Asset Identification & Classification

Asset Identification

Most companies have a clearly defined Asset Classification Policy but are not aware where all the assets including information reside. We have the ability to locate all information assets in electronic format and to classify them against the company's Asset Classification Policy based on ownership.

Business Benefits:

  1. Know the location of all your information assets.
  2. Determines the requirement for stricter access controls.
  3. Determines whether further technological controls are required.
  4. Determines the requirement for an Information Management System.

 

Asset Classification

Asset Classification and especially Information Asset Classification is one of the most important requirements for any company as it allows the company to understand the value of its information assets and to allocate resources to protect them. IT Matrix's Asset Classification goes beyond what are generally accepted principles for Confidentiality, Integrity and Availability to show the worth or value of the asset to business.

Business Benefits:

  1. Identifies Intellectual Property.
  2. Understands the value of the asset.
  3. Understands the potential costs associated with the protection of the information asset.
  4. Base the requirement for controls on the business value of the information asset.
  5. Understanding the business impact from loss of Confidentiality, Integrity and Availability of the Information Asset.

 

Asset Management

Once all assets have been identified and classified, they need to be managed through application of relevant controls as per their value to the organization. This is done by using a combination of procedural and technical controls including software specifically designed to manage the value status of an asset. While the management of assets is not a Business Process Management (BPM) exercise, the management of Information Assets is usually the initiator of a BPM exercise.

Business Benefits:

  1. Business is aware at all times of the classification of their assets
  2. Business may at anytime change the classification of their asset and thus mandate either a stricter or lesser control of the asset
  3. Proves that the cost of Information Security controls is commensurate to the value of the asset
  4. Proves compliance to applicable laws and regulations
  5. Determines the requirement for stricter access controls

Technical Services

A fiercely professional team of security specialists that can assist to establish and maintain a robust and secure computing environment. Read more...

Procedural Services

PCI DSS, ISO 27001, Risk Assessment and development, customization, or re-engineering of policies, processes, procedures and work instructions. Read more...

Product & Solutions

State-of-the-art technology backed by a qualified professional team at your door-step to secure the IT infrastructure from malicious threats. Read more...

Fraud Management

Protecting the organization's reputation and customers against possible online attacks as a result of e-commerce activities. Read more...