13
Rohit Katare – Head Information Security Security Services with Cognic Systems

It security cognic_systems

Embed Size (px)

Citation preview

Page 1: It security cognic_systems

Rohit Katare – Head Information Security

Security Services with Cognic Systems

Page 2: It security cognic_systems

Information SecurityCognic diversified into network security as one of the core functional areas. Our services confine to Penetration Testing, Vulnerability assessments, Employee Training, Consulting and products installation to defend your organization against malicious threats.Our IT security services provide protection across the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners. If you’re searching for associate external ISMS Audit, penetration check, or a security assessment, we can help!

Page 3: It security cognic_systems

Services Offered Over Security• Information Security Audit• Penetration Testing• Vulnerability Assessment• Web Application Security• Managed Security Services• Physical Security• Wireless Security Assessment• Authentication Security• Professional Consulting Services

Page 4: It security cognic_systems

Protecting Your Brand• Making sure that our customers have the right level of security means

that they are less exposed to risk.• Safeguard your customer experience and reputation.• Ensure continuity by protecting access to critical resources.• Reporting to provide clear, comprehensive information to IT and security

personnel.• Core competency in intelligent data recording, data and document

management, and automated workflows.• Process excellence, technological know-how, and subject matter expertise

Page 5: It security cognic_systems

Information Security AuditIndependent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend changes in controls, policies, or procedures.This is an audit of how the confidentiality, integrity and availability of an organizations information assets is assured. The point of doing it is to catch problems before an incident occurs and exposes the problem to the world at large.On the other hand and IT Audit is broader range assessment. For example when pen testing a web server you are looking for vulnerabilities in the service and/or underlying system. An IT Security audit you want to know, how has access to this machine, who is allowed to make changes, are there any change logs being kept, how accurate, etc. There is also a full disclosure of the information.

Page 6: It security cognic_systems

Vulnerability AssessmentThe process of identifying, quantifying, and ranking the vulnerabilities in a system. Vulnerability Assessment involves design, development and review of security policies, procedures, and standards, and validation of the state of security of the information technology infrastructure.• Is the assessment of a system to determine if it has vulnerabilities or

weaknesses that need to be resolved or patched. • Is often known as a flaw or weakness that could be exploited by an outside

attacker or compromised by internal personnel. • Is necessary because many organizations, companies, and health facilities

are required to meet certain compliance.

Page 7: It security cognic_systems

Penetration testingA penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior.It includes vulnerability assessment; however, vulnerability assessment does not include penetration testing.Penetration testing usually falls under three categories:• Black Box• Grey Box • White Box.

Page 8: It security cognic_systems

Web Application security• Web application security testing is the process of securing confidential data

stored online from unauthorized access , modification, extracting valuable data or for the attacks which may be launched to cripple the site.

• Get assurance that your web applications are secure. Where a Penetration Test will bring light to the vulnerabilities on the application infrastructure, a Web Application Assessment will provide a thorough inspection on the application itself. Our security consultants go above and beyond the OWASP Top 10 to assess and test the state of your web-facing applications. This evaluation thoroughly evaluates the underlying operating system, web server and database for vulnerabilities. In addition, we provide actionable recommendations to enhance the security

Page 9: It security cognic_systems

Managed Security Services• Firewall management• Support an improved security posture with customized, more robust, managed firewall

protection for less• Information event management• Help protect your enterprise with better security intelligence and expertise• Intrusion detection and prevention system management• Better secure your network from internet attacks by using a flexible pricing model• Managed protection services• Better protect your networks, servers and desktops from internet threats• Security-rich web gateway management• Help protect critical, web-based applications with more flexible, cost-effective services

Page 10: It security cognic_systems

Authentication security• SSL/TLS certificate for server & network security • Public/Private key encryption• Digital Signature• Email Security

Page 11: It security cognic_systems

Professional consulting servicesIT Security Consulting is built around a highly-skilled team of security consultants that employ some of the most sophisticated tools in the industry. They make use of the latest threat intelligence and countermeasures to help you build effective, efficient security programs in the following areas:

1. Application security services 2. Data security services3. Identity and access management 4. Cyber security consulting4. Network security services 6. PCI security5. Penetration testing services 8. Physical security services9. Security compliance services

Page 12: It security cognic_systems

Physical securityPhysical security services can help you enhance your existing video surveillance systems by integrating digital video surveillance and analytics technologies with your network and IT systems. Our solutions leverage expertise and technology to help you increase the efficiency of your video surveillance system with a scalable, holistic security plan tailored specifically to your business and security objectives. Our capabilities include helping you:• Reduce losses from theft and enhance property safety.• Monitor manufacturing processes to enhance quality management.• Digitize and centralize video content for easy access and review.• We have extensive experience in providing end-to-end physical security services for

organizations of all sizes. Our security specialists address your individual needs to provide the solutions that best match your business goals.

Page 13: It security cognic_systems

WORLD TRADE CENTRE, UNIT NO. 205, 2ND FLOOR, DHOLEPATIL FARMS ROAD, EON FREE ZONE, KHARADI , PUNE, 411014T: +91-9039029062EMAIL: [email protected]