Security Consulting

Understand your current cybersecurity risk exposure throughout your enterprise IT environment including Network, Web, Mobile, and Cloud. Following are the some of the features.

  • Cybersecurity Policy Review
  • Security Architecture Review
  • Vulnerability Assessment
  • Penetration Testing

 

Contact us

Cybersecurity Policy Review

The Policy Review comprises:

  • Network and System configuration review
  • Data protection policy
  • Access control measures
  • Recommendations and Executive Reports

Service is in line with the following guidelines and standards:

  • NIST Technical Guide to Information Security Testing and Assessment
  • SANS Security Assessment Guideline for Financial Institution
  • CSC 20: CIS Critical Security Controls

Security Architecture Review

The Security Architecture Review comprises of:

  • Defence-in-depth
  • Logical segregations
  • Evaluate security controls against business requirements

 

Vulnerability Assessment & Pen-Testing

The Vulnerability Assessment and Penetration Testing (VAPT) comprises:

  • Identify and understand vulnerabilities in internal and external environment and areas of improvement
  • Simulate actions of a malicious actor targeting infrastructure, applications and third party connections
  • Tools used for VAPT include: HP Web Inspect, Nessus, IBM AppScan
  • Our VAPT services follow NIST guidelines: 800-53 and 800-115