Network Security
•Firewall management
•Network Access Control
•Security Network Design
•Unidentified Threat Management
•Remote Access Solution
•IPS / DS / PT
Data Security
•Data Encryption
•DLP – Data Leak Prevention
Infrastructure Security
•DNS Security
•Email Security
•Unified Communications
•SIEM
•Log & False / Positive Analysis
•Zero Day Vulnerability Tracking
System Security
•Windows Linux Server Security
•Vulnerability & Patch Management
•Automated Vulnerability Scanning
Application Security
•Web Application Security
•OWASP Top 10 And SANS CWE Top 25
•Database Activity Monitoring
•Content Security
•Secure File Transfer
•Web Application Firewall
•Secure Coding Practices
•Testing for Vulnerability Validation
•Application Penetration Testing
•Secure Code Review
Mobility Security
•Authentication & On-boarding
•Rogue Access Point Detection
•Wireless Secure Protocol
•OWASP Mobile Top 10
•Mobile App Automated Scanning
•Dynamic Mobile App Analysis
•Secure Coding Practices
•Mobile Penetration Testing
•Secure Code Review
Risk Governance & Compliance
•ISO 27001/HIPPA/PCI, SOC
•Firewall Compliance & Management
•Physical & Logical Review
•Configuration Compliance
•Audit & Compliance Analysis
Advance Threat Protection
•Botnet Protection
•Malware Analysis & Anti-Malware Solution
•Sandboxing & Emulation
•Application White Listing
•Network Forensics
•Automated Security Analytics