Services - Overview

By: Axenic  06-Dec-2011
Keywords: Risk Management, Information Security, Security Architecture

Services - Overview

Risk Management

Risk Management can assist you to understand the value of your information assets and the consequences to your business should they be compromised, enabling you make informed decisions on how to protect them.

Security Architecture

Having a defined enterprise security architecture and standard platform for system deployment can eliminate most of the security debate when deploying a new application, or connecting a new office, into your environment.

IS Governance

Governance ensures that your information security management practices enable you to meet you business’ strategic goals and compliance obligations. Mature and cost effective practices can only be achieved when supported by good governance.

Keywords: Information Security, Risk Management, Security Architecture

Contact Axenic

Email - none provided

Print this page

Other products and services from Axenic


Services - Risk Management

We believe that the risk profile and appetite of any organisation is unique, so our risk assessment methodology, based on New Zealand Standard AS/NZS ISO 31000, focuses on assessing and prioritising risks within your business context. We understand that effective risk management provides organisations with a high degree of confidence that their risk exposures are being identified and properly managed.


Services - Controls Audit

Information system controls audits identify configuration and management weaknesses that can expose an organisation to unnecessary risks.


Services - Security Architecture

Our methodology enables us to help clients define and understand their business security requirements to ensure that their security architecture and roadmap meet those requirements. We design cost-effective security solutions that provide the appropriate technical controls to meet the organisations strategic or tactical goals.


Services - IS Governance

We can map the findings to your preferred information security framework and can assist in development and implementation of information security governance frameworks. We assess the maturity of your information security governance processes and procedures to ensure they fully support your organisation’s strategy and policy.


Services - Security Policy

We have extensive experience in developing information security policies that clearly articulate management’s strategy to ensure that it is communicated and consistently applied across the organisation thus establishing and developing an information security culture. Our methodology is based on international standards and frameworks including ISO 27001/27002 and CoBIT 4.1.


Services - IS Strategy

Our approach to security strategy after establishing the business context is to define control objectives, identify and assess controls that meet those objectives, select appropriate controls and establish measures to assess their effectiveness. It is essential to align the information security strategy with the overarching business strategy to ensure the organisation’s business objectives are fully supported.