Security Management

We help manage a wide range of security activities and provide a dynamic and pragmatic approach to ensure that the confidentiality, integrity, and availability of technologies and information assets of your organisation are protected in line with the legal / risk management requirements and best practices.

We offer expert advice and practical implementation of information security processes and tools based on extensive experience planning, implementing secure architecture and ongoing 24/7 support for business-critical solutions.


Our services covers:

  • Risk assessments.
  • Architecture designs and reviews.
  • Design and implement security controls, e.g., Identity and Access Management, anti-malware protection, logging and monitoring, hardening etc.
  • Operational management of security tools.
  • Application, infrastructure, containers, serverless, endpoint security configuration.
  • Secure VDI / Remote workspaces management.
  • Cloud security management.
  • Business continuity and disaster recovery planning and testing (BCP and DR).
  • Vulnerability and penetration testing.

A number of projects that we've done recently with our clients:

Architecture review of fintech solution.

"As-is" and "to-be" review of financial decision services.

Solution includes:

  • Multiple cloud-based services
  • User provisioning flows
  • Application services and API's
  • Business continuity and Disaster recovery readines
  • Logging and monitoring activities

Risk assessment for a leading cloud print organisation

Organisational-wide and specific solutions reviews.

Service includes:

  • Regulatory assessment and risk frameworks
  • Risk acceptance criteria definition
  • Identification of service critical systems and processes
  • Risk assessments
  • Reporting

Zero Trust architectural review.

Strategic review of an organisational readines and action plan.

Service includes:

  • Review of an organisation's systems architecture
  • Policy definition
  • Identities and endpoint management
  • Threat management
  • Traffic/network segmentation

Penetration testing for an educational organisation.

Quarterly testing of production environment.

Service includes:

  • Cloud based solution vulnerability scan
  • Enumeration of available systems and services
  • Manual testing of exposed services and API's
  • Exploitation of identified vulnerabilities
  • Reporting and walk-through session to educate client's team with regards findings and suggested mitigation controls

Security architecture design for CRM for an energy supplier.

Design of fault tolerant CRM solution.

Solution includes:

  • Business requirements gathering
  • Compliance with requirements from OFGEM regulator, as well as GDPR and PCI regulations
  • Single Sign On (SSO) and multiple system interfaces integration
  • Data migration
  • Capacity and performance benchmark

Security architecture solutions for a mentoring startup.

Design and implementation of a multi-tenant security architecture solutions.

Service includes:

  • Review of business objectives and product offering
  • Threat modeling
  • Development of automated security testing and mitigation controls
  • Test, QA, Staging and Production environments automated deployment and destruction
  • Fully automated creation of new customer's environments

Secure remote desktop deployment for a call centre in gaming.

Design, test and implement 6 different pipelines, standardising deployment processes across the company.

Solution includes:

  • A fully managed remote desktop (VDI) solution in a cloud
  • Active Directory with MFA and group policies enforcement
  • Firewall and content filtering
  • Cloud telephony
  • Solution documentation and training

Deployment of end point protection to a hotel chain devices.

Migration of about 700 end points to McAfee ePo with enterprise protections suite.

Solution stack includes:

  • Creation of upgraded infrastructure
  • Configuration, testing and tuning of protection policies
  • Deployment process creation and testing
  • Staged deployment, full environment documentation and hand over to a support team

Multi-cloud SOC deployment for a financial startup.

Design, configuration and support for multi-cloud SOC solution.

Services includes:

  • Risk assessment and service criticality definition
  • Application and infrastructure logging configuration
  • Centralised monitoring and alerting solution
  • Development of SOC playbooks for new services on-boarding, vulnerabilities detection and remediation
  • Managed detection and response

Would you like to talk about security management? Contact us.