SlideShare ist ein Scribd-Unternehmen logo
1 von 36
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
INTRODUCTION
▪ Prime Infoserv LLP is an IT-services company with range of solutions on wide
platforms and technologies. The aim is to deliver solutions that enhance
performance, lower costs, reduce risk and build competitive value additions by
improving reliability, speed and agility.
▪ Our Vision is to offer the best products and services to exceed customer
expectations resulting customer delight. The aim is to enable concrete business
growth through a process driven approach along with technology. Prime helps its
clients to transform their business to the next leap in order to improve their
proposition and competitive positioning.
▪ The offerings combine an array of integrated services and products that reveals top-
of-the-range technology with in-depth domain expertise. The approach is based on
solutions & services with OEM agnostic framework.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
• Founded by a team of expert professionals with a vision to make a big
difference.
• Our Strategic teaming partnerships provide an ecosystem to deliver
niche and best of breed services in field of IT Solutions.
• Consistent record of over 80% of business coming from repeat
customers.
• Best practices built delivery record of successful project deliveries over
the years.
• A dedicated and passionate team of brilliant professionals focused on
creating lasting value.
ABOUT US
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
PRIME SERVICE PORTFOLIO
BUILT MANAGE OPERATE
TECHNOLOGY
INTEGRATION
IT
INFRASTRUCTURE
MANAGEMENT
CONSULTING SKILL
DEVELOPMENT
360 Degree Life Cycle Management
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
• Documentation, Gap Analysis & Remediation:
– Study AS-IS of the infrastructure and create asset inventory, documentation, schematic
– GAP Analysis with best practises and industry benchmarking, Network & Application Audit, VAPT
(Vulnerability Assessment and Penetration Testing),
– Remediation Plan and handholding on the gaps identified.
• Compliance Audit & Certification:
– Quality Management System (ISO 9001:2015),
– Environment Management System (ISO14001:2004),
– Information Security Management System (ISO 27001:2013),
– IT Service Management (ISO 20001:2011),
– Food Safety Management Systems (ISO22000:2005),
– Capability Maturity Model Integration (CMMi) Level 3 & Level 5,
– Payment Card Industry Data Security Standard (PCI-DSS),
– Customer satisfaction management(ISO 10000),
– Occupational health and safety management system (OHSAS 18001),
– Risk management (ISO 31000:2009).
PRIME INFOSEC OFFERINGS
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
PRIME INFOSEC OFFERINGS
• Gateway & End Point Security
– Unified Threat Management, Firewall, IPS (Intrusion Protection System), IDS (Intrusion Detection
System),
– End Points, Total Protection, Data Leakage Protection (DLP), Anti APT (Anti Persistent Threat – Deep
Security).
• Cyber Forensic
– Turnkey Deployment of Digital Forensic Laboratory & Fraud Investigation Labs,
– Security Analytics & Threat Intelligence,
– Intelligently identify and mitigate cyber threats and risks,
– Security information and event management (SIEM) Solutions.
• Workshops
– ISO 9001, 20000, 27001 Lead Auditor, Implementer and Awareness Workshops
– Certified Information Systems Security Professional (CISSP),
– Certified Information Systems Auditor (CISA),
– Certified Ethical Hacking (CEH),
– Other Technology and Soft Skill Oriented Skill Development Programs.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
KEY OEM PARTNERSHIPS
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
OUR CLIENTS - THEY SPEAK FOR US
VULNERABILITY ASSESSMENT &
PENETRATION TESTING
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
VA-INTRODCUTION
Vulnerability Assessment is the systematic examination of an information system (IS)
or product to determine the adequacy of security measures. It helps to identify
security deficiencies, provide data from which one can predict the effectiveness of
proposed security measures, and confirm the adequacy of such measures after
implementation.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
VA-ILLUSTRATED
Features
▪ Discover and manage all network devices and applications
▪ Identify and remediate network security vulnerabilities
▪ Measure and manage overall security exposure and risk
▪ Ensure compliance with internal policies and external regulations
Why is it required?
▪ To Identify the present vulnerability that exist in your network , like missing patches,
Buffer overflow, Default user names & Password , Un used users, file/folder Sharing
found on the network etc.
▪ Who require it?
▪ Every Company which has computer network requires this service and has critical data
which flows on the network.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
HOW VA CAN BE IMPLEMENTED?
▪ Study the scope of IT architecture & components required for assessment with the
boundary of analysis. and formulating the processes and action-plan for
recuperating server’s operation.
▪ Define the scan Policy for each target. Scan Policy to define the level of scan
▪ Information gathering, Finger printing, Port scanning, Password analysis, Attack
stimulation.
▪ Scan the targeted network (s) and host (s), based on the defined scan policy collect
the scan results and analyze for security loopholes, configuration errors, Default
