Cyber Security 

  • Cyber Essentials ­
  • Security Testing -  Network and Application Penetration Testing or Scanning, wireless security assessments and social engineering 
  • Cloud Security ­
  • Security Strategy ­
CyberSecurity
Risk Management

Operational Risk

  • Risk Management Frameworks - Setting up 3 Lines of Defense ­
  • Business Resilience - Strategy, Design and Documentation, Testing ,Maintenance, Tools implementation 
  • Risk Assessments and remediation advice – Exposure Analysis, Vendor due diligence
  • Employee Awareness and Training - Knowledge management

IT Audit and Compliance - 

  • Technology Audits - Network Architecture, Exchange, Database, OS, Firewalls, Network components, patch management
  • Compliance Management ­ -  PCI DSS, HIPPA, DPA, ISO 27001, PAS 555, COBIT, ISO22301, SOX, Combination of Industry frameworks 
  • Third Party Audits - SSAE16, Data center Audits, Physical Security audits
  • Policy and Framework – Internal controls framework, COBIT, IT Policies
compliance
Advisory-Services

Advisory Services

  • Digital Transformation - Improving Business­ IT alignment, Needs and outcomes framework, Process optimization­
  • Enterprise Architecture - Strategy, Design, Review, Target Operating Model 
  • DevOps - IT­CMF, Migration of the client from Waterfall to Agile to Continuous Delivery
  • Third Party Management – Selection, Due diligence, setting up Service Management,Vendor Management.

Managed Security

  • Security Operations Center – Service Desk, Security, Availability and Performance Monitoring (Firewall, IDS/IPS, Log Management tools, network devices) 24/7 or bespoke working hours, Security Policy Compliance Validation. Preparing audit ready reports ­
  • Security Device Management ­-  Firewall, IDS/IPS and other network devices management, Patching, Backup, Software upgrades 
  • Threat Intelligence - In addition to our own threat intelligence services and additional information shared by our extensive  client base, we can proactively conduct scans to understand the exposure and update devices as needed
  • Security Incidence Response ­
Managed-Services