SlideShare a Scribd company logo
1 of 9
Tech Alliance Security Consulting Services
Challenges

Many organizations assume that Information security can be achieved by a good
firewall.

Information security threats come from various directions , not just from internet.
Information security needs holistic approach that covers,

Computer Security : Computer access control, Antivirus and Anti malware, backup,
data encryption.
Operation Security: Software security, Database security, File shares and access control,
Business applications
Protection against Burglary: Physical security and guards
Protection against fire: Fire suppression systems, Alarms
External and Internal threats: Espionage, Abuse, eves dropping, shoulder surfing
Communication: Telephone lines, internet, email
Continuity planning: Emergency response, recovery
Personal Security : Recruiting, access control, human mistakes, piggybacking, incident
reporting
TA Solution


TA designed five services that effectively address organization’s security
concerns.

Our security services are,

    Enterprise Security Program Design and Implementation
   IT RISK assessment
   Disaster Recover Planning and Business Continuity
   Vulnerability Assessment and Penetration Testing
   Security Operations Center
Enterprise Security Program Design and Implementation




                                                                                                          Information
    Project             Information               Current State
                                                                             Gap Analysis               Security Program
   Planning              Gathering                 Assessment                                              Roadmap

                    Identify the business
Identify                                                                                              Ensure that risk
                   processes that involve     Obtain current policies
                                                                                                      mitigation strategies
Stakeholders       Information Security      and procedures covering
                                                                          Identify risk that arise   are aligned with
Project Kickoff   Systems and facilities    information systems.
                                                                         from the gaps                information security
Scope              Identify key stake       Prioe risk assessment                                  program objectives
                                                                          Prioritize the risks by
reconfirmation     holders for each          results
                                                                         business process (HIGH,       Develop/Revisit
Understand        business process and       Intermnal Audit reports   MEDIUM,LOW)                  information Security
client             underlying IT
                                              Other relevent reports                                 charter
                   components                                             Present findings to the
requirements in                              from Information security   stakeholders                  Prepare a roadmap
detail by phases    Conduct walk            team if any
                                                                          Determine the risk         to information security
Develop a         throughs with each
                                              Benchmark the existing                                 program
project plan       stake holders                                         mitigation strategies
                                             controls against Security
                                             best practices framework
Deliverable        Deliverables                                          Deliverables
                                                                          Risk prioritization        Deliverables
 Project plan     Process Narratives       Deliverables
                   that define boundaries                                Matrix                        Information Security
 Weekly Status                               Controls benchmarking                                  Charter
                   for information systems   spreadsheet                  Executive dashboard
Reports                                                                                                Inforsec program
                                                                                                      roadmap
IR Risk Assessment

 Identify risk    During this step, TA analyses the business process and comes up with a list of components
   assessts       that fall under the scope of Risk Assessment Process


Identify Threat           Once the list is prepared, TA indentifies the possible threats on the assets


   Identify          In this step, TA consultants identify the vulnerabilities that exist with the assets and
Vulnerabilities      processes

   Control        After the previous step of vulnerability identification, TA analyses the existing controls and
   Analysis       processes

   Impact
                              This step involves TA consultants calculating the impact of the risks
   Analysis


 Recommend
                        Risk mitigation controls that need to be applied on assets to protect the assets
   Controls


Risk Mitigation                      Implementation the identified controls to the assets
Disaster Recovery Planning
                                                        And Implementation




Analyse The     TA consultants work with customers management to identify the key processes that need
   Need         to be included in the DR/BCP




   Design                      The technology solution and processes will be designed
  Solution



Implement
                                               Solution Implementation
 Solution



Test Solution                 Testing plans and test to make sure the solution is effective
Vulnerability Assessment and Pen Testing



Features:
•   Scan the target network for open ports and services
•   Scan the open ports and services for known
    vulnerabilities
•   Prioritize the vulnerabilities based on the impact
•   Report the vulnerabilities in a comprehensive report
•   Perform penetration test to confirm the vulnerability
•   Recommend resolutions to security vulnerabilities

Deliverables
•   Vulnerability report
•   Pen test report with recommendations
Security Operation Center
A dedicated facility from where customer’s security operations are carried out.


Features:
•   24X7 Operations
•   Network Device log monitoring
•   OS and Application log monitoring
•   Antivirus Console
•   Event Correlation and Alerting
•   Reports
•   Firewalls, IDS/IPS, Antivirus, Internet Proxy
•   Vulnerability Management
Please contact security@techalliance.in to
       discuss our services in detail
              040-44327761

More Related Content

What's hot

Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationBruce Hafner
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&AMatt Tortora
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Casetbeckwith
 
Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10Symantec
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 

What's hot (19)

CO$T BENEFIT OF MSSP
CO$T BENEFIT OF MSSPCO$T BENEFIT OF MSSP
CO$T BENEFIT OF MSSP
 
Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk Remediation
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
NIST 800 30 revision Sep 2012
NIST 800 30 revision  Sep 2012NIST 800 30 revision  Sep 2012
NIST 800 30 revision Sep 2012
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Agiliance Risk Vision
Agiliance Risk VisionAgiliance Risk Vision
Agiliance Risk Vision
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 

