|We have a structured and proven process to successfully develop, implement and maintain an actionable IT Service Catalog. Our approach is based on ITIL best practices, and is widely supported by several other practices, some of wich were developed by us, in order to achieve a functional and comprehensive IT Service Catalog.|
|Process Mapping is one of our core services, since it supports almost our entire service portfolio. By documenting a process, one is mitigating risk and protecting valuable information. It's also a first and indispensable step towards a more deep understanding on process costs, inefficiencies detection and resource allocation. Through Activity Based Costing we can also identify the optimal number of resources needed to achieve a certain Service Level Target.|
|Sustained on BS 25999 and BCI Good Practice Guidelines, we can help our customers to implement a Business Continuity Management Programme, related to Information Technology Resources. The recommended approach is based on 5 phases: Understand the organization - Determine BCM Strategy - Develop and Implement BCM Response - Exercise, Maintain and Review - Embed BCM in Organization's Culture.|
|GoCloud is a Willway’s service to help customers on the business case and migration of eligible services to the cloud. One needs to evaluate all the associated costs, along with the necessary contingency plans on a significant SLA breach to ensure effective Return On Investment and Cost Reduction.|
|We walk the talk. Willway makes available to the market the IT Managed Services. Our customers must be, more then ever, focused on what is important: their core business. Externalizing supporting activities is a natural step, it does bring potential cost reduction and access to more specialized skills and a relationship based on Service Level Agreements. We will execute what we advocate, so we can transfer to our customers the gains on efficiency and quality.|
|in.spector is a service from Willway that aims at prevention and detection on information access abuse, one of the most damaging threats to companies, as stated in several research documentation. We believe on a structured approach to this challenge, based on education, communication, enforcement and monitoring solutions. This service is included in our DLP - Data Loss Prevention - strategy.|
|"The Security Way" is a service designed by Willway that enables an organization to implement a information security program based on ISO 27001 requirements. Our approach is end-to-end, and takes into consideration the initial maturity level of our customer, he's business priorities and establishes a roadmap to achieve the required level in the desired timeframe.|
|This is one of the most conventional services on the information security practice. The main objective is to identify and prioritize vulnerabilities. Based on the risk profile of the systems in scope we define, together with our customers, the breath and depth of the service. We support our services on leading scanner technology and, more relevant, on our team’s skills for identifying, in a controlled manner, the aledged holes found.
We enrich the results found with remediation recomendations on each vulnerability so our customer can fix the problems and minimize the potential to reincide.
|As Abraham Lincoln would say "...of the people, by the people, for the people”, and indeed the people is present in every step of the process. In the last years we’ve been developing new technology when we should, also, be training our people to think secure. Many consider social engineering to be the greatest risk to security.
In this service we test the security behaviour in different situations and provide our customers with a focused training session to mitigate the identified vulnerabilities.
|This service is usually acquired by companies that have a strong believe on their security maturity and wan’t to test their defenses in a real case scenario. The main objective is to penetrate/acquire information to reach the defined goal.
We support our services on leading technology and, more relevant, on our team’s skills for exploiting the aledged holes found. A penetration testing is depth over breath: you don’t test all security controls, but instead focus on acquiring what a real attacker (hacker) wants – The goal.