Case Studies

Security architects for business transformation program, one of the worlds largest CRM and SAP billing implementations. Responsible for Initial risk assessment, infrastructure controls framework and risk remediation work-streams. Scope and security design of meta-directory and single sign-on technical solutions providing subject matter expertise to primary contractors personnel.

Program management, end-to-end architecture and contractual definition of significant enterprise firewall implementation including the generation of the firewall rules. Utilised virtual firewalls and high capacity chassis based system to provide infrastructure risk reduction by retrofitting security into the existing live business systems with minimal disruption. Program value in excess of five million delivered under budget.

Security design authority for 26,000 user desktop and infrastructure refresh programme. Responsible for controls and risk mitigation strategy, security design and implementation team and negotiation of security controls with senior business stakeholders.

Our understanding of the security reseller channel enabled us to structure the commercial aspects of a large security infrastructure programme to be results and outcome driven. Achieved significant savings (circa 55%) off benchmarked costs for similar scale programs.

Conception, business case, design and implementation management of secure desktop, messaging and mobile solution for top 200 directors and supporting personnel for a FTSE 250 company. Procured, designed and delivered in eight weeks including handover into clients operational support teams.

Design and implementation of secure collaboration and working environment for confidential information based on virtualised and client-less access. Our client had a specific requirement for a portable, secure and functional collaboration platform consisting of Terminal Server based MS Exchange, MS Office and MS SharePoint served over a client-less VPN gateway.

Defined and delivered for a global client an approach and risk treatment strategy to addresses infrastructure platform weaknesses in live business systems by providing zoned security architecture.