2. Customers Can Submit suspected files – We analyze the files for you
Behavior analysis of Malware files and code analysis would be conducted
Malware Files can be .exe, DLL, PDF, SWF, Java scripts, VB Scripts and HTML
Customers Can submit the URL which is suspicious, We analyze the site for you
We have Sandbox environment with Specialized Open source tools
and Certified professionals to Analyze Malware files
Calculating the Risk to your environment based on the malware and
Its communication to external Bot net controllers, Data Loss
2
3. Today's Evolving Days Anti Virus Plays Vital Role in an Enterprise
We Support Standalone and Distributed Deployment Models
Standalone Model for Small Business – Deploying Antivirus Software in each
Computer and setting up the Automatic Updates and Logs
Distributed Model for Medium/Large Business – Deploying Client/Server Anti vir
software's And setting up Alerting mechanism, Automatic Updates and Logs
Day to day Operations Support – Virus alerts would be sent to Analyst Mail box
Analyst Will take RDP to Customers Computer and Fix the Virus related Issues b
Checking Registry entries/Cleaners/Temp clean up/Uninstall virus programs
Checking with Enterprise Security Incident Response Teams for any data loss durin
The Virus infection and communication to external Malicious Controllers
3
4. •IDS/IPS Deployments for Small/Medium Business – Architecture, Install , Configure
•IDS Architecture - Designing a Best suitable place for IDS to Cover All Network traf
•IDS Install – Installing IDS Device – Rack Mounting to Console Software Installation
•IDS Configuration – Configuring IDS device w.r.t to Organization requirements
•Log Collector Tool Deployments for Small/Medium Business – Architecture, Install, Configure
•Log Collectors/SIM tools like splunk and OSSIM – collect logs from all the devices.
•Security Operation Center 24X7 Support
•Security Operation Center will be monitoring Enterprise Traffic 24X7 to find any attacks.
•Attacks which are not blocked, would be escalated to Organization for further actions.
4
5. --Vulnerability Scanners Will find the Patch status of servers/desktops--
Deploying Vulnerability Scanners for Medium/Large Enterprises
McAfee Foundstone, Nexpose, Nessus and Qualys Guard are exaples of scann
Vulnerability Scanner will find the Operating System Bugs.
Gathering Organizations Assets, IP address, System names and Importing to
Enterprise scanners.
Performing Monthly, Quarterly and Annual Scans for providing evidence to Aud
Performing On demand scans to Pre-Production Servers, When going Live
Analyzing the vulnerabilities, Assessing the Risk , Calculating the Threat and
Providing the Report on Vulnerability Assessments.
5
6. Penetration testing is a test which would be done by ethical hackers inside the organization
To find loop holes in the system/server/website.
Before External Hackers Hack Organizations Assets and Steal data/reputation – Better
To have a Penetration Test done on Organizations Assets.
We Perform Manual and Automated Penetration Tests by most popular exploitation kits.
Example : Metasploit, backtrack tools, Custom scripts written for different vulnerabilities
From different sources.
We have Certified Ethical Hackers with good expertise on exploitation
6
7. Web Applications are very crucial in organization, where a small vulnerability in the
website can cause lot of financial damage to the firm.
We Deploy/Manage the Web Application Security Tools like IBM App scan, Cenzic etc…
Performing Monthly, Quarterly and Annual Scans on your websites for submitting Audit
Scanning Web applications when they are in last phase of SDLC life cycle for
Vulnerabilities.
Analyzing the web vulnerabilities like SQL Injection, XSS and CSRF etc.. And assisting
The developers – what to fix, how to fix, where to fix.
7
8. Create/Modify/Delete Users for Medium/Large Organizations
Active Directory User administration and Profile management
Creating Role Based user account depending on the Organization requirement
Group Creation and Administrations
User Administration for newly joined employees/third parties
8