Threat and Vulnerability Services
Identity & Access Management (I&AM)
Governance, Risk & Compliance (GRC)
- Web Application Security Assessment
- Vulnerability Assessment & Penetration Testing
- Remediation of Vulnerabilities
- Host/Network/Wireless Security Assessment
- Vulnerability Assessment & Penetration Testing
- Patch Management
- Database Security Assessment
- Vulnerability Assessment & Penetration Testing
- Secure Configuration
- Secure Infrastructure Design
- VoIP/VPN Security Testing
- Authentication & Encryption Services
- Endpoint Protection
- Product Engineering
- Engineering of IAM/Federation Products and Solutions
- Support all phases of Product Engineering Lifecycle
- Solution & Integration
- Making applications Identity-aware
- Development of SSO provisioning and Federation connectors
- Professional Services
- End-to-end enterprise architecture planning
- Enterprise IAM/Federation solutions
- Federation solutions for SaaS/cloud apps
- Risk, IT, Security, Compliance & Privacy
- Regulatory and Standards compliance
- SOX 404, COBIT, PCI-DSS, ITIL, ISO family, HIPAA
- Specialized risk-based services
- Assessment, remediation, baseline security
- Data classification, baseline security
- Information risk management
- Technology, Network & facility infrastructure security
- Data Center Security Assessment
- Vulnerability Management
- Application Security
- IT Operational Risk Management
- Business Continuity and Recovery
- Information Security Management Systems
- Implementation of eGRC Tools
- SAP GRC, Archer, Cura Technologies, Oracle GRC, IBM Open Pages etc.