Information Security Audit

Client Requirements

PSU Bank concerned about the security data, applications & RBI compliance.

Solution

Our Services included:

  • Review of Policy, Procedures & BCP/DRP documents
  • Network Architecture Review
  • Hardware Forensics
  • Vulnerability Assessment & Penetration Testing (VAPT)
  • Configuration Review of Servers, Network & Security Devices
  • Application Security Review
  • External Penetration Testing
  • Database Security Review
  • Process Review / IS Audit

Result

Client mitigated the vulnerabilities, hardened the configurations & updated the documents as per our recommendations.

Web Application Security Audit

Client Requirements

The Company has developed a paid platform where their users can publish their podcasts and wanted to assure their customers about its application security.

Solution

Security testing was performed on the desired application and a detailed vulnerability report was shared with client which discloses the description, Impact and the solution to patch the vulnerability was shared.

Result

The recommendations provided by the AKS was implemented in the application and the solution was so fruitful to the client where they can provide a secure platform to their customers.

Mobile Application Audit

Client Requirements

Client had a desire to provide a secure platform in form of a Mobile Application where their customers can register any of their grievances with their products with an ease.

Solution

A stringent security test was performed which has revealed the flaws in the application which could lead to the breach of data privacy of the customers and many other security gaps which would lead the company to undergo a cyber-attack.

Result

The Company has upgraded their existing build of application with the recommended security patches and released a secure version of application.

Forensic Investigation of Computer Systems

Client Requirements

A Pharmaceutical Company concern about infringement of trade secret of newly developed medicine and due to security concern they want forensic investigation and analysis of computer system used inside the organization at their site.

Solution

Our Services included:

  • Choosing best practices and approach for extraction of evidence
  • Choose the best suitable Forensic Software/Hardware
  • Imaging of evidences from the devices
  • Investigation and Analysis
  • Live Forensics Analysis
  • Prepare Investigation Report

Result

Investigation and Analysis of the computer systems have been taken place for gathering all the evidences and investigation report has been prepared.

Data Recovery of Hard Disk

Client Requirements

A Financial Company want to recover all the data from formatted Hard Disk.

Solution

Our services included:

  • Chain of Custody
  • Follow best practices and approach for recovery of data
  • Choose the best suitable Forensic Software/Hardware for Data Recovery
  • Data Recovery Process on Device
  • Delivery of Recovered Data along with Report

Result

All the Data has been recovered from the hard disk category wise and report has been prepared.