Consulting Operation Products & Solutions USP Leistungsübersicht Web Access Management Web Application Firewall Authentication-Proxy Single Sign On USP Secure Entry Server Suite Network Access Control Network Access Control 802.1x and MAC Authentication Dynamic VLAN Assignent BYOD / MDM USP Network Authentication System Managed Security Services Encrypted Site-to-Site VPNs Firewall Protection Secure Remote Access USP Enterprise Network Services IT Security Projects Identity IAM & Access Management Web Application Security Network && Infrastructure Security Mobile Security Cloud Security Project Management Project Experience Methodology Seite 2
IT Security Consulting & Projects unser Team Ihre Kompetenz + 80 weitere USP Spezialisten Seite 3
Project Experience, Methodology, Skills Strategy & Policy Process & Organisation Architecture & Technology Implementation Leistungsübersicht Identity & Access Management Web Application Security Network & Infrastructure Security Mobile Security Cloud Security Seite 4
Unsere Stärken Ihr Nutzen
Unsere Stärken Ihr Nutzen Was Kunden an USP schätzen: Expertenwissen. Durch die Spezialisierung von USP profitieren unsere Kunden von Wissen auf Expertenniveau, welches wir nachhaltig auf dem neuesten Stand halten. Methodenkompetenz. Unsere Dienstleistungen erbringen wir nach anerkannten Methoden, jedoch immer abgestimmt auf die individuellen Anforderungen der Unternehmen. Kundenfokus. USP Consulting orientiert sich an Kundenbedürfnissen, umsetzbaren Lösungen und rasch erzielbarem Nutzen. Branchenerfahrung. Kunden profitieren von unserer Praxiserfahrung in verschiedenen Branchen und kommen durch unsere erprobte Vorgehensweise sicher zum Ziel. Kontinuität. Weil IT Security Vertrauenssache ist, lebt USP mit ihren Kunden nachhaltige und langfristige Beziehungen. Seite 6
Leistungsbeschreibung
Project Experience, Methodology, Skills Identity & Access Management Strategy & Policy Process & Organisation Architecture & Technology Implementation Identity & Access Management IAM strategy (e.g. in general, for the extended enterprise) IAM gap analysis (using United Security Providers IAM framework) IAM roadmap (e.g. fields of action, quick wins, implementation steps) IAM policies (e.g. guidelines, principles, responsibilities) Requirements engineering Roles concept (e.g. business and system roles) Identity administration process analysis and (re)engineering Identity and privilege management concept Identity administration workflow modeling System architecture Solution design Architecture review Proof of concepts IAM product and vendor evaluation Detailed technical specification Implementation and customization (i.e. synchronization, workflow, gui) Integration consulting for other environments (i.e. SAP, MS ADS, other apps) Development of synchronization integration adapters Seite 8
Project Experience, Methodology, Skills Web Application Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Web Application Security Web Application Security Policy Legal Compliance Business-aligned Security & Availability B2B/B2C Portal Security Application Development Guidelines User Authorization & Roles User Self Service Reverse Proxy Architecture Authentication Enforcement Web Single Sign-On Security Audits und Reviews Federation & Cross- Domain SSO USP Secure Entry Server Access Infrastructure Konsolidierung Seite 9
Project Experience, Methodology, Skills Network and Infrastructure Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Network and Infrastructure Security Security Policies Network Security Policy Security Compliance IT Security management Network (Security) Management Change Management Security Enforcement Security Architecture Network Zoning Perimeter/Datacenter Zoning USP Network Authentication System Perimeter Security Services Security Standards Security Awareness Programs information security and data protection (ISDS) Information Security Management System ISMS Business Continuity Management BCM Hardening Guidelines Network Security Architecture (e.g. IPS, FW, NAC) Content Security Concept (e.g. Proxy, Antivir) Remote Access Architecture (e.g. VPN, VDI, DA) Security Audits and Reviews Migration to Network Zones Seite 10
Project Experience, Methodology, Skills Mobile Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Mobile Security Mobile Security Strategy Bring Your Own Device Strategy Analysis of 5 Dimensions (User, Device, Access, Service, Policy) Use Case Defintion User Policies Technical Policies User directives Management of certificates Integration Architecture Network Access Control Architecture Mobile Device and App Management Architecture Application Access and -Security USP Secure Entry Server USP Network Authentication System Captive Portal Integration of Mobile Device Management WLAN Architecture Seite 11
Project Experience, Methodology, Skills Cloud Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Cloud Security Cloud Computing Strategy Cloud Security Governance IAM in the Cloud (SecaaS) Cloud Audit Cloud Security Policy Cloud Security Risk Management Web Security (Secaas) Mail Security (Secaas) Onboarding Testing Cloud Security Trainings Cloud Security Compliance Application Security Cut Over Information Mgmt and Data Security Validating Cloud Architectures Cloud Transformation Cloud Provider / Services Evaluation Workload Assessment Seite 12
Ihr nächster Schritt Wollen auch Sie in Ihren Vorhaben weiter kommen? Kontaktieren Sie uns, wir meistern die Herausforderungen mit Ihnen! Marcel Neiger, Head of Business Unit Fon +41 31 959 02 38 E-Mail marcel.neiger@u-s-p.ch Riccardo Pileggi Sales Manager Fon +41 31 959 02 41 E-Mail riccardo.pileggi@u-s-p.ch Seite 13