installation settings, overlooked setups, password quality, firmware/software
revisions, Patch fixes, security policy violations etc.
▪ Comparing the configurations with the industry standards and rating them.
▪ Submission of Assessment Reports with suggestions and recommendations to fix
the vulnerabilities.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
TYPICAL ROI
▪ Vulnerability Assessment Services help organizations identify, understand, and
address security or compliance issues that affect their internal information
assets. Our in-depth and comprehensive testing also provides organizations with an
accurate snapshot of their security posture along with an excellent baseline to
measure change and ongoing security efforts.
▪ Reducing unnecessary procurement of network which cost to companies
▪ Reducing network management cost
▪ Utilizing full benefits of existing LAN
▪ Reducing downtime by 90%
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
PT-INTRODCUTION
A penetration test is a method of evaluating the security of a computer system or
network by simulating an attack by a malicious hacker. The process involves an active
analysis of the system for any weaknesses, technical flaws or vulnerabilities. This
analysis is carried out from the position of a potential attacker, and can involve active
exploitation of security vulnerabilities.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
PT-ILLUSTRATED
Features
▪ Enables you to see if your networks and web applications can be penetrated from the outside
▪ Gives you a comprehensive list of all security vulnerabilities on your perimeter network
▪ Provides a rapid and efficient inventory of the devices, services, and vulnerabilities of internet-connected
networks
▪ Why is it required?
From a business perspective, penetration testing helps safeguard your organization against failure, through:
▪ Preventing financial loss through fraud or through lost revenue due to unreliable business systems and
processes.
▪ Proving due diligence and compliance to your industry regulators, customers and shareholders.
▪ Who require it?
▪ Every Company which has computer network requires this service and has critical data which flows on the
network.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
HOW PT CAN BE IMPLEMENTED?
▪ Study the scope of IT architecture & components required for assessment with the
boundary of analysis. and formulating the processes and action-plan for
recuperating server’s operation.
▪ Define the scan Policy for each target. Scan Policy to define the level of scan
▪ Information gathering, Finger printing, Port scanning, Password analysis, Attack
stimulation.
▪ Scan the targeted network (s) and host (s), based on the defined scan policy collect
the scan results and analyze for security loopholes, configuration errors, Default
installation settings, overlooked setups, password quality, firmware/software
revisions, Patch fixes, security policy violations etc.
▪ Comparing the configurations with the industry standards and rating them.
▪ Submission of Assessment Reports with suggestions and recommendations to fix
the vulnerabilities.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
PRIME METHODOLOGY ON VAPT
▪ Identification of Target: Evaluating the risk of getting information about the target.
▪ Port Scanning: Finding open ports on the target host.
▪ System Fingerprinting: Finding what OS and services present on the target.
▪ Identification Of Vulnerabilities: With Vulnerability assessment being conducted via
commercial tools and freeware, security loopholes and possible threats can be
analysed
▪ Exploitation: Potential threats via pre existing vulnerabilities present within the
system are exploited via running appropriate exploits, scripts etc to gain
unauthorised access to systems and simultaneously escalate the attacker’s privilege.
▪ Result Collation and Report Writing: Projecting report in easy understanding way,
and is mapped with SAN TOP 10 Vulnerabilities.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
BENEFITS OF VAPT
▪ Enhanced ability to make effective security improvements to existing systems and applications.
▪ Enhanced ability to comply with regulatory requirements.
▪ More efficient allocation of available resources.
▪ Higher return on security investments.
▪ Can Compare Network current posture with SANS TOP 20 Vulnerabilities.
▪ Preventing financial loss through fraud (hackers, extortionists and disgruntled employees) or through lost
revenue due to unreliable business systems and processes.
▪ Proving due diligence and compliance to your industry regulators, customers and shareholders. Non-
compliance can result in your organization losing business, receiving heavy fines, gathering bad PR or
ultimately failing. At a personal level it can also mean the loss of your job, prosecution and sometimes-
even imprisonment.
▪ Protecting your brand by avoiding loss of consumer confidence and business reputation.
▪ Identifying vulnerabilities and quantifying their impact and likelihood so that they can be managed
proactively; budget can be allocated and corrective measures implemented.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
TYPICAL ROI FOR PT
▪ Vulnerability Assessment Services help organizations identify, understand, and address
security or compliance issues that affect their internal information assets. Our in-depth
