security testing and risk services brochure

4
Security & Risk Services What’s on your mind? Is Your IT Infrastructure 100% Secure? Are you carrying out regular security audits for your applications? Are your database servers protected against internal and external hacker attack www.kualitatem.com

Upload: rockden

Post on 28-Oct-2014

15 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Security Testing and Risk Services Brochure

Security & RiskServices

What’s on your mind?

Is Your IT Infrastructure 100% Secure?

Are you carrying out regular security audits for your applications?

Are your database servers protected against internal and external hacker attacks?

www.kualitatem.com

Page 2: Security Testing and Risk Services Brochure

INTRODUCTION

With the increased reliance on data driven websites and the fact that 87% of the web is vulnerable to external threats, theneed for secure and reliable service delivery through the web has never been higher. An organizations IT Infrastructureand web applications offer data access to customers, employees and other key stakeholders of a business. A minorsecurity loophole within this infrastructure can cost up to thousands of dollars in the form of higher post deployment costs,legal fees, weak brand image and loss of loyal customers. Kualitatem can help you to create secure and stable networks,processes, applications and more through leveraging real world techniques for identifying security exposures. Our currentservice offering includes the following:

AUDIT & ASSESSMENT SERVICES

Security Audit

Information security audit is a methodical, measurable assessmentof how the organization's information security is employedthroughout the organization or a specific site. Information securityaudit is performed through understanding the informationtechnology environment by conducting interviews, vulnerabilityscans, examination of system settings, network andcommunication analyses.

Vulnerability assessments

Any device with access to the Internet is a potential open door towould-be hackers. Company name provides vulnerabilityassessments during which it closely maps the networkarchitecture, examines all open ports, hosts and services withaccess to the Web, and ensures that these network devices aresecure. During this defensive process, once open ports andattached services are identified, we determine whether eachservice has been updated with the most recent patches andidentifies other vulnerabilities located within the exposed services.

Penetration Testing / Ethical Hacking

Following all vulnerability assessments and penetration tests,Kualitatem uses the information it gathers to prepare a thoroughvulnerability analysis and offers recommendations forstrengthening network and internet security. Depending on theclient’s needs, intranet testing can be performed by Kualitatemunder varying degrees of disclosure of network information (whitebox and black box testing).

Web Application Security Testing

Kualitatem offers a professional Web Application Security Testingservice that can be used to identify vulnerabilities that exist on yourweb applications. This application testing can be performedremotely for external facing web applications or from your premisesif this is the requirement.

Our security testing methodology is based aroundthe well-respected Open Web Application SecurityProject(OWASP) testing methodologies andconsists of the following steps.

Risk Assessment

The goal of this service is to ensure that clientsare managing their information assets in a mannernot only consistent with their established andapproved corporate security policies andguidelines, but also with industry’s best practicesand applicable laws and regulations. Kualitatemuse specialized phased approach to riskassessment methodology and customize it inorder to ensure that every aspect of business, ITand operations is covered.

www.kualitatem.com Email: [email protected]

Page 3: Security Testing and Risk Services Brochure

Application Compliance & Controls Review

Our Application governance framework covers the requirements forvarious information governance standards, regulation andlegislative requirements. In addition, it is customizable to reflect anorganization’s internal IT policies and provide a clear picture to thestakeholders regarding application security controls and theirefficacy.

ARCHITECTURE & DESIGN SERVICE

Security Architecture Reviews and Design

Kualitatem’s security architecture review and design serviceensures that a robust, cutting edge and effective security is builtinto your network from a vendor neutral point of view and defensein depth approach. A vendor solution that works for one companymay not be the best one for you and hence after thoroughassessment of your infrastructure, we recommend solutions anddesigns that will work best for your business needs by working withthe technical and business managers. You will get an end-to-endsecurity solution, and ensure that you will always be provided withthe proper level of protection, at an appropriate cost, even asthreats continue to evolve at the same speed as that of thetechnology.

Information Security Processes and Policies

We help our clients in producing information security policies ofvarying nature and ensuring that over all information security policyis in line with your organizational goals as well focuses on specificcomponents. The security policies and processes will support thebusiness of the organization and will ensure a consistencybetween all safeguards is maintained. It will reflect organizationalrequirements and will take into account any organizationalconstraints; this approach will be effective in relation to thebusiness needs of the organization.

