Services

Subject matter expertise

Subject matter expertise

Smaller organizations may need to bring in a specialist from time to time, to address ...

More »

Security policy development

Security policy development

Through the development and subsequent maintenance of a documented security ruleset (generally comprised of policies, ...

More »

Vulnerability management

Vulnerability management

Vulnerability assessment and penetration testing are perhaps the most effective means of assessing systems against ...

More »

Security awareness

Security awareness

A security awareness program needs to be fresh in order to capture the interest of ...

More »

Risk management

Risk management

Assessing threats to your business can often be an overwhelming task. So is determining ...

More »

Network design

Network design

Traditional network-level security introduces firewalls to filter out undesirable inbound traffic to your organization. ...

More »

Security audit management

Security audit management

Managing a security audit (such as PCI or CICA 5970/SAS 70) can be a major ...

More »

Requirement management

Requirement management

Companies are under increased pressure to comply to an ever growing number of security or ...

More »

Architectural guidance

Architectural guidance

Today's applications are expected to tolerate and withstand undesirable traffic coming from anywhere, ranging from ...

More »

Incident management

Incident management

Security incidents can arrive at the worst of times. Be prepared by developing standards-based incident ...

More »

Internal controls

Internal controls

Internal controls are introduced to ensure high adherence levels to defined processes. While automated controls ...

More »

Secured server deployment

Secured server deployment

Keeping servers updated with the latest patches can be a major technical and administrative challenge, ...

More »

Virtual CISO

Virtual CISO

Smaller organizations need to operate with a smaller core of senior executives, but a challenge ...

More »

Regulatory compliance

Regulatory compliance

Complying to local privacy and security-related laws and regulations like HIPAA (applicable to the healthcare ...

More »

Security tool commissioning

Security tool commissioning

In order to meet today's threats and regulatory requirements, many organizations have procured SIEM (Security ...

More »