Viewers also liked

CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)
CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)
CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)CLICKNL
 
Commercial spitfire beer_01_11
Commercial  spitfire beer_01_11Commercial  spitfire beer_01_11
Commercial spitfire beer_01_11Gill Smart
 
Qui il comunicato originale di sogin
Qui il comunicato originale di soginQui il comunicato originale di sogin
Qui il comunicato originale di soginviaemilianet
 
Litas media presentation
Litas media presentationLitas media presentation
Litas media presentationscarlett2miller
 
Norman white + robotic art
Norman white + robotic artNorman white + robotic art
Norman white + robotic artRhyan Mahazudin
 
Edad media 1 nuevo
Edad media 1 nuevoEdad media 1 nuevo
Edad media 1 nuevojaugustodiaz
 
Замок в Тюрингии
Замок в ТюрингииЗамок в Тюрингии
Замок в ТюрингииAYAvolunteer
 
Progetto biomonitoraggio comprensoro del mela milazzo convenzione arta unive...
Progetto biomonitoraggio comprensoro del mela milazzo  convenzione arta unive...Progetto biomonitoraggio comprensoro del mela milazzo  convenzione arta unive...
Progetto biomonitoraggio comprensoro del mela milazzo convenzione arta unive...Pino Ciampolillo
 
Opportunities
OpportunitiesOpportunities
OpportunitiesClara Gan
 
3 riflessometro prof trimarchi
3   riflessometro prof trimarchi3   riflessometro prof trimarchi
3 riflessometro prof trimarchiGiorgio Marcon
 
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...Nikos Michailidis
 
Piesen o rodnej_zemi
Piesen o rodnej_zemiPiesen o rodnej_zemi
Piesen o rodnej_zemiVesdo 1
 
Madoff y el esquema Ponzi
Madoff y el esquema PonziMadoff y el esquema Ponzi
Madoff y el esquema Ponzietica2014
 
Pedoni commissione europea
Pedoni   commissione europeaPedoni   commissione europea
Pedoni commissione europeaGiorgio Marcon
 
Analisi report generale invalsi 2013 tot
Analisi report generale invalsi 2013 totAnalisi report generale invalsi 2013 tot
Analisi report generale invalsi 2013 toticfalcone
 

Viewers also liked (20)

CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)
CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)
CLICKNL Jaarevent 2014 - Ton Venhoeven (VenhoevenCS)
 
Le cinema et la lecture
Le cinema et la lectureLe cinema et la lecture
Le cinema et la lecture
 
Gadgets - Friday Magazine
Gadgets - Friday MagazineGadgets - Friday Magazine
Gadgets - Friday Magazine
 
Commercial spitfire beer_01_11
Commercial  spitfire beer_01_11Commercial  spitfire beer_01_11
Commercial spitfire beer_01_11
 
Qui il comunicato originale di sogin
Qui il comunicato originale di soginQui il comunicato originale di sogin
Qui il comunicato originale di sogin
 
Litas media presentation
Litas media presentationLitas media presentation
Litas media presentation
 
Norman white + robotic art
Norman white + robotic artNorman white + robotic art
Norman white + robotic art
 
Osteoporosis - Healthy Living - GN Focus, GulfNews
Osteoporosis - Healthy Living - GN Focus, GulfNewsOsteoporosis - Healthy Living - GN Focus, GulfNews
Osteoporosis - Healthy Living - GN Focus, GulfNews
 
Edad media 1 nuevo
Edad media 1 nuevoEdad media 1 nuevo
Edad media 1 nuevo
 
Замок в Тюрингии
Замок в ТюрингииЗамок в Тюрингии
Замок в Тюрингии
 
Progetto biomonitoraggio comprensoro del mela milazzo convenzione arta unive...
Progetto biomonitoraggio comprensoro del mela milazzo  convenzione arta unive...Progetto biomonitoraggio comprensoro del mela milazzo  convenzione arta unive...
Progetto biomonitoraggio comprensoro del mela milazzo convenzione arta unive...
 
Mention in Revista instyle (Rusia)
Mention in Revista instyle (Rusia)Mention in Revista instyle (Rusia)
Mention in Revista instyle (Rusia)
 
Opportunities
OpportunitiesOpportunities
Opportunities
 
3 riflessometro prof trimarchi
3   riflessometro prof trimarchi3   riflessometro prof trimarchi
3 riflessometro prof trimarchi
 
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...
Safer Internet Day 2013 - Poster Presentation of 1st Elementary School of Nea...
 
