Security & Governance

Are your IT Governance and Control Frameworks up to scratch?

Based on South African and/or industry specific regulative demands as well as your business and risk specific requirements Brauniger Governance and Control Services  create an IT governance, architecture and control framework that is most applicable to your organisation—with controls picked from best-practice standards such as ISO 27001, CoBIT and ITIL (for IT processes & operations).

Security Architecture

Is your Security Architecture designed to continually evolve with your business?

A reference architecture for your IT organization is a great place to record your strategic IT choices. It facilitates the translation of your objectives into technical decisions. Furthermore, it describes elements of implementation that support those decisions. However, the development of security architecture design faces several challenges, such as the fact that it cannot be a single, static entity but must evolve continuously. Brauniger Security Architecture & Design will ensure your security architecture is modelled in accordance with your business and profit objectives, that it forms an integral part of your wider enterprise planning and strategic efforts, and is based on what is particularly relevant to your field of endeavour.

Business Impact Analysis & Risk Assessment

Do you need a Business Impact Analysis and Risk Assessment?

To ensure you focus on relevant controls Brauniger Business Impact Analysis is designed to provide you with a report on the potential overall effects to your organisation of your most critical IT resources or services. Since the cost of providing redundancy and fault tolerance can be high, it is important to have a very clear vision on the inter-dependencies of your organisation’s critical resources and assets and the impact of their potential risks to your overall business.

The intent of the Business Impact Analysis is to provide you with a cumulative and prioritised report of the impact of downtime or other risks to your most critical resources. This information can be applied toward justification and prioritization of risk mitigation planning efforts. The Business Impact Analysis can then be followed by a qualitative risk assessment of your critical IT assets in co-operation with your IT staff. It will