SERVICES
Teaching directors about cybersecurity
Art of writing or solving codes
Designing political/activities to prevent/ thwart terrorism
4. Continuity/ Disaster Recovery Planning
Documenting a structured approach with instructions for responding to unplanned incidents
Outsourcing client's computing/ storage resources to a service provider that offers its infrastructure services (IaaS)
6. Computer/ Cyber Law Advisory
Advising on legal system dealings with the Internet, cyberspace, and their respective legal issues
Converting (a text written in code, or a coded signal) into normal, understandable language
Judging overall completeness, accuracy and consistency of data
Sorting and categorizing data into various types, forms or any other distinct class
Vulnerability assessing and penetration testing (using Open Web Application Security Project)
Recovering and investigating material found in digital devices, often in relation to computer crime
Testing via network monitoring tools connectivity between authoritative name servers and local recursive servers
13. Incident Response Management
Addressing/ managing the aftermath of a security breach or cyberattack to limit damage
14. ISO/ ITIL/ PCI DSS/ COBIT Compliance
Ensuring state of being in accordance with established global guidelines or specifications
Examining/ evaluating an organization's information technology infrastructure, policies and operations
Prescribing commercial/ professional procedures which are accepted as being correct or most effective
Ensuring the effective and efficient use of IT in enabling an organization to achieve its goals
Strategizing how a client enables its IT infrastructure/portfolio to operate/ function in line with its business objectives
19. Initial Checkups and Remediation
Cooperatively carrying out initial work prior to a comprehensive VAPT
20. Lawful Black Hat/ Offensive Security
Proactive/ adversarial approach to protect computer systems/ networks/ individuals from attacks
21. Lawful Bootstrapper/ Kernel Hooking
Configuring most basic core of OS that handles resource allocation/ file management/ security
Art of receiving electronic transmissions before they reach the intended recipient
23. Malware Analysis and New Rules/ Heuristics Addition
Determining the functionality/ origin/ potential impact of a given malware sample
Evaluating of the quality or capability of a product or solution
25. Proprietary Penetration Testing
Our own unique methodologies used for exploiting vulnerabilities
26. Protocol and Kernel Forensics
Investigating the most core of a OS for damages (often for repairs) after an event
Assigning user rights and privileges to the users of a system or network
Testing to confirm that a recent program or code change has not adversely affected existing features
29. Remote IT Strategy Implementation
Trying to carry out our services without visiting the client's office site
Using sophisticated instruments to detect signals over a period of time, and to identify and report findings
Securely transmitting/ transferring data such as confidential/ proprietary information over our secure channel
32. Secure Configuration (especially, SELinux)
Configuring the OS and security settings of the client to offer maximum protection/ security
33. Troubleshooting/ Rectification/ Debugging
Supporting the client to remedy any technical difficulties
34. Virtualisation based OS Security
Leveraging advanced virtualisation technology to avert dangers our clients can face
Checking the security of websites, web applications and web services
36. Web/ Network/ System Cyber Defence Review
Reviewing application security of our clients