Piesen o rodnej_zemi
Piesen o rodnej_zemiPiesen o rodnej_zemi
Piesen o rodnej_zemi
 
Madoff y el esquema Ponzi
Madoff y el esquema PonziMadoff y el esquema Ponzi
Madoff y el esquema Ponzi
 
Pedoni commissione europea
Pedoni   commissione europeaPedoni   commissione europea
Pedoni commissione europea
 
Analisi report generale invalsi 2013 tot
Analisi report generale invalsi 2013 totAnalisi report generale invalsi 2013 tot
Analisi report generale invalsi 2013 tot
 
Auguri
AuguriAuguri
Auguri
 

Similar to Ta Security

Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodologylaurahees
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioBim Akinfenwa
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioAkingbade Akinfenwa
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2Carl Booth
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web ApplicationsNadia BENCHIKHA
 
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfCISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfSidneyGiovanniSimas1
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 

Similar to Ta Security (20)

Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodology
 
Handling risk
Handling riskHandling risk
Handling risk
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Xero Risk Product Presentation V3.2
Xero Risk   Product Presentation V3.2Xero Risk   Product Presentation V3.2
Xero Risk Product Presentation V3.2
 
Real Time Risk Management
Real Time Risk ManagementReal Time Risk Management
Real Time Risk Management
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Application Security
Application SecurityApplication Security
Application Security
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfCISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 

Ta Security

  • 1. Tech Alliance Security Consulting Services
  • 2. Challenges Many organizations assume that Information security can be achieved by a good firewall. Information security threats come from various directions , not just from internet. Information security needs holistic approach that covers, Computer Security : Computer access control, Antivirus and Anti malware, backup, data encryption. Operation Security: Software security, Database security, File shares and access control, Business applications Protection against Burglary: Physical security and guards Protection against fire: Fire suppression systems, Alarms External and Internal threats: Espionage, Abuse, eves dropping, shoulder surfing Communication: Telephone lines, internet, email Continuity planning: Emergency response, recovery Personal Security : Recruiting, access control, human mistakes, piggybacking, incident reporting
  • 3. TA Solution TA designed five services that effectively address organization’s security concerns. Our security services are, Enterprise Security Program Design and Implementation IT RISK assessment Disaster Recover Planning and Business Continuity Vulnerability Assessment and Penetration Testing Security Operations Center
  • 4. Enterprise Security Program Design and Implementation Information Project Information Current State Gap Analysis Security Program Planning Gathering Assessment Roadmap  Identify the business Identify  Ensure that risk processes that involve  Obtain current policies mitigation strategies Stakeholders Information Security and procedures covering  Identify risk that arise are aligned with Project Kickoff Systems and facilities information systems. from the gaps information security Scope  Identify key stake  Prioe risk assessment program objectives  Prioritize the risks by reconfirmation holders for each results business process (HIGH,  Develop/Revisit Understand business process and  Intermnal Audit reports MEDIUM,LOW) information Security client underlying IT  Other relevent reports charter components  Present findings to the requirements in from Information security stakeholders  Prepare a roadmap detail by phases  Conduct walk team if any  Determine the risk to information security Develop a throughs with each  Benchmark the existing program project plan stake holders mitigation strategies controls against Security best practices framework Deliverable Deliverables Deliverables  Risk prioritization Deliverables  Project plan Process Narratives Deliverables that define boundaries Matrix  Information Security  Weekly Status  Controls benchmarking Charter for information systems spreadsheet  Executive dashboard Reports  Inforsec program roadmap
  • 5. IR Risk Assessment Identify risk During this step, TA analyses the business process and comes up with a list of components assessts that fall under the scope of Risk Assessment Process Identify Threat Once the list is prepared, TA indentifies the possible threats on the assets Identify In this step, TA consultants identify the vulnerabilities that exist with the assets and Vulnerabilities processes Control After the previous step of vulnerability identification, TA analyses the existing controls and Analysis processes Impact This step involves TA consultants calculating the impact of the risks Analysis Recommend Risk mitigation controls that need to be applied on assets to protect the assets Controls Risk Mitigation Implementation the identified controls to the assets
  • 6. Disaster Recovery Planning And Implementation Analyse The TA consultants work with customers management to identify the key processes that need Need to be included in the DR/BCP Design The technology solution and processes will be designed Solution Implement Solution Implementation Solution Test Solution Testing plans and test to make sure the solution is effective
  • 7. Vulnerability Assessment and Pen Testing Features: • Scan the target network for open ports and services • Scan the open ports and services for known vulnerabilities • Prioritize the vulnerabilities based on the impact • Report the vulnerabilities in a comprehensive report • Perform penetration test to confirm the vulnerability • Recommend resolutions to security vulnerabilities Deliverables • Vulnerability report • Pen test report with recommendations
  • 8. Security Operation Center A dedicated facility from where customer’s security operations are carried out. Features: • 24X7 Operations • Network Device log monitoring • OS and Application log monitoring • Antivirus Console • Event Correlation and Alerting • Reports • Firewalls, IDS/IPS, Antivirus, Internet Proxy • Vulnerability Management
  • 9. Please contact security@techalliance.in to discuss our services in detail 040-44327761