Multifactor Authentication in Support of Companies Aiming to Operate in China

The enterprise network infrastructure is becoming more complex with a gradually blurred perimeter. The digital transformation has driven the rapid evolution of information technology, new IT technologies such as cloud computing, big data, Internet of Things and mobile internet have brought new productivity to all industries, in the meantime, they also have brought great complexity to the enterprise network infrastructure.

ECSA – Recommended Architecture Metrics Program

In order to properly measure the Architecture posture in the customer, there is a need to properly measure Architecture risk. While using a standardized Architectural Risk Impact Assessment (RIA) for various components is standard in IT Architecture, RIAs don’t provide a way to strategically measure the Architecture for the Enterprise. As such, it’s important to create an Architecture Metrics Program within the customer to better guide the customer to a desired end state.

Base Reference Enterprise Architecture

Each Environmental Variable has it’s own set of Environmental Variables. Which means that, in order for an Enterprise to understand it’s Environmental Variables, it has to understand what affects each Environmental Variables. This creates a secondary and tertiary relationship back to the Enterprise.

ECSA Reference Security Technology Architecture

This Reference Security Process diagram lists the areas that security processes should be identified and documented.

Core Reference Architecture for: Utilities (Electrical)

Recommended Cloud Security Strategy

Most organizations have, as part of their Technology Strategy, initiated a drive to “as a Service” solutions. The Application Architecture will provide a private cloud platform for applications. Infrastructure will move further towards a services based model, delivering a Private Cloud, “Platform as a Service” capability (PaaS). In order to be able to support this Strategy, this Reference Cloud Security Strategy has been created.


AMI intrastructures are growning in a manner that will necessitate the move to IPv6, an IP addressing schema that is currently not widely in use in the IT community and new to most organizations. As such, it is important to understand the Security Risks and Implications that come with the use of IPv6 and propose Security mitigations.

Identity & Access Management (IAM) Reference Architecture

How the different Areas in IAM fit together. A comprehensive approach to an IAM reference architecture and its delivery approach. In order to meet the business challenge surrounding IAM, this paper provides an overview of an Identity and Access Management (IAM) reference architecture and its delivery approach.