Access Protection
Hansen Access and Security Management protects enterprise data, systems and equipment from unauthorised physical or electronic access. Hansen implements a baseline security management policy for the configuration and implementation of systems in the client IT environment. This is normally supplied by Hansen and includes a monitoring policy to help ensure prompt detection and mitigation of risks.
Flexible Policy Development and Deployment
Security policies include a strict procedure for managing the risk in any proposed change to an enterprise IT environment, system configuration and operation as well as procedures for managing security violations. Where the business wishes to implement a security policy based on their current practises, it is reviewed to ensure compliance with Hansen standards. The policy review will include a risk analysis to ensure security monitoring is in place to detect any violation. The policy provides a template against which Hansen can continuously monitor security integrity. The policy and security regime deployed by Hansen is customised to match the configuration of each system.