The Octopi Process is based on the belief that Data Security is not just an IT business activity. Data Security requires HR policies, business processes, physical security as well as buy-in from employees at all levels of the organization. Security and IT services cannot be provided in a vacuum.
Like all business activities, proper planning is key to an effective and efficient IT system. We believe that almost all problems can be effectively mitigated by following a proven process to design and monitor a system. When problems to arise, many can be dealt with remotely and only on rare occassions does a technical resource need to be deployed to your faciility.
This diagram illustrates the consecutive nature of IT support and how it is linked to other IT activities.