulations of leading countries while using our global framework to deliver our services.
- IT Risk Assessment
IT Risk Assessment encompasses the identification of current risks and controls as well as enhancement of current controls with the help of best practices. In delivering this service, we make use of Deloitte’s global best practices database and our proven methodologies and tools, This service helps to enhance current processes and mitigate major IT risks.
- IT Project Risk Management
Information Technology is not only about computers, software or services. IT is a combination of these elements, capped by a vision of how technology can help an organization reach its goals, IT Project Security Risk Management includes the following services:
2.Security assessment and analysis
3.Security relief development
4.Security update testing and resource testing
5.Security mandates and countermeasure implementation
6.Implementation, sign-off process, and document management
- Computer Forensics and Fraud Detection
Our integrated best practices methodology ensure that we deliver best-quality assistance to corporations in fraud risk assessment by identifying and correcting those areas showing the greatest risk.
- Identity Management
Managing access to vital information in today’s business environment has never been more dynamic or critical. However, with the need to provide this increased accessibility to information comes increased risk exposure form both internal and external sources. An identity management solution helps you understand who your customers, employees and other stakeholders are and how they gain appropriate access to resources – from your office, their office, via network, Internet or telephone. It enables control over access to information, applications, processes and other resources.
Our identity management solution, i-MAAP (identity – Management, Authentication, Authorization, Protection ) is a comprehensive framework for achieving the integration of disparate user IDs into your existing applications, security solutions and network architecture. This framework can provide significant benefits at any level of implementation because it is flexible, and component-based, and designed to meet your specific needs.
- Identity Authentication
It enables you to use a single source validation to identify all users across any platform or Wed-based application. By ensuring that the process occurs in a central location, consistent and stringent models can be applied, enhancing security.
- Identity Authorization
These services enable the enterprise to establish enterprise-wide role-based access controls, depending on business roles and job requirements. It allows for the application of policies, standards or regulatory compliance to maintain access rights. It enables more timely maintenance of access rights, while decreasing the amount of time for the administration of user data.
- Identity Protection
Through this service, we can assess the adequacy of your infrastructure and you in creating the layers of protection needed to get the full security benefits of an i-MAAP solution. The objective is to create a secure identity solution from the authoritative source to entitlement. This is achieved through focusing on the Internet, network, hardware, and application/software.