Define and manage your organization’s security architecture and processesBook a Demo
What is Security Architecture?
Security architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible.
Watch the Security Architecture Video
In the last decade security has become important than processes, technologies or even applications. Poor security means results can fail to external threats and data might be leaked. Indeed, security architecture helps manage all information assets for easier governance and safe operations.
Security defines boundaries that architects should not breach or take into consideration when developing new solutions or choosing a new vendor. Ultimately, extended enterprise architecture is not possible without assessing the risks of outsourcing work and what controls can be put in place to achieve efficient management of these ventures.
- Preconfigured solutions with SABSA, COBIT and ISO
- Flexible metamodel that adapts iServer’s environment to any security architecture requirements
- Portal for communicating governance procedures, security policies, and risk catalogs to anyone in the organization
- Workflow notifications for changes in the Architecture Repository
- Shared repository for connecting processes, technologies, applications with risks and controls
- Publish reports in Word, Excel, PowerPoint or PDF and share them instantly
The iServer repository provides a flexible structure for storing and sharing all EA related information. It provides a number of key features for security architecture, including role-based permission for creating, deleting and modifying any content. Furthermore, it includes the ability to generate catalogs and matrices with specific filters at any time.
Architects are able to reuse existing information when modelling Visio or need to generate reports for interested stakeholders. The repository also enables information to be exported in Excel, Word and PDF for governance reviews.
Risk and Control Inventories
Catalogue all risks and control with the iServer View functionality. Detailed filters can be applied to determine which controls are being used for different risks and how they are applied. This information can be reused in Visio to graphically communicate this to the wider enterprise audience via Portal.
Security guidelines can be developed through Word templates and updated automatically through the iServer Live Document functionality.
Guidelines will be available for everyone to read or export via the Portal and can be linked to specific solutions, projects, and even applications for better governance.
Context diagrams are high level descriptions of the current operational flow of an organization. Adding a security layer at this stage provides great value to stakeholders in understanding the critical areas of the enterprise. The entire inventory can be modelled in Visio or reused in existing context diagrams to speed up the process.
Architects can subsequently publish Visio diagrams or use reporting services to generate Word, PPT, or PDF outputs for the organization.
What our Customers are saying
All our goals are reachable with iServer, but the platform dependencies is a small pain
For preparations, we got a clear list of requirements. Orbus send us a consultant for implementation and configuration, which was experienced in what she was doing, and if we asked for some more difficult things there was a network behind which could answer fast all questions.
Enterprise Architect in the Media Sector - read the full review
Seeing is believing
Take a demo to see how we can transform how your enterprise operates