Frontier helps organizations develop and rollout successful information security programs

Similar documents
F R O N T I E R B U S I N E S S S Y S T E M S

E f f e c t i v e p r o c e s s - d r i v e n

Security Controls What Works. Southside Virginia Community College: Security Awareness

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Software as a Service: Guiding Principles

Cloud Security Trust Cisco to Protect Your Data

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

Cybersecurity: What CFO s Need to Know

ISO Information Security Management Systems Foundation

Domain 1 The Process of Auditing Information Systems

Governance and Management of Information Security

Information Security: A Perspective for Higher Education

Penetration testing & Ethical Hacking. Security Week 2014

Effective Software Security Management

Enabling Compliance Requirements using ISMS Framework (ISO27001)

INFORMATION SECURITY STRATEGIC PLAN

Information Security Management Systems

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Digi Device Cloud: Security You Can Trust

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Microsoft s Compliance Framework for Online Services

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Governance, Risk, and Compliance (GRC) White Paper

COMPANY PROFILE REV 4.0

ISO 27001:2005 & ISO 9001:2008

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Security Managing The Risk

CLASSIFICATION SPECIFICATION FORM

Payment Card Industry Data Security Standard

Corporate Presentation

The silver lining: Getting value and mitigating risk in cloud computing

Cisco Advanced Services for Network Security

SECURITY CONSIDERATIONS FOR LAW FIRMS

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Value of Vulnerability Management*

On Demand Penetration Testing Applications Networks Compliance.

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Recent Researches in Electrical Engineering

IT Service Management ITIL, COBIT

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

CYBER SECURITY, A GROWING CIO PRIORITY

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Information Security Specialist Training on the Basis of ISO/IEC 27002

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Caretower s SIEM Managed Security Services

IT Audit in the Cloud

Certified Information Security Manager (CISM)

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

EBS. Remote Infrastructure Managed Services. EBS Ltd. 12, Mihail Tenev Str Sofia Bulgaria office@ebs.bg

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

Service Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.

w w w. f t i ndia.com/esg

WHITE PAPER December, 2008

Preemptive security solutions for healthcare

Creating Business Value with Effective, Pervasive Cloud Security and Cloud Enablement Services

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

VENDOR MANAGEMENT. General Overview

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Information Security Management System and Certification for VAS and Data Provider in Telecom Industry: A Case Study

Securing the Service Desk in the Cloud

locuz.com Professional Services Security Audit Services

HP Cyber Security Control Cyber Insight & Defence

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

SERV SER ICE DE SIGN

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Sytorus Information Security Assessment Overview

Proposal for Business Continuity Plan and Management Review 6 August 2008

Achieving Compliance with the PCI Data Security Standard

QRadar SIEM 6.3 Datasheet

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Guardian365. Managed IT Support Services Suite

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

WHITE PAPER. Mitigate BPO Security Issues

AL RAFEE ENTERPRISES Solutions & Expertise.

The Benefits of an Integrated Approach to Security in the Cloud

Image Area. View Point. Transforming your Metrics Program with the right set of Silver Bullets.

Managing IT Security with Penetration Testing

Position 1: Service Delivery Manager IT Infrastructure. Area: Information Technology - Infrastructure. Location: Mumbai. Qualification & Experience:

Security Assessment and Compliance Services

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination

SECURITY. Risk & Compliance Services

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Val-EdTM. Valiant Technologies Education & Training Services. Workshop on Change Management. All Trademarks and Copyrights recognized.

Cloud computing for enterprises Best Practices

Based on 2008 Survey of 255 Non-IT CEOs/Executives

Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers

Enforcing IT Change Management Policy

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Transcription:

C O N S U L T I N G F O R I N F O R M A T I O N S E C U R I T Y Frontier helps organizations develop and rollout successful information security programs

F R O N T I E R B U S I N E S S S Y S T E M S A brief profile Overview Rs. 196 crores in sales, 500 people and growing,. 14th year of operation. Regional offices in Bangalore. Chennai, Hyderabad and Cochin. Satellite offices across the country. Businesses Professional services (Information Security Consulting, ITIL Practice, Infrastructure Management Services) Networking (Network design and execution, Enterprise network security, switching and routing),computing (Enterprise Sun and IBM P Series, Storage Area Networks) Power conditioning (Design and execution of large scale electric cabling projects and backup power) and Software (IBM Software, Microsoft Gold partner and Citrix Gold partner). Industry recognition Dataquest: Solution Provider Silver Award Dataquest: Most Influential Partners in India Indian Express: Best System integrator Principal Awards: Multiple awards year on year

