- Web application
- API security
- Cloud security (Azure, AWS)
- Mobile Security (iOS and Android)
- Thick client
Automated source code scanning and manual source code security analysis.
Network Configuration Review and Audit with Vulnerability Assessment and Penetration testing.
Our Cyber Resilience approach is built on process management and improvement.
We make use of Information Security (ISO 27001), General Data Protection Regulation (GDPR), NIST Cybersecurity framework, COBIT – IT management and various IT governance best practices.
Audits and Assessments
We perform a thorough audit of ISO 9001 (Quality), ISO 27001 (Information Security), ISO 22301 (Business Continuity) and ISO 20000-1 (IT Service Management). During an audit, our empaneled auditor compares the customer’s activities against a list of requirements of an industry management standard.
During an assessment, we normally provide different gradients/characters/dimensions of risk to the organization and its operations. We also suggest list of actions to take in order to mitigate issues and to achieve a more ideal situation rather than simply satisfying a minimum compliance requirement.
We provide customized training to our clients in the area of Project Management, Governance, Risk and Compliance, Risk Management, Payment Card Systems, Information Security, Data Privacy and Technical Vulnerability Management.