Cybersecurity Service Offerings
Cybersecurity Transformation Program - Core Services
Cyber Technical Assessments
Enterprise Security Architecture
- SABSA Security Architecture Framework
Security Technical Assessments
- VAPT Assessment
- Secure Configuration Review
- Application Security Testing
- Network Security Testing
- Secure Code Review
- Endpoint Security Testing
Cyber Threat Intelligence
- Threat Intelligence vis-à-vis MITRE Framework
- Brand Monitoring
Security Incident Management Program
- Incident Response Playbook Development
Data Protection
- Data Classification
- Data Leakage Identification
Cyber Tool Implementation Support
Vulnerability Scanning Solution
- Nessus, Intruder, Qualys, etc.
EDR Solution Implementation
- 'CrowdStrike, Carbon Black, Tanium, TrendMicro, Symantec, etc.
Data Loss Prevention (DLP) Tool
- 'Forcepoint, Symantec, Digital Guardian, etc
Patch Management Solution & Tool
- BigFix, Microsoft, TrendMicro, etc.
Security Incident & Event Monitoring (SIEM)
- SolarWinds, Splunk, etc.
Encryption Tools
- Microsoft Bitlocker, Trendmicro, etc.
Security Orchestration and Automation Response/ Incident Response (SOAR)
- DarkTrace
DDOS Solution
- Arbor, Radware, Akamai, CloudFare
Firewall ruleset analyser
- Skybox
Governance, Risk & Compliance
Information Security Framework
- Design Policies, Procedures
- Control Implementation of ISO 27001:2013, NIST, COBIT, ITIL, PCI-DSS, etc.
Cyber Program Maturity Program
- Cyber Maturity vis-à-vis industry standards, and Benchmarking,
- Cyber strategy and roadmap
Information Risk Management
- Cyber risk management framework
- Third party risk management
- New solution deployment risk management
Cybersecurity Resilience
- BCP/ DR
- CRISIS Management
Cybersecurity Learning & Awareness
- Conduct awareness trainings & workshop
- Prepare awareness content
Managed Service Model
Real-Time Security Monitoring
- Attack notification and incident response
- Attack tactics, techniques, procedures
- APT Detection & Remediation, Security Analytics
- Threat Intelligence and Attack Profiling
Managed Chief Information Security Officer (CISO) as a Service
- Manage day to day activities as a dedicated resource
- Implement security controls
- Report metrics KPIs, etc.