From design to implementation
After a thorough examination of the high-level design – which of course is drawn up in accordance with Zero Trust – a translation into a detailed design (low-level design) follows. In this low-level design consultants specify the functional design of the chosen strategy, such as network configuration, hardware and software components and managed services.
In the following implementation stage, we set up equipment and software together with the client, but also the processes for user rights or, for example, IT security emergencies.
Once implementation is completed and tested, the ON2IT security consultant provides the delivery documentation. The ON2IT Managed Security Operations Center can then take responsibility for security incident management and monitoring.