Information Systems Security

We work as an advisor to understand the nuances of your business. Only after an in-depth analysis, we make security recommendations. Our major security services include

Information Systems (IS) Audit and Investigation

We understand the importance of an effective information system and hence we perform in-depth IS audit and investigation in specialized areas. We review and evaluate the existing policies and IT General Controls (ITGC), examine existing IT infrastructure and its compliance with regulatory requirements. We conduct IS Audit in following areas;
- Hardware
- Network and Communication
- Database
- Business Applications
- Information Security Architecture
- Composite Information Security
- Review of Business Partner Management Procedures
- Baseline & Analysis of Key Business Applications and IT components
- Any other areas to be specifically covered under existing legal framework and regulatory guideline.

Vulnerability Assessment (VA)

We conduct a vulnerability assessment to identify devices on network that are open to known vulnerabilities without compromising the system. Vulnerability Assessment is performed in the areas of Database Service, Core System, Human Resource, Firewall, Routers, Email Server, Mobile Banking etc.

Penetration Test (PT)

We evaluate the network perimeter and firewall from the perspective of an insider/outsider attacker with no inside knowledge of the network. Our services cover the following areas; - External and Internal Penetration Testing
- Physical Security Assessment
- Network Architecture Security Assessment
- Application Security Assessment
- Virtual infrastructure Assessment
- Security Awareness Program Assessment

Revenue Assurance

Revenue assurance is reviewing of systems and records that are associated with revenue streams to ensure billable services are correctly recorded and collected. We shall carryout Detective, Corrective and Preventive activities, controls or processes to identify any revenue leakage within the organization. Our Revenue Assurance services cover following areas:
- Governance (Placement and empowerment in organization)
- Revenue Risk Assessment (Prioritized focus, scope and frequency)
- Event Identification (Periodic reviews and continuous monitoring)
- Impact Analysis (Quantification)
- Recovery and Sustenance (Plugging of revenue losses and process/control/system lapses)
- Communication and Reporting (Timely reporting and escalation)

Digital Forensics

Our specialist will help identify, preserve and analyze any data in any computer, device or network to help you protect your business from inappropriate data use or data loss. The technical skills of our consultants and their ability to adapt those skills and techniques is proven to suit even the most challenging of technical tasks and investigations.

Cyber Investigations

A cyber investigation capability is now an essential component of all organizations who store customer or other valuable data as part of their business. The risk of your network being compromised or ‘hacked’ by the presence of malware, or by individuals within or outside of your organisation, is growing, and the technical defense mechanisms relied upon over the last twenty years are no longer sufficient. Cyber investigations are complex and will include the examination of data from computers, servers, the cloud, switches, routers and many other network devices. Our specialists have the experience and ability to isolate a “rogue” digital footprint whilst gathering evidence of the “cyber event”, all of which is essential to help identify the root cause and to be able to identify malicious intruders.

IT Policy and Strategy Formulation

Our team of experts assists you to develop IT strategies that aligned to your business and strategic objectives in following ways:
-Evaluate existing policies and practices.
-Comparative study of existing information system with industry best practice and regulatory requirements.
-Develop and deploy comprehensive IT policies, standards guidelines and operating procedures

E-governance and Business Process Optimization (BPO) Consulting

Our services in E-governance and BPO will enable you to -Understand the current processes and identify issues with root cause
-Opportunity identification and prioritization of business process
-Identify and eliminate process inefficiencies
-Design future state of art
-Capitalize the benefits of business transformation

Procurement Assessment and Consulting

Procuring a corporate-scale hardware/software can entail heavy investments. Our seasoned consultants can offer suggestions on which equipment, software, or licenses are right for you in following areas:
-Software Procurement Consulting
-Hardware Procurement Consulting
-Hardware Maintenance Procurement Consulting
-IT Asset Management Strategy
-Software License Compliance Consulting

Cyber Security

Cyber security has become one of the important aspects of today’s business. We advise/assist our clients in implementing effective cyber security.