In order for security efforts to be truly effective, they need to be part of your organisation’s DNA
In order for security efforts to be truly effective, they need to be part of your organisation’s DNA.
In terms of information and cyber security, this means designing security measures into the underlying systems architecture.
By building your systems architecture to be secure from the ground up, you’ll enjoy ‘defence in depth’, where an external threat may get past one roadblock, only to be faced by another, and another.
At Stratigence we offer cyber security architecture services in a number of different areas, and are able to review current platforms and advise on improvements, or establish a new platform from the ground up.
In terms of information and cyber security, this means designing security measures into the underlying systems architecture.
By building your systems architecture to be secure from the ground up, you’ll enjoy ‘defence in depth’, where an external threat may get past one roadblock, only to be faced by another, and another.
At Stratigence we offer cyber security architecture services in a number of different areas, and are able to review current platforms and advise on improvements, or establish a new platform from the ground up.
Solutions Architecture
Whether focusing on a single system, or taking in your entire IT portfolio, we can work with you to ensure all cyber security concerns are addressed across your technology stack. We can:
-
- Define/review network deployment models
- Identify security zones within the architecture
- Harden servers (enhance server security)
- Review firewall configurations
- Design high-availability architectures
- Leverage network appliances
Security Principles
System design and management is so much easier when you have a firm set of rules to follow. By establishing a set of architectural security principles, systems design decision-making becomes far more efficient and effective, and security will be built into your underlying architecture.
At Stratigence we can either provide examples of common principles, or build a set around the needs of your organisation. We can also ensure that they align with the trust principles of SSAE 16 SOC 2 reports.
Architecture Patterns
General, reusable solutions to commonly occurring problems, architectural patterns form the base of your technology architecture. Employing the right patterns can ensure that you automatically apply industry best practices that will guard against risks and threats. By building these patterns into your architecture, you’ll reduce your reliance on external security measures, thereby reducing costs.
At Stratigence we can advise on the use of architectural patterns, giving your organisation security from the ground up.
Systems Integration
By integrating systems or applications, you’re instantly adding an additional attack vector and increasing the surface area of your organisation that is vulnerable to attack. The key to minimising your vulnerabilities lies in authentication, authorisation, channel encryption and integration architecture development.
At Stratigence we can advise on authentication, authorisation and channel encryption design, and develop or enhance integration architecture for:
-
-
- Web services
- REST-based APIs
- Specialised integration protocols (inc. HL7 and FHIR)
- Data integration through ETL
- Legacy file transfer solutions
-
Penetration testing will further highlight any potential vulnerabilities that each integrated system or app might have.
Cloud Services
Cloud technology is becoming an essential service for modern New Zealand businesses. At Stratigence we can offer expert guidance on all things cloud, including:
-
-
- Securely operating hybrid on-premise/cloud architecture
- Securing sensitive data in the cloud, whether at rest or in transit
- Ensuring cloud-based alignment with the trust principles of SSAE 16 SOC 2 reports
- Reviewing cyberattack countermeasures of potential SAAS solutions
-
Mobile Solutions
Just as the cloud is an essential tool for a modern organisation, so too is mobile tech. But between the risk of a device being lost or otherwise compromised and a reliance on external/open networks, they do present an organisation with additional security concerns.
At Stratigence we can:
-
-
- Design or advise on mobile security policies
- Ensure that BYOD policies do not place company data/services at risk
- Employ mobile app container solutions to ensure devices securely hold business data
- Pen test mobile applications
-