and comprehensive testing also provides organizations with an accurate snapshot of
their security posture along with an excellent baseline to measure change and ongoing
security efforts.
▪ Ethical Hacking help organizations identify, understand, and address security or
compliance issues that affect their External information assets before attackers exploit
them. Our in-depth and detail oriented testing also provides organizations with an
accurate snapshot of their security posture along with an excellent baseline to measure
change and ongoing security efforts.
▪ Reducing unnecessary procurement of network which cost to companies
▪ Reducing network management cost
▪ Utilizing full benefits of existing LAN
▪ Reducing downtime by 90%
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
BENEFITS-ROI
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
DEPLOYMENT OF TOOLS
F-Secure Radar, Foundstone, QualysGuard, Nessus, Nmap,
Nikto, SQL Map, GFI Languard, Kismet, CAIN & Abel, Brutus,
Netsparker, Brutus, Netsparker, BURP Suite, W3AF, Paros
Proxy, Webscarab, Skipfish, Acunetix, APPscan, Metasploit,
Wireshark (formerly known as Ethereal), ICROSOFT Baseline
Security Analyzer etc.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
SAMPLE REPORTS
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
SAMPLE REPORTS
0 200 400 600 800 1000 1200 1400 1600
Windows 7
Windows 8.1
Windows 10
Windows Server 2012
Windows XP
High
Med
Low
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
SAMPLE REPORTS
Assets Vulnerabilities
IP Address Server
Name
Critical High Medium Low Info Remarks
10.147.0.3 File Server 1 1 17 6 41 Critical- Vulnerability in Schannel Could Allow
Remote Code Execution
10.147.0.5 Payroll D.M
Client Server
2 2 5 0 28 Critical- Unsupported UNIX OS,
Critical- Rexecd Service Detection
High- RPC multiple overflows, rlogin service
detection
High- SNMP Agent Default Community Name (public)
10.147.0.11 DLO Server 0 1 13 2 38 High- MS12-020: Vulnerabilities in Remote Desktop
Could Allow Remote Code Execution.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
SAMPLE REPORTS
Asset Type Criticality Vulnerability Remediation
File Server Critical MS14-066: Vulnerability in Schannel Could Allow Remote
Code Execution.
The remote Windows host is affected by a remote code
execution vulnerability due to improper processing of
packets by the Secure Channel (Schannel) security package.
An attacker can exploit this issue by sending specially crafted
packets to a Windows server.
Microsoft has released a set of patches for
Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012,
8.1, and 2012 R2.
High NFS Share User Mountable.
Some of the NFS shares exported by the remote server could
be mounted by the scanning host. An attacker may exploit
this problem to gain read (and possibly write) access to files
on remote host.
Configure NFS on the remote host so that only
authorized hosts can mount the remote shares.
The remote NFS server should prevent mount
requests originating from a non-privileged port.
Medium SSL Certificate Cannot Be Trusted.
The server's X.509 certificate does not have a signature from
a known public certificate authority.
Purchase or generate a proper certificate for
this service.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
SIMILAR CUSTOMERS IN THE DOMAIN
West Bengal Electronics Industry Development Corporation Limited (WEBEL), Kerala State
Electronics Development Corporation Ltd (KELTRON), Meghalaya Govt – Health Applications,
Dahabshiil - Africa, Grasim Bhiwani Textiles (Aditya Birla), Brac Bank Bangladesh, Arunachal
Pradesh labor Dept.- Itanagar, Robi Axiata - Bangladesh, Standard Chartered Bank, Beneras Hindu
University, Sify Technologies Limited, TCG (Skytech), Haldia Institute of Technology, Saudi Electric,
Brac Bank – Bangladesh, Medica Hospitality, Esoft Arena – Bangladesh, Sigma Systems –
Banglades, Tata Memorial etc.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
INFORMATION SECURITY ASSESSMENT
Company Overview
India’s Leading Textile Brand
Pan India Presence with multiple outlets, branches, distributors
Management Challenges Our Approach Benefits
 Managing overall IT Infrastructure
and Information Security was difficult
 There was gap in process, quality,
skills and manageability
 Define and Develop an Integrated IT
Service Management & Information
Security Management Systems
 Certification by an Independent
Registrar to give their customers
confidence
•Understand the business direction
•Identify refined business requirements;
•Perform IT capability assessment;
•Comprehensive Gap Analysis to identify
and prioritize the Improvement areas
•Identify and select IT alternatives
•Vulnerability Analysis & Risk Assessment
•Establish a Integrated management
Systems framework so that information
security and Service management
becomes a mainstream function within
their IT organization
• Compliance to ISO 27001 &ISO
20000 processes have helped them
build more robust processes for
Information Security and lead to the
Certification of their Data Centre to
ISO 27001 and ISO 20000 for their IT
Support.
• Clear Roadmap for Continual
Improvement of the IQMS
• Best in class Security & Service
Management practices and tools
identified, implemented
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
INTEGRATED MANAGEMENT SYSTEM FOR
IT SERVICES & INFORMATION SECURITY
Company Overview
Management Challenges Our Approach Benefits
 Helping the newly formed IT
