Analysis - Secure I.T. Environments