ISMS
To define the polices for implementing ISMS or ISO27001, Do the GAP analysis as per the ISMS Policies and reassessment of the Security policies as ISMS Standards and Controls.
Vendor Information
- Vendor Email: ninad@securdefense.com
Description
We are a niche cyber security company established by highly motivated technologists. We offer unparalleled security consulting, auditing and security as a service. We help you organization by offering security solutions and advisory services to identify, control and eliminate security threat to your information technology assets. When it is the matter of trust and securing your organization, you can count on our expertise.
strategy formulation, technology implementation, process orientation, governance risk compliance, privacy protection systems, threat and vulnerability analysis, penetration testing, security education and training
-
Compromise Assessment
$4,500.00Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information.Compromise Assessment
Compromise Assessment involves proactively searching for malware and attackers on your network which maybe present for sometime. They can silently exfiltrate data, listen patiently to confidential data or scan the network to get credentials strong enough to steal key information. -
HIPAA Copmliance
$7,000.00The impact of Electronic Standardization, there was an increased risk to security confidentiality and privacy of individually identifiable health information. HIPAA and the importance of the web has clearly steered healthcare’s E-commerce Re-engineering with special emphasis on the administrative simplification provisions that includes benefits, costs and penalties. These provisions incorporate electronic signature, national identifiers, transactions and code sets, privacy, and security.HIPAA Copmliance
The impact of Electronic Standardization, there was an increased risk to security confidentiality and privacy of individually identifiable health information. HIPAA and the importance of the web has clearly steered healthcare’s E-commerce Re-engineering with special emphasis on the administrative simplification provisions that includes benefits, costs and penalties. These provisions incorporate electronic signature, national identifiers, transactions and code sets, privacy, and security. -
Threat Hunting
$7,500.00Cyber Attacks have become sophisticated than ever before. Organizations are challenged with proactively detecting the attacks, respond and timely mitigation. Typically Organizations deploy Security platforms like firewalls, Intrusion Detection / Preventions etc. However, attackers use new techniques and hide the attack below normal protocol and operations. Not only that, they dynamically keep changing the attack landscape and attack delivery methods. In this advance Technical exercise, we will use Threat intelligence and SIEM (Security Information and Event Management technologies to detect variety of threats.Threat Hunting
Cyber Attacks have become sophisticated than ever before. Organizations are challenged with proactively detecting the attacks, respond and timely mitigation. Typically Organizations deploy Security platforms like firewalls, Intrusion Detection / Preventions etc. However, attackers use new techniques and hide the attack below normal protocol and operations. Not only that, they dynamically keep changing the attack landscape and attack delivery methods. In this advance Technical exercise, we will use Threat intelligence and SIEM (Security Information and Event Management technologies to detect variety of threats. -
Email Threat Protection
$5.00Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps.Email Threat Protection
Anti-phishing and advanced malware protection for O365, One Drive and SharePoint, G suite, G mail, and Google Drive, Slack, Box, DropBox, Citrix ShareFile, or Other Collaboration apps. -
Software Compliance Audit & Management
$3,000.00Our passion is to give our customers the absolutely correct view of all their software Products Deployments. Microsoft, Autodesk, Adobe, Oracle .....products from 136 global software publishers are tracked by our application. . We will install Euladox Auditor on premise & train you on conducting discovery across the network. Conduct Discovery across your network domains & on systems not connected to the network. We will analyze data, run the software recognition engine and map the discovered programs to deployed licenses. We provide a deployment & compliance report for all products installed across your enterprise.Software Compliance Audit & Management
Our passion is to give our customers the absolutely correct view of all their software Products Deployments. Microsoft, Autodesk, Adobe, Oracle .....products from 136 global software publishers are tracked by our application. . We will install Euladox Auditor on premise & train you on conducting discovery across the network. Conduct Discovery across your network domains & on systems not connected to the network. We will analyze data, run the software recognition engine and map the discovered programs to deployed licenses. We provide a deployment & compliance report for all products installed across your enterprise. -
VAPT
$29.00Vulnerability scanning, also commonly known as ‘vuln scan,’ is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service providerVAPT
Vulnerability scanning, also commonly known as ‘vuln scan,’ is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service provider
Product Inquiry
Related products
-
Security Compliance Management
$0.00ARCON | Security Compliance Management (SCM) is a highly effective enterprise-grade solution to identify, assess and mitigate system vulnerabilities. ARCON|SCM automates the entire risk assessment process, manages execution and generates detailed review documentation of IT risk factors. The vulnerability assessment solution enhances IT controls and visibility by setting-up baseline security configurations and policies for disparate technology platforms. Enterprise IT risk management teams find ARCON| SCM as a robust technology to adhere to various IT security standards for compliance purposes as well.Security Compliance Management
ARCON | Security Compliance Management (SCM) is a highly effective enterprise-grade solution to identify, assess and mitigate system vulnerabilities. ARCON|SCM automates the entire risk assessment process, manages execution and generates detailed review documentation of IT risk factors. The vulnerability assessment solution enhances IT controls and visibility by setting-up baseline security configurations and policies for disparate technology platforms. Enterprise IT risk management teams find ARCON| SCM as a robust technology to adhere to various IT security standards for compliance purposes as well. -
Information Security Risk Assessment
$100.00Performing a comprehensive Risk Assessment on the identified critical IT assets would enable the selection of appropriate risk mitigation controls. Intect’s Risk assessment methodology is a multi-fold activity comprising assigning values to the identified critical information assets, threat assessment, & gap analysisInformation Security Risk Assessment
Performing a comprehensive Risk Assessment on the identified critical IT assets would enable the selection of appropriate risk mitigation controls. Intect’s Risk assessment methodology is a multi-fold activity comprising assigning values to the identified critical information assets, threat assessment, & gap analysis -
Horangi Warden Cloud Security tool
$10,000.00$6,000.00Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise.Horangi Warden Cloud Security tool
Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise. -
Information Archive
$0.00Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware.Information Archive
Category: Cloud Security Compliance Management Cyber Security Services Data Breach Protection Data Discovery Data Security |Information Archiving helps organisations meet GDPR and other regulatory requirements by securing and managing critical data. The solution stores an unlimited number of files and communications across email, SMS, and emerging platforms like Microsoft Teams and social media. It helps protect your organisation against compliance violations and unplanned litigations and is an essential replacement for organisations moving off of aging, on-premises, email-only hardware. -
ISMAC SOAR
$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up feeFor large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.ISMAC SOAR
Category: Cloud Security Compliance Management Container Security Log Management Malware Detection and Analysis Security Incident Management and Response SOAR Threat Intelligence and Signature Feeds Vulnerability Assessment | SKU: 003For large and complex environments ISMAC SOAR will enable your team to achieve scalability of your cyberdefense efforts.$25.99Was $29.99Save $4$29.99$25.99 / year with a 14-day free trial and a $6,000.00 sign-up fee
Reviews
There are no reviews yet.