Your architecture must support your business needs yet also provide adequate separation of systems and data flows for your confidentiality, integrity and availability requirements. We will start by understanding your organization's business, and its needs, to set the context. Then we will review your existing architecture for deviations from government or industry zoning standards, or alternatively, we can architect your network and zones from the ground up.
The review of your architecture does not stop there. We also review the configurations of your firewalls, routers, proxy servers and other border control devices to ensure they support your business and security needs. We will also assess the security policies applied to your servers within your zones to ensure that proper segrgation is enforced even at that level. Our server configuration reviews will compare your images against industry best practices and propose steps to mitigate the gaps, yet maintaining business functionality.