Organisation develop IT Service &
Security Management capabilities
aligned with ISO best practices
 Define and Develop an Integrated IT
Service Management & Information
Security Management Systems
 Certification by an Independent
Registrar to give their customers
confidence
• Six month long project delivered in partnership
with our ITSM Consulting Partner and our
Consultants helped in bringing in Information
Security best practices through people and
organisation development.
• Comprehensive Gap Analysis to identify and
prioritize the Improvement areas
• Vulnerability Analysis & Risk Assessment
• Establish a Integrated management Systems
framework so that information security and
Service management becomes a mainstream
function within their IT organization
•Significant Reduction in Security and
Service Management issues
•Clear Roadmap for Continual Improvement
of the IQMS
•Best in class Security & Service
Management practices and tools identified,
implemented leading to successful
certification to ISO 20000 & ISO 27001
The Leading Telecom Player in Bangladesh
The Client organisation is the leading telecommunications service provider in Bangladesh with more than 31 million subscribers.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
Africa’s Largest & Fastest growing Financial Services Company along with Group
A leading financial services group with it’s group telecom company across Africa
INTEGRATED MANAGEMENT SYSTEM FOR
IT SERVICES & INFORMATION SECURITY
Company Overview
Management Challenges Our Approach Benefits
 Client was building Mobile Money
Application Platform with secured IT
infrastructure in DC-DR Landscape.
 The infrastructures comprises Sun
Servers, EMC VNX Storage, Cisco
Switches, Juniper firewall, APC online
UPS, Solaris OS, Oracle Database and
Jboss, Weblogic etc as application
framework.
 They wanted to have efficient
Information Security Design,
Deployment , Gap Analysis.
• Configuration of Juniper Firewall with Active
Passive Fail-over with Access Policy ,Deep
Packet Inspection , VLAN, DMZ & Trusted Zone
classification , Site to site VPN Successfully
published mobile money application through
the public IP.
• Necessary documentations created and
training/orientation/handholding carried out
for the customer team.
• A dedicated service delivery team working
from Prime onsite with PMP and ITIL best
practices.
• No Single point of failure infrastructure
• High availability and secured heterogeneous
IT infrastructure
• Improved end-user experience and
availability of skilled resources by Prime
Managed Service Team in Remote NOC,
India
• Higher service availability and improved
problem response and resolution
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
VALUE ADDITIONS
▪ ISO 9001 and ISO 27001 Certified Organization
▪ Multiple Resources with ISO 27001 , CEH, CISSP, CISA kind of certifications
▪ Prior Experience of handling similar projects for Indian E-Governance like Webel,
Keltron, Arunachal Govt, Meghalaya Govt.
▪ Prime Follows ISO 27001 benchmarking for Information Security, ISO 20000 for IT
Service Management and PMI Standard for Project Management
▪ Prime conducts VAPT under several international benchmarking like NIST SP 800-39,
FISMA, ISO 27001:2013 standards, SANS TOP 20 and OWASP Top 10 etc.
▪ Core team having expertise in Working Large System Integrators, Telco ,
Government , Certification Authority and ITES segment.
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
Expertise on Tools
 Industry renowned tools like Found stone, Retina,
Arcsight, Qualiys Guard, Sentinel, RSA Envision,
Core Impact, Immunity Canvas etc.
 Open Source Tools like Airmon, Airodump-ng,
Aireplay-ng, MBSA, Acunetix, Nessus, Nmap, Nikto,
SARA, Cain and Abel, Burp Suite, Brutus, Xprobe,
THC_AMAP, SINFP, Hping2, Wireshark, Network
Stuff, Scanrand, Hmap, Superscan, BackTrack,
Metasploit integration, Kismet, Ophcrack, Ettercap,
Wireshark, BeEF etc
Key Customers
 Aditya Birla (Jayashree Textile and Grasim)
 West Bengal Electronics Industry Development Corporation Limited
(WEBEL).
 Kerala State Electronics Development Corporation Limited (KSEDC),
 Meghalaya and Kerala Government Data Centre,
 Arunachal Labour Dept.
 Dahabshiil, Africa
 Brac Bank, Bangladesh
 Robi Axiata, Bangladesh
 Peerless Securities, Guiness Securities
Value Additions
 Core Competency
 Cost Effectiveness
 Well-defined and Consistent service levels
 Knowledge base of latest IT Vulnerabilities and
threats
 High Quality Human Resources
 Past Experience with similar assignments
 Subject matter expertise in various domains
Team Strength
 Core team comprises of CISA / CISM / CA /DISA (ICAI) / MCSE /
CCNA / CISSP / CEH / CHFI with extensive industry experience
encompassing, systems and application development, information
systems assurance, finance, IS security and IT Audits.
 ISO 27001, 20000, 9000 LA,
 Auditors from Certifying Authority background (BSI, KPMG, TUV
etc.).
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
If you are thinking of information security,
We can guide you like five elements of life!
www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
Mobile : +91 98300 17040, +91 90624 67427
Email : smukherjee@primeinfoserv.com , info@primeinfoserv.com
, sales@primeinfoserv.com
Web : www.primeinfoserv.com
PRIME INFOSERV LLP
(AN ISO 9001:2015 AND 27001:2013 CERTIFIED ENTERPRISE)
DL-124, 1st Floor, Salt Lake, Sector – II, Kolkata – 700091, India
Phone : +91 33 4008 5677
CONTACT US

