This knowledge helps the client identify where future improvements can be made to achieve further savings.


-
Cryptographic Key Study
We collected, collated and analysed data from a wide range of stakeholders to help determine the programme’s key requirements.
-
Requirement Study
We audited and analysed over 300 individual crypto plans. In addition, we assessed the process for determining a project’s cryptographic needs and producing an appropriate plan, making recommendations to improve them.
-
Cryptographic Use Case Study
We applied Systems Engineering methodologies to analyse the scope of use cases required to support the CES programme, assess the validity of current use cases, identify any gaps in information and to establish the development and production of additional use cases. This enabled the programme to fully articulate requirements for key management.

People need to be at the heart of change. It’s not always easy to embrace change, and it’s natural to fear the unknown.
