Professional Documents
Culture Documents
Cybersecurity Services –
Based on NIST 1.1
Framework
Business Asset
• Identify critical business processes
Environment Management
[ID.BE] [ID.AM] • Document Information flows
• Establish policies for cybersecurity that
includes roles and responsibilities
• Maintain hardware and software
inventory
Risk Assessment • Identify contracts with external partners
Governance [ID.RA]
[ID.GV] • Identify Risk Management processes
Protect
Anomalies
• Install and update anti-virus
and Events
and other malware detection
[DE.AE]
software
Solution
Maintenance
Architecting
Support
APP SECURITY
• Static, Dynamic, & GOVERNANCE RISK
Runtime AND COMPLIANCE
•application testing
• eDiscovery & Classification
•Application security-as-a-
service •Information Management
•Dev-sec-ops
OUR
TECHNOLOGY
EXPERTISE
DATA SECURITY END POINT SECURITY
• Data De-identification • Lifecycle management
(encryption/tokenization) •Patching &
•Key management containerization
•H/W-based trust •Application virtualization
assurance •Mobile and Server
•Messaging security Management
SECURITY OPERATIONS
• Real-time detection
•Workflow automation
•Open source data
ingestion
•Hunt and investigation