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?Bhavin Shah
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 

Was ist angesagt? (20)

Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Application Security
Application SecurityApplication Security
Application Security
 

Ähnlich wie VAPT Services by prime

Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllAmbrose Nwadike
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesLOGON Software
 
Company Profile - MegaaOpes BPO V5
Company Profile - MegaaOpes BPO V5Company Profile - MegaaOpes BPO V5
Company Profile - MegaaOpes BPO V5Kannan Rajendran
 
Mintivo business IT service catalogue
Mintivo business IT service catalogueMintivo business IT service catalogue
Mintivo business IT service catalogueChris Gough
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochurerandfield
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overviewlynotts
 

Ähnlich wie VAPT Services by prime (20)

ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_All
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
IT solution
IT solutionIT solution
IT solution
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Tripwire PCI Customer Success Stories
Tripwire PCI Customer Success StoriesTripwire PCI Customer Success Stories
Tripwire PCI Customer Success Stories
 
Company Profile - MegaaOpes BPO V5
Company Profile - MegaaOpes BPO V5Company Profile - MegaaOpes BPO V5
Company Profile - MegaaOpes BPO V5
 
Mintivo business IT service catalogue
Mintivo business IT service catalogueMintivo business IT service catalogue
Mintivo business IT service catalogue
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochure
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
Erzam profl oct18
Erzam profl oct18Erzam profl oct18
Erzam profl oct18
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 

Mehr von Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contractingPrime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marPrime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsPrime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - NetmagicPrime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft TeamsPrime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a TargetPrime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentationPrime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 

