Security by design

We can offer a complete systems and network design engineering service to cover all aspect of your Surveillance,  business security software and monitoring infrastructure.

>>> Core network design

Evaluating, understanding and scoping network to be implemented is part of SSI DNA. Typically, network design includes the following:Logical map of the network to be designed

  • Cabling structure
  • Quantity, type and location of network devices (router, switches, servers)
  • IP addressing structure
  • Network security architecture and overall network security processes

Our design knowledge and experience extends across multiple core networks services:

  • GSM, CDMA, Satellite, PSTN, SS7, ADSL, Cable, Dial Up, GPRS, UMTS, EvDO, VoIP

>>> Security operation CENTER design and development

Owning a SOC is an important status symbol for many organizations. Although the concept of a ‘SOC’ can be considered a hype, only a few of them are actually effective in counteracting cybercrime and IT abuse. A literature review reveals that there is no standard framework available and no clear scope or vision on SOCs. In most intances, specific implementations are described, although often with a commercial purpose. Our approach is focused on identifying and defining the generic building blocks for a SOC, to draft a design framework. In addition, a measurement method has been developed to assess the effectiveness of the protection provided by a SOC.

SOC Framework

A SOC needs an umbrella, consisting of an information security organization with a Chief Information Security officer (CISO), reporting to the Chief Information officer (CIO), and acting within the mission and security goals of the organization. Moreover, there should be a process for secure service development to ensure that only secure solutions are handed over from the acquire phase to the production environment., also known as ‘Security by Design’ function. This is often combined with methods and processes for Business Impact Analysis (BIA), Risk Analysis (RA) and Privacy Impact Assessment (PIA). These analysis methods provide information about the requirements for confidentiality, integrity and availability. The research results indicate a clustering of the SOC’s activities in five areas, which turn out to be their elementary building blocks. These are:

  • Intelligence function
  • Baseline Security function
  • Monitoring function
  • Penetration Test function
  • Forensic function

With key resource resumes that include the design of Solutions for more than 20 Tier-one carriers across the globe (Encompassing both implementation and Functional Specification writing), the support to development team and integration team, the implementation of interception and securityy systems across Europe, Asia and the Pacific Region, we pride ourselves on providing experienced engineers to all our clients, which means you don’t have to pay the hidden cost of learning and development on your systems.

Please contact us for more details