top of page

Resourcing

WHO THEY ARE

RESOURCES ALLOCATION

Our consulting services are provided by security enterprise architects who will assist your organisation with the planning, development, implementation and operational phases.

 

CloudSecConsulting understands your organisation's security program is structured in three major phases: Architecture and Planning, Development and Implementation Program Management, and finally Operations and Services Management.

 

Resources assigned to projects will remain during the project lifetime, but their allocation load will be relative to the program phase. For instance, security architecture skills will be heavily used during the Architecture and Planning phases when compared to the Operations program phase.

 

We have developed several services associated with the three program phases as listed above. The full and detailed list of services per phase is provided by request together with our formal quotes. See below some of the services included in our portfolio.

CloudSecConsulting security consulting services are always provided following our delivery methodology which includes four distinct milestones and related deliverables as listed below. 

PLANNING

Planning begins in response to a problem or opportunity. Planning addresses security and business issues including the need to replace security architecture components, solve problems, enhance the network security and management practices, or implement changes to the security management operations model.

To begin the planning function, our consultants first evaluate the security environment and define project requirements. Mapping out project goals, our consultants then identify the business and technology solutions, and the business case then initiates the engagement.

 

DEVELOPMENT

Development begins by outlining tasks required to specify and test a solution to a client's need. Our consultants create high-level and detailed design specifications, formulating test strategies and plans, and conducting user acceptance testing. The design components are initiated by first defining and evaluating high-level design. Once the initial assessment is completed, consultants develop, document and create a model for the detailed design. Using this model, the design and deployment strategies are tested for effectiveness before they are applied to the client's case.

Please reload

IMPLEMENTATION

Implementation begins by creating implementation and certification strategies and plans for the client's project, and scheduling changes to the production environment. A particular focus of the implementation function is implementing new security architectural technical and operational capabilities, with minimal disruption of the client's normal business operations. Once the initial procedures are set, the project commences. Information transfer is provided to the client's staff and administrative personnel, simultaneously as the final capability solution is transferred over to the client's internal operations department.

OPERATION

The operation is the daily process of managing security services capabilities, infrastructure and internal operations. The operation function supports tasks and management disciplines, for example:

  • security configuration

  • change management

  • problem management

  • performance management

  • assurance management.

 Our consultants assist organisations in assessing performance and effectiveness based on service levels, availability and resource performance.

Please reload

bottom of page