Mehr von Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

VAPT Services by prime

  • 1. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
  • 2. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 INTRODUCTION ▪ Prime Infoserv LLP is an IT-services company with range of solutions on wide platforms and technologies. The aim is to deliver solutions that enhance performance, lower costs, reduce risk and build competitive value additions by improving reliability, speed and agility. ▪ Our Vision is to offer the best products and services to exceed customer expectations resulting customer delight. The aim is to enable concrete business growth through a process driven approach along with technology. Prime helps its clients to transform their business to the next leap in order to improve their proposition and competitive positioning. ▪ The offerings combine an array of integrated services and products that reveals top- of-the-range technology with in-depth domain expertise. The approach is based on solutions & services with OEM agnostic framework.
  • 3. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 • Founded by a team of expert professionals with a vision to make a big difference. • Our Strategic teaming partnerships provide an ecosystem to deliver niche and best of breed services in field of IT Solutions. • Consistent record of over 80% of business coming from repeat customers. • Best practices built delivery record of successful project deliveries over the years. • A dedicated and passionate team of brilliant professionals focused on creating lasting value. ABOUT US
  • 4. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 PRIME SERVICE PORTFOLIO BUILT MANAGE OPERATE TECHNOLOGY INTEGRATION IT INFRASTRUCTURE MANAGEMENT CONSULTING SKILL DEVELOPMENT 360 Degree Life Cycle Management
  • 5. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 • Documentation, Gap Analysis & Remediation: – Study AS-IS of the infrastructure and create asset inventory, documentation, schematic – GAP Analysis with best practises and industry benchmarking, Network & Application Audit, VAPT (Vulnerability Assessment and Penetration Testing), – Remediation Plan and handholding on the gaps identified. • Compliance Audit & Certification: – Quality Management System (ISO 9001:2015), – Environment Management System (ISO14001:2004), – Information Security Management System (ISO 27001:2013), – IT Service Management (ISO 20001:2011), – Food Safety Management Systems (ISO22000:2005), – Capability Maturity Model Integration (CMMi) Level 3 & Level 5, – Payment Card Industry Data Security Standard (PCI-DSS), – Customer satisfaction management(ISO 10000), – Occupational health and safety management system (OHSAS 18001), – Risk management (ISO 31000:2009). PRIME INFOSEC OFFERINGS
  • 6. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 PRIME INFOSEC OFFERINGS • Gateway & End Point Security – Unified Threat Management, Firewall, IPS (Intrusion Protection System), IDS (Intrusion Detection System), – End Points, Total Protection, Data Leakage Protection (DLP), Anti APT (Anti Persistent Threat – Deep Security). • Cyber Forensic – Turnkey Deployment of Digital Forensic Laboratory & Fraud Investigation Labs, – Security Analytics & Threat Intelligence, – Intelligently identify and mitigate cyber threats and risks, – Security information and event management (SIEM) Solutions. • Workshops – ISO 9001, 20000, 27001 Lead Auditor, Implementer and Awareness Workshops – Certified Information Systems Security Professional (CISSP), – Certified Information Systems Auditor (CISA), – Certified Ethical Hacking (CEH), – Other Technology and Soft Skill Oriented Skill Development Programs.
  • 7. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 KEY OEM PARTNERSHIPS
  • 8. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 OUR CLIENTS - THEY SPEAK FOR US
  • 10. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
  • 11. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 VA-INTRODCUTION Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures. It helps to identify security deficiencies, provide data from which one can predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
  • 12. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 VA-ILLUSTRATED Features ▪ Discover and manage all network devices and applications ▪ Identify and remediate network security vulnerabilities ▪ Measure and manage overall security exposure and risk ▪ Ensure compliance with internal policies and external regulations Why is it required? ▪ To Identify the present vulnerability that exist in your network , like missing patches, Buffer overflow, Default user names & Password , Un used users, file/folder Sharing found on the network etc. ▪ Who require it? ▪ Every Company which has computer network requires this service and has critical data which flows on the network.
  • 13. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 HOW VA CAN BE IMPLEMENTED? ▪ Study the scope of IT architecture & components required for assessment with the boundary of analysis. and formulating the processes and action-plan for recuperating server’s operation. ▪ Define the scan Policy for each target. Scan Policy to define the level of scan ▪ Information gathering, Finger printing, Port scanning, Password analysis, Attack stimulation. ▪ Scan the targeted network (s) and host (s), based on the defined scan policy collect the scan results and analyze for security loopholes, configuration errors, Default installation settings, overlooked setups, password quality, firmware/software revisions, Patch fixes, security policy violations etc. ▪ Comparing the configurations with the industry standards and rating them. ▪ Submission of Assessment Reports with suggestions and recommendations to fix the vulnerabilities.
  • 14. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 TYPICAL ROI ▪ Vulnerability Assessment Services help organizations identify, understand, and address security or compliance issues that affect their internal information assets. Our in-depth and comprehensive testing also provides organizations with an accurate snapshot of their security posture along with an excellent baseline to measure change and ongoing security efforts. ▪ Reducing unnecessary procurement of network which cost to companies ▪ Reducing network management cost ▪ Utilizing full benefits of existing LAN ▪ Reducing downtime by 90%
  • 15. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
  • 16. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 PT-INTRODCUTION A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities.
  • 17. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 PT-ILLUSTRATED Features ▪ Enables you to see if your networks and web applications can be penetrated from the outside ▪ Gives you a comprehensive list of all security vulnerabilities on your perimeter network ▪ Provides a rapid and efficient inventory of the devices, services, and vulnerabilities of internet-connected networks ▪ Why is it required? From a business perspective, penetration testing helps safeguard your organization against failure, through: ▪ Preventing financial loss through fraud or through lost revenue due to unreliable business systems and processes. ▪ Proving due diligence and compliance to your industry regulators, customers and shareholders. ▪ Who require it? ▪ Every Company which has computer network requires this service and has critical data which flows on the network.
