SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Vulnerability assessment and penetration
testing service.


Business challenges
 Did you know that the number of vulnerabilities in your operating
  systems and applications are extremely high?                                Key benefits
 Did you know that unattended vulnerabilities will expose your company        Proactive early warning security
                                                                                intelligence with respect to

  malicious attacks?                                                            vulnerabilities thereby preventing
                                                                                unnecessary and expensive
 Is it possible to identify these vulnerabilities periodically and patch
  them to avoid being attacked by hackers?
                                                                               Helps meet regulatory and
 Is there a way to attempt penetration into my network and
                                                                                compliance requirements
  applications in a controlled manner to identify weaknesses in my
                                                                               Trusted advisory services
  security architecture and Information Security Management
                                                                                provided with our service helps
  System (ISMS)?                                                                your organization be future-ready
                                                                                in preventing attacks
All applications and operating systems have in-built vulnerabilities due to    Customized reports provide
                                                                                comprehensive information to help
used by hackers to launch attacks on the network, websites and servers of       you take both strategic and
                                                                                tactical decisions
information and loss of customer data. This can result in loss of image
among customers as well as costly lawsuits filed by customers or
regulatory agencies. It is important for enterprises to periodically assess
these vulnerabilities and patch them to avoid such attacks.


Our offering
Hackers are getting bolder and more creative in the way they attempt to
penetrate the networks and websites of enterprises. Survey data has
consistently proved that around 70% of such attacks are from disgruntled
or malicious employees. Therefore it is very important for enterprises to
test the robustness of their security infrastructure (the firewall policies,
type of IDS etc.) and their Information Security Management System (the
password policy, privileges given to employees to access various systems
etc.). This is done through periodic 'penetration testing' exercises and
action taken on any gaps and weaknesses unearthed.
Mindtree's 'Vulnerability Assessment and Penetration Testing' service uses
a combination of state-of-art tools like Accunetix WVS, Metasploit Pro,
Nessus Professional, Backtrack etc, and experienced ethical hackers with
appropriate certifications like CEH. It helps enterprises conduct intelligent
'Vulnerability Assessments' and 'Penetration Tests'. Our ethical hackers
have many years of experience in this field and have exposure to a wide
range of industry verticals and operating systems, applications, networks


and their expertise is used to help our customers identify and take action
on vulnerabilities and weaknesses in their IT assets and Information
Security Management System (ISMS). They can conduct black box, gray box
and white hat penetration tests to help customers improve their security
infrastructure and information security policies. Mindtree delivers this
service through our ISO 27001 certified cyber lab as well as by deputing
our consultants to customer offices. Mindtree also helps customers patch
the vulnerabilities unearthed by our consultants.


With the aid of tools used, we provide insightful reports to the top
management as well as the IT operations staff of the enterprise. This
will help them take both strategic and tactical decisions to make their
Information Security Management System (ISMS) future-ready.




About Mindtree
Mindtree is a global information technology solutions company with revenues of over USD 400 million. Our team of 11,000 experts
engineer meaningful technology solutions to help businesses and societies flourish. We enable our customers achieve competitive
advantage through flexible and global delivery models, agile methodologies and expert frameworks.

www.mindtree.com                                                                                           ©Mindtree Ltd 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len
 

Was ist angesagt? (20)

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Application security
Application securityApplication security
Application security
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
what is security
what is securitywhat is security
what is security
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
Application Security
Application SecurityApplication Security
Application Security
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 

Ähnlich wie Vulnerability assessment and penetration testing service.

Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
Arun Gopinath
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 

Ähnlich wie Vulnerability assessment and penetration testing service. (20)

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Understanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdfUnderstanding Vulnerability Assessment.pdf
Understanding Vulnerability Assessment.pdf
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Cracking the Code: The Role of VAPT in Cybersecurity
Cracking the Code: The Role of VAPT in CybersecurityCracking the Code: The Role of VAPT in Cybersecurity
Cracking the Code: The Role of VAPT in Cybersecurity
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Penetration Testing, Importance, Current Situation, and all Issues
Penetration Testing, Importance, Current Situation, and all IssuesPenetration Testing, Importance, Current Situation, and all Issues
Penetration Testing, Importance, Current Situation, and all Issues
 

Mehr von Mindtree Ltd.