C ONSULTING FOR INFORMATION SECURITY FRONTIER'S INFORMATION SECURITY CONSULTING T E A M H E L P S O R G A N I Z A T I O N S U N D E R S T A N D INFORMATION SECURITY, IDENTIFY VULNERABILITIES, A S S E S S A N D M I T I G AT E R I S K A N D M E E T T H E COMPLIANCE REQUIREMENTS OF BUSINESS. INFORMATION SECURITY CHALLENGES Information exists in bits and bytes. Unlike a physical and tangible asset, it is not visible or identifiable as a discrete asset. This poses a big challenge to detection of any information security vulnerabilities. It also could engender a false sense of security, since the organization could continue to use data that a hacker may have accessed and compromised. There has been a growing appreciation of these challenges in keeping information secure. Today mature organizations treat Information Security as an enterprise and business issue rather than a technical concern. Some of the reasons for elevating information security to a top management concern are : Emergence of security breaches motivated by financial gain. For example, Credit Card and banking data theft witnessed from call centers and BPO firms over the last few years Client apprehensions about business damage if there is a compromise of privacy or identity theft. This is particularly true of BPO organizations, where it is critical to maintain and demonstrate strong confidentiality processes Increased security risk on account of suppliers, vendors and partners sharing a common network and information base Risk of Competitive intelligence theft, as recently seen in the case of a leading Indian telecom company Escalating incidents of malicious insider activities Discontented ex-employees compromising security by exploiting ineffective internal systems and processes

F R O N T I E R B U S I N E S S S Y S T E M S INFORMATION SECURITY - A BUSINESS REQUIREMENT Several organizations have adopted Information Security Governance as a holistic approach towards systematic enterprise risk management. This helps ensure that information security is aligned with the company's strategic goals and meets the organizational objectives. INFORMATION SECURITY FROM FRONTIER Our consulting teams take a process based approach to each assignment, with meticulous project planning and attention to detail. The approach has built in quality checks to ensure high quality delivery while adhering to project timelines. The deliverables are structured to be clear and concise, and offer management not only a technological perspective, but a business perspective as well for each recommendation. B U I L D I N G B L O C K S Steering Committee Baseline Current State Risk Assessment Build ISMS Rollout ISMS Audit C O N T I N U O U S M O N I T O R I N G

C ONSULTING FOR INFORMATION SECURITY INFORMATION SECURITY CONSULTING SERVICES Frontier offers a wide range of Consulting services to address the complete spectrum of information security requirements of enterprises through the complete information life-cycle. CONSULTING SERVICES Enterprise Security Audit Vulnerability Assessments Penetration Testing Application Security Assessment Compliance Audit Security Process Review ORGANIZATIONAL BENEFITS ASSESS To audit against international standards and frameworks and report on the compliance of processes, applications, technical security and user awareness. Assessment of Technical Controls and Prioritize the Implementation of Controls. Establish an effective Technical Vulnerabilities Reduction Metrics Our Proof of Concept documents add value to the Customers in taking immediate necessary action to ensure that the Systems are hardened To check for the security of the applications as per the OWASP guidelines. Evaluate the portfolio of applications on web connected devises and each layer of application logic for potential vulnerabilities. Compliance audit against ISO27001, GLBA, HIPAA, SAS 70, SOX, SEBI Clause 49, RBI Guidelines and other international security standards/ guidelines To check for the adequacy and compliance of the security policies, procedures and standards. DESIGN BCP/ DRP Consulting ISO/IEC 27001:2005 Consulting Security Policy Design Network Security Architecture Ensuring Business Resilience and providing immediate, accurate and measured response to emergency situations. Facilitate the recovery of Critical Business Process to reduce the overall negative impact on Business and revenue Top Driven and Consistent approach to address Compliance and Risk Management. Establishes Information System/Process Assurance. Frontier's Information Security Consulting follows established methodologies to enable Organization get Certified to ISO 27001 and sustain the ISMS certification. Designing and Developing Information Security Policies, procedures, standards and guidelines after a detailed study of the business process and security requirement. Study the existing network design, network and security device positioning and suggest/ recommend redesign of the network taking into consideration confidentiality, integrity and availability of information and ease of network and security administration. DEPLOY Security Policy Deployment To implement organization wide information security policies and procedures to ensure that corporate information and assets are protected from unauthorized access, disclosure and modification. MANAGE Enterprise Security Management Security Product Management Education & Training To manage the security process and controls organization wide 24/7 and provide real time alerts and recommendations thereby ensuring proactive security measures and preventing disruption of service. To manage the networking & security devices ( servers, routers, firewalls, IPS, UTM's etc) organization wide 24/7 and provide real time alerts and recommendations thereby ensuring proactive security measures and preventing disruption of service. Customized sessions focusing on security concepts, policies & procedures for organizations. Interactive

