iTechSolv - Security is a Process, Not a Product iTechSolv - Security is a Process, Not a Product


    Services & Solutions > iTechSolv’s iDefense Security Methodology




iTechSolv encompasses six-phase approach to information system security - structured for your success:


1.        Prepare

         Policy Review and Assessment

         Network Architecture Design Assessment


2.        Discover

         Identify & Prioritize Information Asset ( tangible and non-tangible )

         Identify Owner and / or Custodian


3.        Assess


3.1 Vulnerability Assessment

         Identify and characterized vulnerability

         look for exploitable situations created by lack of adequate security

         Vulnerability vs. Risk ( confidentiality, integrity and/or availability )

3.2 Intrusion / Penetration Testing


4.       Identify & Prioritize


         Threat Identification

         Identify intention & capabilities of threat

         Identify threat history

         Prioritize security issues in the way that makes the most sense to the business

         Asset Value to Business Needs


5.       Mitigate & Eliminate Root Cause


         Creates a security roadmap which clearly represents the risks

         Implement risk management strategies to reduce those risks.

         Reducing the exposure through security countermeasures ( People,Process,and Technology )


6.       Monitor and Measure


         Continuous process risk profile

         Develop risk-aware concept that understand, validate and implement safeguard

         Continuous monitor for policy violation




© Copyright 2005-2008 iTechSolv Sdn. Bhd. All rights reserved.