ISO 27001 (ISMS) Gap Analysis &Implementation

"Information Security Management System" orISMS. In short, it is that part of overallmanagement system, based on a business riskapproach meant to establish, implement, operate,monitor, review, maintain and improve informationsecurity. The management system includesorganizational structure, policies, planningactivities, responsibilities, practices, proceduresand resources. With the help of certifiedimplementers and consultants, Kualitatem canhelp the organizations to design and build theISMS which can effectively be used to manageand improve an organizations information security.

IT SECURITY SOLUTIONSDELIVERY SERVICES

McAfee Implementation Services

McAfee is well equipped to respond to the growingsecurity needs of customers. Relying on a provenmethodology, our services help you fully leverageMcAfee technology solutions and maximize yourinvestment, providing comprehensive design,implementation, and optimization services to helpcustomers apply and maximize the value ofMcAfee products within your organization.

Our services span the entire McAfee portfolio ofsolutions, from security risk assessments tocomprehensive, customized deployments. Wealso offer training and advisory services thatprovide heightened visibility into your overallsecurity posture. Our team consists of skilledexperts in all McAfee products.

Data Loss Prevention (DLP)Program

Kualitatem consultants have proven expertise inData loss Prevention solution consultancy,enterprise wide deployment and assistance. Weprovide assistance in creating an effectiveenterprise wide DLP program. We pride ourselvesin providing a vendor neutral point of view inunderstanding and selecting a suitable DLPsolution addressing your business, operationaland IT requirements as well as your financialconstraints.

www.kualitatem.com Email: [email protected]

Page 4: Security Testing and Risk Services Brochure

TRAINING & ENABLEMENT SERVICES

Security Awareness & Training

We help our clients in producing information security policies ofvarying nature and ensuring that over all information security policyis in line with your organizational goals as well focuses on specificcomponents. The security policies and processes will support thebusiness of the organization and will ensure a consistencybetween all safeguards is maintained. It will reflect organizationalrequirements and will take into account any organizationalconstraints; this approach will be effective in relation to thebusiness needs of the organization.

Ethical Hacking & Penetration Testing

This training program is aimed at teaching and delivering the realworld knowledge on the subject of “Ethical Hacking & PenetrationTesting” using same tools, techniques and methods that are usedby hackers to target a business IT infrastructure, thus giving ITSecurity Professionals a leverage and helps businesses improveupon their security postures by finding and removing vulnerabilitiesbefore the bad guys find and exploit them.

Focus of the training is to prepare participants for relevantcertification like “Certified Ethical Hacker (CEH)” and SANS GIACCertified Penetration Tester (GPEN).

IS0 27001: ISMS Lead Implementer

A 2 day Lead Implementer interactive training workshop on ISO27001 (ISMS) is provided to facilitate the client organization and itskey stake holders for better understanding the requirements of thestandard and provide participants the necessary skills to design,implement and get certification of ISMS.

Certified Information Systems SecurityProfessional (CISSP)

The goal of the Kualitatem’s CISSP 5 day training seminar is toprepare professionals for the challenging CISSP certificationexam, covering the objectives of the exam as defined in the (ISC)2Common Body of Knowledge. CISSPs are expected to have abroad range of skills across security policy development andmanagement, as well as technical understanding of a wide rangeof security controls across all disciplines within informationsecurity. Our CISSP training will provide you with a quick andproven method for mastering this huge range of knowledge.

The Kualitatem Factor

Experienced and Certified SecurityProfessionals

Standardized, Safe and Controlled Test LabEnvironment

Strong Technology and Process BasedTesting Methodologies Strict Adherence to Industry Standards Comprehensive and Robust Solutions

About Kualitatem

Kualitatem (Pvt) Ltd. is independent software andIT auditing company providing end to end servicesacross software and IT infrastructure auditinglifecycle to a global clientele. We have servedsome distinguished clients in the Government,Health, Finance, Leasing and Enterprise businesssectors.

We work with our clients as their quality growthpartners and provide them with IT Security andProcess auditing services against standards likeISO 27001:2005, BS 25999:2007, ISO 9216, TMMand CMM. Our software auditing and qualityassurance portfolio revolves around variety ofrequirements including functionality, platformcompatibility, performance, usability, security andpenetration, code reviews and automation testing.

www.kualitatem.com Email: [email protected]