2. Profile
In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more
dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and
misuse. There are many software and hardware available in the market to protect our computers and its data but very
often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,
Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to
Data Pilferage and Abuse.
Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it
investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my
PhD in Information security. And having worked for close to two decade in various large establishments. I have gained
a fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises
be it Small Medium or Large.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market
research team who are in the process of continuously scanning the market and keeping us updated in the latest
technologies available and also newer challenges our clients come up with. We share these developments with our
clients by way of periodical news letter by e-mail.
We have to our credit a very small client base both in India and overseas who are extremely appreciative to our
perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in
reassuring ourselves that this is what a client in need of.
Above all as a policy we share our knowledge with the younger generation by giving them training programmes at
the college levels so that they become better IT Professional having a holistic approach.
… Dr. THENNARASU.E (HARSHA) PhD (IS)
CEO
3. IT Consultancy Services
IT Managed Services
Software Copy rights legal
advice
Network Design
Data Center Design
Firewall (Hardware/Software)
ASC (Annual Service Contract)
SAP solutions
Staff Training on Information
security
Cyber crimes/ & vulnerabilities
Mailing Solutions
Internet Bandwidth Solutions
IT Inventory Management
Anti Virus & Security Software
IT Outsource
Virtualization (Server/Desktop)
Video Conferencing (Tanburg, Polymer)
Document collaborations (Share Point)
Cost effective solutions on all IT requirement
& challenges
Bulk Mailing & Bulk SMS
IT Managed Services
Software Copy rights legal
advice
Network Design
Data Center Design
Firewall (Hardware/Software)
ASC (Annual Service Contract)
SAP solutions
Staff Training on Information
security
Cyber crimes/ & vulnerabilities
Mailing Solutions
Internet Bandwidth Solutions
IT Inventory Management
Anti Virus & Security Software
IT Outsource
Virtualization (Server/Desktop)
Video Conferencing (Tanburg, Polymer)
Document collaborations (Share Point)
Cost effective solutions on all IT requirement
& challenges
Bulk Mailing & Bulk SMS
5. Phase 1
Preliminary
Review
Phase 2
Scope of ISMS
Phase 3
GAP Analysis
Phase 4
Risk Assessment
Phase 5
Risk Mitigation
and Selection of Controls
Phase 6
Redesign of Security
Architecture
(Optional)
Phase 7
Policy and
Procedures Drafting
Phase 8
Incident
Managemen
t
5
Phase 9
Design of
BCP/DRP
Phase 10
Design of Audit
Charter
Phase 11
Security Awareness
Program
Phase 12
Security Metrics
Phase 16
Periodic Review
(Optional)
Phase 15
Certification
Phase 14
Internal Audits Phase 13
Implementation of
controls
(We would provide
Guidance)
6. Information Security Assessments
Risk Analysis/Gap Analysis/VA/PT
& Trainings
SOX/ISO/COBIT/HIPAA & Other International Standards
Clienteles in India / Overseas
7. Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhD
Researcher Information Security on High End Applications
Information Security Assessment expert
Member of DSCI (Data Security Council of India)
Trainer Certified Ethical Hacker
Overseas Auditing Experience
Guest Lecturing (Universities, Colleges)
Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter Lead
Sri Lanka OWASP Chapter Mentor
Invited Trainer at OWASP India conference.
Cloud Alliance Security Chennai Chapter Lead.
Reviewer of ISACA CRISC Review Manual 2011.
Cloud Security Alliance – Control Matrix Co-Author
ISACA Best Trainer for the Year 2011-2012
7
Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhD
Researcher Information Security on High End Applications
Information Security Assessment expert
Member of DSCI (Data Security Council of India)
Trainer Certified Ethical Hacker
Overseas Auditing Experience
Guest Lecturing (Universities, Colleges)
Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter Lead
Sri Lanka OWASP Chapter Mentor
Invited Trainer at OWASP India conference.
Cloud Alliance Security Chennai Chapter Lead.
Reviewer of ISACA CRISC Review Manual 2011.
Cloud Security Alliance – Control Matrix Co-Author
ISACA Best Trainer for the Year 2011-2012
8. Our IT Security Specialists:-
Mr. RAJENDRAN
Certified CISP from Dept of IT Govt of India
Subject matter expert & Trainer for Tamil Nadu Police academic
Active member and the Treasurer of Cyber Society of India.
Pursuing PhD in the area of Cyber Crime in Banks
Member of Indian Society of Victimology
8
Mr. TS. RAGHUNATHAN,
Certified security professional by Cisco, Cyberoam, Watchguard, etc.,
Practitioner Information & Network Security assessments/audits
VA/PT specialist
Certified Ethical Hacker
12 year experience in Information & Network Security Domains
9. Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings in
processes and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization
9
Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings in
processes and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization
12. INNOVATING FOR INDIA SEMINAR @ BISHOP COTTON WOMEN’S CHRISTIAN COLLEGE
ADDRESSED BY Dr. HARSHA, Chief IT Security Advisor
Information Security Training to Vijay Bank, HO
13. E-waste Collection Program for
supporting
Senior Citizens
CSR Initiative to generate
revenue for NGO
In partner with
Dignity Foundation