Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Information Security Assessments Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis,

Similar presentations


Presentation on theme: "Information Security Information Security Assessments Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis,"— Presentation transcript:

1 Information Security Information Security Assessments Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis, Report & Briefing.. Copy rights reserved www.hkit.in

2 Information Security Information Security Assessments In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and misuse. There are many software and hardware available in the market to protect our computers and its data but very often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software, Networking Etc. Hence we over spend and underutilize and still have very unstable IT Infrastructure susceptible to Data Pilferage and Abuse Copy rights reserved www.hkit.in

3  HK IT’s expert consultation offers enterprises/academic/NGO’s the cost effective consultations on IT end to end solutions.  HK IT Solution’s information security services protect your business from Data breaches, negative publicity, damaged credibility and disruption of services.  We deliver world-class offerings, security knowledge and experience to provide you with comprehensive information security.  SOX/ISO/COBIT/HIPAA Standards  Clienteles in India / Overseas Our Expertize Copy rights reserved www.hkit.in

4 Technology, Services, Support and Training Our offerings combine unmatched technology, services, support and training from Highly certified security experts. That means no more managing multiple vendors, no more juggling disparate services and no more worrying about the security of your data and business. With our track record of success, it means more time for your organization to focus on other operational areas, while we focus on information security excellence for you and your organization. Copy rights reserved www.hkit.in

5 Dr. THENNARASU.E (Harsha) PhD  Researcher Information Security on High End Applications  Information Security Assessment & Cybercrimes investigator  Member of DSCI (Data Security Council of India)  Trainer Certified Ethical Hacker  Overseas Auditing Experience  Guest Lecturing (Universities, Colleges)  Guest Speaker of Innovating for India Seminar  Technical Committee Member, SIT Dr. XXXXXXXXXXXXXXXXX (PhD, IIM)  OWASP XXXXX Chapter Lead  XXXX OWASP Chapter Mentor  Invited Trainer at OWASP India conference.  Cloud Alliance Security Chennai Chapter Lead.  Reviewer of ISACA CRISC Review Manual 2011.  Cloud Security Alliance – Control Matrix Co- Author  ISACA Best Trainer for the Year 2011-2012 Mr. V. RAJENDRAN  President of Cyber Society of India  Certified ISO 27001 Lead Auditor  conducted many ISO 9000 series and 27001 audits  Practising Cyber Crime, Banking and Cyber Law related cases  Authored the book on "IT Security" for Indian Institute of Banking and Finance  Subject matter expert & Trainer for Tamil Nadu Police academic  Pursuing PhD in the area of Cyber Crime in Banks Mr. TS. RAGHUNATHAN  Certified security professional by Cisco, Cyberoam, Watch guard, etc.,  Practitioner Information & Network Security assessments/audits  VA/PT specialist  Certified Ethical Hacker  12 year experience in Information & Network Security Domains  Visiting Professor HTC ITMR for Information Security Copy rights reserved www.hkit.in

6 IT Infrastructure Audits Breach Assessments Server Audits Application Assessments Network Audit Vulnerable Assessment/ Penetration test Data center Assessment Web Server Audit Power Audit Gap Analysis/Risk Assessments Process Audit (ITIL Based) IT Assessments / Audits Copy rights reserved www.hkit.in

7 5000+ users IT Infrastructure Audited by HK IT security experts HK-Training and Audit Copy rights reserved www.hkit.in

8 Case Study Case 1: Aravind Eye Hospitals Challenge: Huge Internet Bandwidth requirement, continuous network drops, non availability of IT when there are emergency, impact on productivity Post Audit Benefit: Audit report revealed all improper configurations, vulnerabilities from internal & external, decreased downtime, Patched all Internal & external vulnerabilities Case 2: KMCH (Kovai Medical Centre & Hospitals) (similar case study on Dr. MGR medical college & hospitals) Challenge: IT infrastructure issues, Network chocking, huge internet bandwidth consumptions, applications assessment, compliance, security from internal & external threats Post Audit Benefit: identified all vulnerabilities and designed security design as per top management expectations, resolved network problems, patched for internal & external threats, firewall policies fine tuned, bandwidth utilizations optimized.

9 Copy rights reserved www.hkit.in Case Study Case 3: (SIT- Siddaganga Institute of Technology) Challenge: 5000+ workstations with 7000+ users, huge internet bandwidth requirement and incur huge expenses. Lacking on IT policies, Network Drops, application vulnerabilities. Post Audit Benefit: IT auditing revealed network protocol and design lacking issues and IT policies implemented, saved 13.5 lacs on internet bandwidth upgrade Case 4: Challenge: Voltamp Oman Transformers manufacturer LLC has got huge setup in multiple geographical locations in Oman, facing insecurity on their CAD Designs which is billion dollar worth, also the client don’t have efficient logging system and no mechanism was available to find culprits when there are cyber crimes.... Post Audit Benefit: Million $ benefit by the organization. Their CAD designing have been secured with strongest Information security design, which gave them more business security and protect from business rivals, the client is ready & prepared for ISO certifications.

10 HK Association Clientele Copy rights reserved www.hkit.in

11 Our CSR Initiative to generate revenue for NGO E-waste Collection Program for Supporting Senior Citizens Dignity Foundation In partner with Copy rights reserved www.hkit.in

12 www.hkit.in Thank you Copy rights reserved www.hkit.in


Download ppt "Information Security Information Security Assessments Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis,"

Similar presentations


Ads by Google