Archives: Services

Threat Hunter

Threat Hunter

Threat hunting, also known as cyberthreat hunting, is a proactive approach to identifying previously unknown, or ongoing non-remediated threats, within an organization’s network.

Read More
Incident Responder

Incident Responder

Incident Responders could be considered the police officers or fire fighters for an organization’s network or system.

Read More
Secure Architecture TOGAF & SABSA

Secure Architecture TOGAF & SABSA

Secure Architecture based on TOGAF & SABSA

Read More
Compliance

Compliance

Is a process of developing a software system that implements a business process in such a way that its ability to meet specific compliance requirements is ascertained. Formal methods are typically involved to automate compliance rule verification. Learn more in: Integrating Compliance Management in Service-Driven Computing: Conceptual Models and Automation Architecture

Read More