  • 18. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 HOW PT CAN BE IMPLEMENTED? ▪ Study the scope of IT architecture & components required for assessment with the boundary of analysis. and formulating the processes and action-plan for recuperating server’s operation. ▪ Define the scan Policy for each target. Scan Policy to define the level of scan ▪ Information gathering, Finger printing, Port scanning, Password analysis, Attack stimulation. ▪ Scan the targeted network (s) and host (s), based on the defined scan policy collect the scan results and analyze for security loopholes, configuration errors, Default installation settings, overlooked setups, password quality, firmware/software revisions, Patch fixes, security policy violations etc. ▪ Comparing the configurations with the industry standards and rating them. ▪ Submission of Assessment Reports with suggestions and recommendations to fix the vulnerabilities.
  • 19. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 PRIME METHODOLOGY ON VAPT ▪ Identification of Target: Evaluating the risk of getting information about the target. ▪ Port Scanning: Finding open ports on the target host. ▪ System Fingerprinting: Finding what OS and services present on the target. ▪ Identification Of Vulnerabilities: With Vulnerability assessment being conducted via commercial tools and freeware, security loopholes and possible threats can be analysed ▪ Exploitation: Potential threats via pre existing vulnerabilities present within the system are exploited via running appropriate exploits, scripts etc to gain unauthorised access to systems and simultaneously escalate the attacker’s privilege. ▪ Result Collation and Report Writing: Projecting report in easy understanding way, and is mapped with SAN TOP 10 Vulnerabilities.
  • 20. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 BENEFITS OF VAPT ▪ Enhanced ability to make effective security improvements to existing systems and applications. ▪ Enhanced ability to comply with regulatory requirements. ▪ More efficient allocation of available resources. ▪ Higher return on security investments. ▪ Can Compare Network current posture with SANS TOP 20 Vulnerabilities. ▪ Preventing financial loss through fraud (hackers, extortionists and disgruntled employees) or through lost revenue due to unreliable business systems and processes. ▪ Proving due diligence and compliance to your industry regulators, customers and shareholders. Non- compliance can result in your organization losing business, receiving heavy fines, gathering bad PR or ultimately failing. At a personal level it can also mean the loss of your job, prosecution and sometimes- even imprisonment. ▪ Protecting your brand by avoiding loss of consumer confidence and business reputation. ▪ Identifying vulnerabilities and quantifying their impact and likelihood so that they can be managed proactively; budget can be allocated and corrective measures implemented.
  • 21. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 TYPICAL ROI FOR PT ▪ Vulnerability Assessment Services help organizations identify, understand, and address security or compliance issues that affect their internal information assets. Our in-depth and comprehensive testing also provides organizations with an accurate snapshot of their security posture along with an excellent baseline to measure change and ongoing security efforts. ▪ Ethical Hacking help organizations identify, understand, and address security or compliance issues that affect their External information assets before attackers exploit them. Our in-depth and detail oriented testing also provides organizations with an accurate snapshot of their security posture along with an excellent baseline to measure change and ongoing security efforts. ▪ Reducing unnecessary procurement of network which cost to companies ▪ Reducing network management cost ▪ Utilizing full benefits of existing LAN ▪ Reducing downtime by 90%
  • 22. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 BENEFITS-ROI
  • 23. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 DEPLOYMENT OF TOOLS F-Secure Radar, Foundstone, QualysGuard, Nessus, Nmap, Nikto, SQL Map, GFI Languard, Kismet, CAIN & Abel, Brutus, Netsparker, Brutus, Netsparker, BURP Suite, W3AF, Paros Proxy, Webscarab, Skipfish, Acunetix, APPscan, Metasploit, Wireshark (formerly known as Ethereal), ICROSOFT Baseline Security Analyzer etc.
  • 24. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 SAMPLE REPORTS
  • 25. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 SAMPLE REPORTS 0 200 400 600 800 1000 1200 1400 1600 Windows 7 Windows 8.1 Windows 10 Windows Server 2012 Windows XP High Med Low
  • 26. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 SAMPLE REPORTS Assets Vulnerabilities IP Address Server Name Critical High Medium Low Info Remarks 10.147.0.3 File Server 1 1 17 6 41 Critical- Vulnerability in Schannel Could Allow Remote Code Execution 10.147.0.5 Payroll D.M Client Server 2 2 5 0 28 Critical- Unsupported UNIX OS, Critical- Rexecd Service Detection High- RPC multiple overflows, rlogin service detection High- SNMP Agent Default Community Name (public) 10.147.0.11 DLO Server 0 1 13 2 38 High- MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution.
  • 27. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 SAMPLE REPORTS Asset Type Criticality Vulnerability Remediation File Server Critical MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution. The remote Windows host is affected by a remote code execution vulnerability due to improper processing of packets by the Secure Channel (Schannel) security package. An attacker can exploit this issue by sending specially crafted packets to a Windows server. Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, 2008 R2, 8, 2012, 8.1, and 2012 R2. High NFS Share User Mountable. Some of the NFS shares exported by the remote server could be mounted by the scanning host. An attacker may exploit this problem to gain read (and possibly write) access to files on remote host. Configure NFS on the remote host so that only authorized hosts can mount the remote shares. The remote NFS server should prevent mount requests originating from a non-privileged port. Medium SSL Certificate Cannot Be Trusted. The server's X.509 certificate does not have a signature from a known public certificate authority. Purchase or generate a proper certificate for this service.
  • 28. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 SIMILAR CUSTOMERS IN THE DOMAIN West Bengal Electronics Industry Development Corporation Limited (WEBEL), Kerala State Electronics Development Corporation Ltd (KELTRON), Meghalaya Govt – Health Applications, Dahabshiil - Africa, Grasim Bhiwani Textiles (Aditya Birla), Brac Bank Bangladesh, Arunachal Pradesh labor Dept.- Itanagar, Robi Axiata - Bangladesh, Standard Chartered Bank, Beneras Hindu University, Sify Technologies Limited, TCG (Skytech), Haldia Institute of Technology, Saudi Electric, Brac Bank – Bangladesh, Medica Hospitality, Esoft Arena – Bangladesh, Sigma Systems – Banglades, Tata Memorial etc.