Mehr von Mindtree Ltd. (20)

Mindtree: Shift to Continuous Delivery
Mindtree: Shift to Continuous DeliveryMindtree: Shift to Continuous Delivery
Mindtree: Shift to Continuous Delivery
 
Automation and upgrade of a multi country rollout testing, accelerated by Min...
Automation and upgrade of a multi country rollout testing, accelerated by Min...Automation and upgrade of a multi country rollout testing, accelerated by Min...
Automation and upgrade of a multi country rollout testing, accelerated by Min...
 
Developing a contact center application to enhance customer service in the ba...
Developing a contact center application to enhance customer service in the ba...Developing a contact center application to enhance customer service in the ba...
Developing a contact center application to enhance customer service in the ba...
 
Designing a syndicated loans deal management system.
Designing a syndicated loans deal management system.Designing a syndicated loans deal management system.
Designing a syndicated loans deal management system.
 
Facilitating a unique identification enrolment and authentication system.
Facilitating a unique identification enrolment and authentication system.Facilitating a unique identification enrolment and authentication system.
Facilitating a unique identification enrolment and authentication system.
 
Implementing a comprehensive digital content management solution.
Implementing a comprehensive digital content management solution.Implementing a comprehensive digital content management solution.
Implementing a comprehensive digital content management solution.
 
Developed a cutting edge Cloud-based solution for enhancing Indirect Material...
Developed a cutting edge Cloud-based solution for enhancing Indirect Material...Developed a cutting edge Cloud-based solution for enhancing Indirect Material...
Developed a cutting edge Cloud-based solution for enhancing Indirect Material...
 
Managed support cost and enhanced performance for the world's largest gaming ...
Managed support cost and enhanced performance for the world's largest gaming ...Managed support cost and enhanced performance for the world's largest gaming ...
Managed support cost and enhanced performance for the world's largest gaming ...
 
Online platform for a leading American consumer electronic enterprise.
Online platform for a leading American consumer electronic enterprise.Online platform for a leading American consumer electronic enterprise.
Online platform for a leading American consumer electronic enterprise.
 
Next generation SaaS solution with end-to-end ownership for a leading mobile ...
Next generation SaaS solution with end-to-end ownership for a leading mobile ...Next generation SaaS solution with end-to-end ownership for a leading mobile ...
Next generation SaaS solution with end-to-end ownership for a leading mobile ...
 
Cloud based analytics framework for the world's largest B2B e-commerce servic...
Cloud based analytics framework for the world's largest B2B e-commerce servic...Cloud based analytics framework for the world's largest B2B e-commerce servic...
Cloud based analytics framework for the world's largest B2B e-commerce servic...
 
Developing high customer engagement through mobile application for a major cr...
Developing high customer engagement through mobile application for a major cr...Developing high customer engagement through mobile application for a major cr...
Developing high customer engagement through mobile application for a major cr...
 
Crafting an intuitive and efficient marketing portal to enhance product manag...
Crafting an intuitive and efficient marketing portal to enhance product manag...Crafting an intuitive and efficient marketing portal to enhance product manag...
Crafting an intuitive and efficient marketing portal to enhance product manag...
 
Enhancing Web Content Management System (WCMS) and service.
Enhancing Web Content Management System (WCMS) and service.Enhancing Web Content Management System (WCMS) and service.
Enhancing Web Content Management System (WCMS) and service.
 
SharePoint partnership.
SharePoint partnership.SharePoint partnership.
SharePoint partnership.
 
