Define and manage your organization’s security architecture and processes
The iServer repository provides a central location where the SABSA security framework and methodology can be applied to manage the development and implementation of a robust security architecture. With iServer, security architects can manage large volumes of security-related data and information, while also keeping track of its maturity, in a single secure environment.
The iServer central repository provides organizations with the capability to manage large volumes of security-related data and information, including all enterprise architecture, business process, and security information, in a single central location. The increasing number and scope of regulatory requirements can be managed effectively through the repository, to ensure alignment between business objectives, compliance with regulatory requirements, improvement processes, and the ability to respond to security incident alerts. Security architecture patterns can be defined and implemented across the landscape within the repository. Read more about iServer’s central architecture repository and see how it can benefit you.
iServer’s information security dashboard provides a way to track the progress over time across the security architecture and processes. iServer’s IT Portfolio Management capabilities enable the organization to have an integrated reporting, analysis and decision making capability for security-related activities. Live security information can be viewed to support IT investment decisions across all domains, and performance can be measured against specific strategic objectives. iServer consolidates and centralizes enterprise security information integrated within a central repository, increasing accuracy and ensuring templates are updated.
The iServer repository provides a central location where the SABSA (Sherwood Applied Business Security Architecture) security framework and methodology can be applied to manage the development and implementation of a robust security architecture. SABSA in iServer covers every architecture domain (business, data, application, and technology) and every abstraction layer (contextual, conceptual, logical, physical, and implementation).
SABSA in iServer is aligned and structured according to the TOGAF ADM. This means security artifacts can be categorized and managed using the ADM structure in iServer. SABSA in iServer contains models and framework in the repository, including SABSA Security Domain Framework, SABSA Governance Framework, and SABSA Taxonomy of High Level General Business Attributes. All templates are customizable and reusable. New SABSA-based deliverables can be created in the repository and implemented according to the TOGAF Architecture Development Method (ADM).
Security artifacts, such as the Security Risk Catalog, Business Risk Model, Security Organization Model, catalogs and views are easily generated in iServer. These can then be published on the organization’s intranet via iServer Portal and iServer HTML Publisher to be viewed by relevant stakeholders.
Find your iServer Solution
See how the iServer can deliver on your business strategy and meaningful business change with a free demonstration with a trained consultant.Book Now
If you have any questions or want to find out more about iServer solutions, get in touch and we will answer any queries you have.Get in touch
Microsoft®, Visio® and Office® are all registered trademarks of Microsoft Corporation. The Open Group®, ArchiMate®, TOGAF® are registered trademarks of The Open Group. IT4IT™ is a trademark of The Open Group. ITIL® and PRINCE® are registered trademarks of AXELOS Limited. The Swirl Logo™ is a trade mark of AXELOS Limited. Copyright © AXELOS Limited 2016 All rights reserved. Material is reproduced under license from AXELOS. COBIT® is a registered trademark of ISACA and the IT Governance Institute, and material is reproduced under license from ISACA.