  • 29. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 INFORMATION SECURITY ASSESSMENT Company Overview India’s Leading Textile Brand Pan India Presence with multiple outlets, branches, distributors Management Challenges Our Approach Benefits  Managing overall IT Infrastructure and Information Security was difficult  There was gap in process, quality, skills and manageability  Define and Develop an Integrated IT Service Management & Information Security Management Systems  Certification by an Independent Registrar to give their customers confidence •Understand the business direction •Identify refined business requirements; •Perform IT capability assessment; •Comprehensive Gap Analysis to identify and prioritize the Improvement areas •Identify and select IT alternatives •Vulnerability Analysis & Risk Assessment •Establish a Integrated management Systems framework so that information security and Service management becomes a mainstream function within their IT organization • Compliance to ISO 27001 &ISO 20000 processes have helped them build more robust processes for Information Security and lead to the Certification of their Data Centre to ISO 27001 and ISO 20000 for their IT Support. • Clear Roadmap for Continual Improvement of the IQMS • Best in class Security & Service Management practices and tools identified, implemented
  • 30. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 INTEGRATED MANAGEMENT SYSTEM FOR IT SERVICES & INFORMATION SECURITY Company Overview Management Challenges Our Approach Benefits  Helping the newly formed IT Organisation develop IT Service & Security Management capabilities aligned with ISO best practices  Define and Develop an Integrated IT Service Management & Information Security Management Systems  Certification by an Independent Registrar to give their customers confidence • Six month long project delivered in partnership with our ITSM Consulting Partner and our Consultants helped in bringing in Information Security best practices through people and organisation development. • Comprehensive Gap Analysis to identify and prioritize the Improvement areas • Vulnerability Analysis & Risk Assessment • Establish a Integrated management Systems framework so that information security and Service management becomes a mainstream function within their IT organization •Significant Reduction in Security and Service Management issues •Clear Roadmap for Continual Improvement of the IQMS •Best in class Security & Service Management practices and tools identified, implemented leading to successful certification to ISO 20000 & ISO 27001 The Leading Telecom Player in Bangladesh The Client organisation is the leading telecommunications service provider in Bangladesh with more than 31 million subscribers.
  • 31. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 Africa’s Largest & Fastest growing Financial Services Company along with Group A leading financial services group with it’s group telecom company across Africa INTEGRATED MANAGEMENT SYSTEM FOR IT SERVICES & INFORMATION SECURITY Company Overview Management Challenges Our Approach Benefits  Client was building Mobile Money Application Platform with secured IT infrastructure in DC-DR Landscape.  The infrastructures comprises Sun Servers, EMC VNX Storage, Cisco Switches, Juniper firewall, APC online UPS, Solaris OS, Oracle Database and Jboss, Weblogic etc as application framework.  They wanted to have efficient Information Security Design, Deployment , Gap Analysis. • Configuration of Juniper Firewall with Active Passive Fail-over with Access Policy ,Deep Packet Inspection , VLAN, DMZ & Trusted Zone classification , Site to site VPN Successfully published mobile money application through the public IP. • Necessary documentations created and training/orientation/handholding carried out for the customer team. • A dedicated service delivery team working from Prime onsite with PMP and ITIL best practices. • No Single point of failure infrastructure • High availability and secured heterogeneous IT infrastructure • Improved end-user experience and availability of skilled resources by Prime Managed Service Team in Remote NOC, India • Higher service availability and improved problem response and resolution
  • 32. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 VALUE ADDITIONS ▪ ISO 9001 and ISO 27001 Certified Organization ▪ Multiple Resources with ISO 27001 , CEH, CISSP, CISA kind of certifications ▪ Prior Experience of handling similar projects for Indian E-Governance like Webel, Keltron, Arunachal Govt, Meghalaya Govt. ▪ Prime Follows ISO 27001 benchmarking for Information Security, ISO 20000 for IT Service Management and PMI Standard for Project Management ▪ Prime conducts VAPT under several international benchmarking like NIST SP 800-39, FISMA, ISO 27001:2013 standards, SANS TOP 20 and OWASP Top 10 etc. ▪ Core team having expertise in Working Large System Integrators, Telco , Government , Certification Authority and ITES segment.
  • 33. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 Expertise on Tools  Industry renowned tools like Found stone, Retina, Arcsight, Qualiys Guard, Sentinel, RSA Envision, Core Impact, Immunity Canvas etc.  Open Source Tools like Airmon, Airodump-ng, Aireplay-ng, MBSA, Acunetix, Nessus, Nmap, Nikto, SARA, Cain and Abel, Burp Suite, Brutus, Xprobe, THC_AMAP, SINFP, Hping2, Wireshark, Network Stuff, Scanrand, Hmap, Superscan, BackTrack, Metasploit integration, Kismet, Ophcrack, Ettercap, Wireshark, BeEF etc Key Customers  Aditya Birla (Jayashree Textile and Grasim)  West Bengal Electronics Industry Development Corporation Limited (WEBEL).  Kerala State Electronics Development Corporation Limited (KSEDC),  Meghalaya and Kerala Government Data Centre,  Arunachal Labour Dept.  Dahabshiil, Africa  Brac Bank, Bangladesh  Robi Axiata, Bangladesh  Peerless Securities, Guiness Securities Value Additions  Core Competency  Cost Effectiveness  Well-defined and Consistent service levels  Knowledge base of latest IT Vulnerabilities and threats  High Quality Human Resources  Past Experience with similar assignments  Subject matter expertise in various domains Team Strength  Core team comprises of CISA / CISM / CA /DISA (ICAI) / MCSE / CCNA / CISSP / CEH / CHFI with extensive industry experience encompassing, systems and application development, information systems assurance, finance, IS security and IT Audits.  ISO 27001, 20000, 9000 LA,  Auditors from Certifying Authority background (BSI, KPMG, TUV etc.).
  • 34. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 If you are thinking of information security, We can guide you like five elements of life!
  • 35.
  • 36. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040 Mobile : +91 98300 17040, +91 90624 67427 Email : smukherjee@primeinfoserv.com , info@primeinfoserv.com , sales@primeinfoserv.com Web : www.primeinfoserv.com PRIME INFOSERV LLP (AN ISO 9001:2015 AND 27001:2013 CERTIFIED ENTERPRISE) DL-124, 1st Floor, Salt Lake, Sector – II, Kolkata – 700091, India Phone : +91 33 4008 5677 CONTACT US