Understand your current cybersecurity risk exposure throughout your enterprise IT environment including Network, Web, Mobile, and Cloud. Following are the some of the features.
- Cybersecurity Policy Review
- Security Architecture Review
- Vulnerability Assessment
- Penetration Testing
Contact us
Cybersecurity Policy Review
The Policy Review comprises:
- Network and System configuration review
- Data protection policy
- Access control measures
- Recommendations and Executive Reports
Service is in line with the following guidelines and standards:
- NIST Technical Guide to Information Security Testing and Assessment
- SANS Security Assessment Guideline for Financial Institution
- CSC 20: CIS Critical Security Controls
Security Architecture Review
The Security Architecture Review comprises of:
- Defence-in-depth
- Logical segregations
- Evaluate security controls against business requirements
Vulnerability Assessment & Pen-Testing
The Vulnerability Assessment and Penetration Testing (VAPT) comprises:
- Identify and understand vulnerabilities in internal and external environment and areas of improvement
- Simulate actions of a malicious actor targeting infrastructure, applications and third party connections
- Tools used for VAPT include: HP Web Inspect, Nessus, IBM AppScan
- Our VAPT services follow NIST guidelines: 800-53 and 800-115