Information Security Audit
Client Requirements
PSU Bank concerned about the security data, applications & RBI compliance.
Solution
Our Services included:
- Review of Policy, Procedures & BCP/DRP documents
- Network Architecture Review
- Hardware Forensics
- Vulnerability Assessment & Penetration Testing (VAPT)
- Configuration Review of Servers, Network & Security Devices
- Application Security Review
- External Penetration Testing
- Database Security Review
- Process Review / IS Audit
Result
Client mitigated the vulnerabilities, hardened the configurations & updated the documents as per our recommendations.
Web Application Security Audit
Client Requirements
The Company has developed a paid platform where their users can publish their podcasts and wanted to assure their customers about its application security.
Solution
Security testing was performed on the desired application and a detailed vulnerability report was shared with client which discloses the description, Impact and the solution to patch the vulnerability was shared.
Result
The recommendations provided by the AKS was implemented in the application and the solution was so fruitful to the client where they can provide a secure platform to their customers.
Mobile Application Audit
Client Requirements
Client had a desire to provide a secure platform in form of a Mobile Application where their customers can register any of their grievances with their products with an ease.
Solution
A stringent security test was performed which has revealed the flaws in the application which could lead to the breach of data privacy of the customers and many other security gaps which would lead the company to undergo a cyber-attack.
Result
The Company has upgraded their existing build of application with the recommended security patches and released a secure version of application.
Forensic Investigation of Computer Systems
Client Requirements
A Pharmaceutical Company concern about infringement of trade secret of newly developed medicine and due to security concern they want forensic investigation and analysis of computer system used inside the organization at their site.
Solution
Our Services included:
- Choosing best practices and approach for extraction of evidence
- Choose the best suitable Forensic Software/Hardware
- Imaging of evidences from the devices
- Investigation and Analysis
- Live Forensics Analysis
- Prepare Investigation Report
Result
Investigation and Analysis of the computer systems have been taken place for gathering all the evidences and investigation report has been prepared.
Data Recovery of Hard Disk
Client Requirements
A Financial Company want to recover all the data from formatted Hard Disk.
Solution
Our services included:
- Chain of Custody
- Follow best practices and approach for recovery of data
- Choose the best suitable Forensic Software/Hardware for Data Recovery
- Data Recovery Process on Device
- Delivery of Recovered Data along with Report
Result
All the Data has been recovered from the hard disk category wise and report has been prepared.