Security Management

BI_photo

Security Management

Assuring the right balance between safety, privacy and usability!

For 20 years Contrain delivers solution for user-centric systems management.
In an increasingly fast-changing world, security is an important issue for your business. To help you with this, Cotrain offers you following 3 services in cooperation with our partner Cybacor :

  • Ciso as a service
  • Security assessment
  • Data classification service

CISO as a Service
Drawing up a thorough “Security Roadmap”, strategy and vision is a complex exercise. With the “CISO as a Service” service, our Security Experts help your organisation define your “Security Strategy”, this of course fully in line with your company vision.The first step in defining a “Security Roadmap”/Strategy and Vision is to map/understand the “AS IS” situation of your organisation, as well as the desired “TO BE” situation. (desired “security” maturity)A GAP analysis then gives you a good look at the missing measures/controls that need to be implemented to achieve, but also maintain, the desired “security” maturity.”CISO as a service” ensures that the right controls and appropriate security standards are always identified, implemented and maintained to not only maintain the current “security” maturity level, but also to be able to continuously improve it.

Security Assessment
Does your organisation wish to map its current “security maturity” ? The “COTRAIN Security Assessment” service can help you with this.
We proceed according to the following 5 steps:

    1. Identification
      During this phase, all critical assets are identified and a “risk profile” is drawn up for each of them.
    2. Evaluation
      The identified “security risks” for the critical assets are evaluated for their impact and criticality during this phase.
    3. Mitigation
      For each “security risk” identified in previous phase, an approach is defined to prevent the occurrence of this risk to the maximum extent possible.
    4. Prevention
      As a final step, the necessary steps are determined how to prevent known threats in the future, as well as how to better arm your organisation against known and future vulnerabilities
    5. Final report
      Following this “Security Assessment”, you will receive a final report from COTRAIN containing a clear description of all findings per phase/step, as well as our recommendations to optimally arm and protect your organisation.

Data Classification” service
A well-executed “Data Classification” exercise ensures that every employee within your organisation is always aware of the value of the data he is working on (strategic value, organisation-specific value, privacy data, …).COTRAIN experts help your organisation find answers to the following questions:

    • What data types exist within your organisation ?
    • Where does your data reside within your network ?
    • Which security levels are active within your organisation (data access restriction measures) ?
    • Which controls need to be implemented to provide proper security per data type ? Translated with www.DeepL.com/Translator (free version)

For more information, do not hesitate to contact us by mail (sales@cotrain.be) or by phone (+32 15 653 324).

User-centric Security Management

  • Identity & Access Management
  • Active Directory Management
  • Hybrid Cloud & IoT
  • Mobile & Network Security
  • Mobile Access & Device Management

Data-centric Security Management

  • Data Masking
  • Data Integrity
  • Data Access & Tracking
  • Data Protection & Policies
  • Information Security