F R O N T I E R B U S I N E S S S Y S T E M S EXPERIENCE AND EXPERTISE Frontier s team comprises of highly qualified and experienced Information Security Professionals and have International Security Certifications like CISA (Certified Information System Auditor), CISSP (Certified Information System Security Professional) ISO 27001 LA (Lead Auditor), CCNP, CEH, CCIE, CCSA etc. The Team comes with rich experience in implementing and rolling out Information Security Processes for Organizations across different verticals. Our consulting team has consulted organizations from Industry verticals such as IT/ITES, Banking, Financial Institutions, Pharmaceuticals, Manufacturing and government. They have consulted in assessing, design and deployment of robust Information Security Management Systems. We have helped many organizations in meeting information compliance standards such as ISO27001 among many others. Our Security Consulting goes beyond traditional security measures. In addition to assisting Organizations in establishing best security practices, we partner organizations through the entire Information Security lifecycle assisting them in meeting ongoing security challenges and work with them in taking proactive steps to ensure the security and reliability of business systems. FRONTIER PROVIDING COMPREHENSIVE ENTERPRISE LEVEL IT INFRASTRUCTURE SOLUTIONS AND SERVICES Frontier Business systems (P) Ltd is a Rs. 196 crore, 500 people IT infrastructure solutions and services organization. We are recognized as being among the best in design and delivery of solutions in all components of the IT infrastructure: Professional services (Information Security Consulting, ITIL Practice, Infrastructure Management Services) Networking (Complex and enterprise level network design and execution, Enterprise network security, switching and routing),computing (Enterprise Sun and IBM P Series, Storage Area Networks) Power conditioning (Design and execution of large scale electric cabling projects and backup power) and Software. With over twelve years of consistently rapid growth and customer acquisition in a highly competitive environment, Frontier is financially sound and is recognized as a highly competent and professional player by the industry, customers and the press. Frontier has a flat organization structure enabling it to be fast and flexible and offering customers quick turnaround times. The entire organization is customer focused and works diligently at delivering customer satisfaction. It is a partner of choice for many organizations for all their IT infrastructure solutions, provisioning and services. BENEFITS OF WORKING WITH FRONTIER Complete portfolio of Information Security Consulting services Consulting team with experience in executing complex projects IT, ITES, BFSI and Manufacturing industry consulting experience Industry certifications such as CISSP / CISA / CISM / CEH ISO27001:2013 Technology expertise across multiple domains Frontier has over a decade s experience in executing complex projects for enterprise customers Immaculate record of customer retention & consistent acquisition of new customers Currently partnering with over 2000+ customers A flat organization structure. Fast and flexible

C ONSULTING FOR INFORMATION SECURITY Contact us sales@frontier.in Mobile: 9844244200 #3 Wood Street, Bangalore - 560 025. Ph: 080-61609191 Fax: 080-61609192 Woodhead Centre, # 23, Sivaganga Road, Nungambakkam, Chennai - 600 034 Ph: 044-61609191 Fax: 044-61609192 #6-3-866/A/B,Mekins Maheswari, 6th Floor, Greenlands, Begumpet Hyderabad - 500 016 Ph: 040-61609191 Fax: 040-61609192 1st Floor Building NB 4, Unit No 7, Sona Udyog Premises Co-operative Society Ltd., Parsi Panchayat Road, Andheri East, Mumbai - 400 069 Ph: 022-61609191 Fax: 022-61609192 G - 380, Marath, Panampally Nagar, Cochin - 682 036 Ph: 0484-6069191 Fax: 0484-6067610