Improving employee and broker productivity with portal technologies.
Improving employee and broker productivity with portal technologies.Improving employee and broker productivity with portal technologies.
Improving employee and broker productivity with portal technologies.
 
SITEsMART - Connecting with the on-the-move consumer.
SITEsMART - Connecting with the on-the-move consumer.SITEsMART - Connecting with the on-the-move consumer.
SITEsMART - Connecting with the on-the-move consumer.
 
Powering performance through a tailor-made solution.
Powering performance through a tailor-made solution.Powering performance through a tailor-made solution.
Powering performance through a tailor-made solution.
 
Developing softphone driver for Unified Communication Market (UCF)
Developing softphone driver for Unified Communication Market (UCF)Developing softphone driver for Unified Communication Market (UCF)
Developing softphone driver for Unified Communication Market (UCF)
 
Mindtree SAP BI, BO & HANA services
Mindtree SAP BI, BO & HANA servicesMindtree SAP BI, BO & HANA services
Mindtree SAP BI, BO & HANA services
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Vulnerability assessment and penetration testing service.

  • 1. Vulnerability assessment and penetration testing service. Business challenges  Did you know that the number of vulnerabilities in your operating systems and applications are extremely high? Key benefits  Did you know that unattended vulnerabilities will expose your company  Proactive early warning security intelligence with respect to malicious attacks? vulnerabilities thereby preventing unnecessary and expensive  Is it possible to identify these vulnerabilities periodically and patch them to avoid being attacked by hackers?  Helps meet regulatory and  Is there a way to attempt penetration into my network and compliance requirements applications in a controlled manner to identify weaknesses in my  Trusted advisory services security architecture and Information Security Management provided with our service helps System (ISMS)? your organization be future-ready in preventing attacks All applications and operating systems have in-built vulnerabilities due to  Customized reports provide comprehensive information to help used by hackers to launch attacks on the network, websites and servers of you take both strategic and tactical decisions information and loss of customer data. This can result in loss of image among customers as well as costly lawsuits filed by customers or regulatory agencies. It is important for enterprises to periodically assess these vulnerabilities and patch them to avoid such attacks. Our offering Hackers are getting bolder and more creative in the way they attempt to penetrate the networks and websites of enterprises. Survey data has consistently proved that around 70% of such attacks are from disgruntled or malicious employees. Therefore it is very important for enterprises to test the robustness of their security infrastructure (the firewall policies, type of IDS etc.) and their Information Security Management System (the password policy, privileges given to employees to access various systems etc.). This is done through periodic 'penetration testing' exercises and action taken on any gaps and weaknesses unearthed.
  • 2. Mindtree's 'Vulnerability Assessment and Penetration Testing' service uses a combination of state-of-art tools like Accunetix WVS, Metasploit Pro, Nessus Professional, Backtrack etc, and experienced ethical hackers with appropriate certifications like CEH. It helps enterprises conduct intelligent 'Vulnerability Assessments' and 'Penetration Tests'. Our ethical hackers have many years of experience in this field and have exposure to a wide range of industry verticals and operating systems, applications, networks and their expertise is used to help our customers identify and take action on vulnerabilities and weaknesses in their IT assets and Information Security Management System (ISMS). They can conduct black box, gray box and white hat penetration tests to help customers improve their security infrastructure and information security policies. Mindtree delivers this service through our ISO 27001 certified cyber lab as well as by deputing our consultants to customer offices. Mindtree also helps customers patch the vulnerabilities unearthed by our consultants. With the aid of tools used, we provide insightful reports to the top management as well as the IT operations staff of the enterprise. This will help them take both strategic and tactical decisions to make their Information Security Management System (ISMS) future-ready. About Mindtree Mindtree is a global information technology solutions company with revenues of over USD 400 million. Our team of 11,000 experts engineer meaningful technology solutions to help businesses and societies flourish. We enable our customers achieve competitive advantage through flexible and global delivery models, agile methodologies and expert frameworks. www.mindtree.com ©Mindtree Ltd 2012