You are on page 1of 2
OUTSIDE THREAT PROTECTION Seay cr Cee pain Reuse camara Ae Lin Previa} ol sia Focused Ops SIEM ‘Security Dashboard Digital Forensics ‘SOC/NOC Monitoring (2417) Escalation Management IT RS$S] (©) Bm Continuous Monitoring & Assessement Security SLA/SLO ‘StuatonalAwareness Reporting CRITICAL ASSETS Security Awareness Waning DieasterRecovery Plan Security Architecture & Design Risk Management Security Policies & Compliance Data Classifeation Penetration Testing Cyber Threat ntligence POLICY MANAGEMENT & PREVENTION MONITORING & RESPONSE / OPERATIONS ADVANCE THREAT PROTECTION + Botnet Protection + Malware Analysis and Anti-Malware Solutions + Sandboxing and Emulation Application Whitelisting | Network Forensics + Automated Security Analytics RISK GOVERNANCE & COMPLIANCE +180 27001/MIPAA/PCI, SOC + Firewall Compliance anc Management + Physical and Logical Reviews = Configuration Compliance + Audit and Compliance Analysis MOBILE SECURITY + Authentication & On-Boarding + Rogue Access Point Detection 1 Wireless Secure Protocols ‘OWASP Mobile Top 10 ‘+ Mobile App Automated Scanning = Dynamic Mobile App Analysis + Secure Coding Practices ‘Mobile Penetration Testing + Secure Code Review NETWORK SECURITY + Firewall Management {Network Access Control + Secure Network Design Unified Threat Management Remote Access Solutions Intrusion Detection/ Prevention Systems + Penetration Testing DATA SECURITY + Data Encryption + Data Leakage Prevention INFRASTRUCTURE SECURITY “eksseony Security “secant 360° + Log and False + Zero Day Vulnerability Tracking SYSTEM SECURITY + Windows/Linux Server Security + Vulnerability/Patch Management + Automated Vulnerability Scanning APPLICATION SECURITY Web Application Security ‘+ OWASP Top 10 and SANS CWE Top 25 + Database Activity Monitoring + Content Security + Secure File Transfer + Web Application Firewall + Secure Coding Practices + Testing for vulnerability Validation + Application Penetration Testing « Secure Code Review

You might also like