SrinivasanSubramaniam
506 views
6 slides
Aug 04, 2015
Slide 1 of 6
1
2
3
4
5
6
About This Presentation
Auriseg is a leading information security company
based out of Chennai, India With a spread over footprint
and rich experience, Auriseg provides complete
information security solutions specializing in
implementing holistic, integrated, and sustainable
information protection programs. We are a full s...
Auriseg is a leading information security company
based out of Chennai, India With a spread over footprint
and rich experience, Auriseg provides complete
information security solutions specializing in
implementing holistic, integrated, and sustainable
information protection programs. We are a full service
information security provider committed to delivering
technology solutions to ensure impenetrable security
to more than 100 customers across India and
USA.
Size: 1.26 MB
Language: en
Added: Aug 04, 2015
Slides: 6 pages
Slide Content
AURISEG
Information Security
WHAT WE DO
Whether you need a quick check-up, in-dep th testing and analysis or constan t care; at Auriseg we have cure for
the common techache. At Auriseg, our consultan ts work with your IT managemen t team to assess, understand,
and enhanc e your current security postur e and implemen t an effective strategy to assure that your most
valuable business asset, information, is always protected. Our team is specializ ed to not only understand, but to
predict, possible vulnerabilities and weakness in your current IT infrastructur e and provide long-term effective
solutions.
AURISEG is a boutique Information Security compan y, committed to consisten tly providing world class
professional security servic es. Our strategy revolves around the need to provide round- the-clock quality
information security servic es and solutions to our customers. We maintain this standar d through our
highly
skilled and pr ofessional team, and custom-designed, customer -centric servic es and pr oducts.
policy and
program
training &
awareness
application
security
Application
Security
Audit
Social
Engineering
Policy &
Standards
Development
& Design
security
outsourcing
Identity &
Access
Management
Threat
Management
Compliance
Monitoring
Log Analysis
& Management
Enterprise
Security
Monitoring
Incident
Response &
Forensics
Vulnerability
Management
security
solutions
& Compliance
Services
Protection of corporate information has become the determining factor between success and failure in today's
global business environmen t. It could be the difference between beating your competitor to market or assuring
that corporate secrets don't leak out, information security has become the most common topic in corporate
boardrooms toda y.
But how do you protect your information from threats and vulnerabilities that you don't know exist? Can you rely
on your already over extended IT managemen t team to be able to "detect and protect" so that your most impor-
tant corporate asse t is secur e?
Security Consulting
Our Security C onsulting servic es allo w us to assist
organization in the planning, designing and
implemen tation of new security technologies into
the corporate infrastructur e, while assessing the
critical IT infrastructur e for proper installation,
con�iguration and security .
Penetration Testing
Our Penetration Testing servic e is designed to
provide a comprehensiv e assessmen t of
organization 's information security . We review
infrastructur e to understand what devices and
applications may leave infrastructur e vulnerable
to exploitation b y real hack ers.
APT Assessment
The Advanced Persisten t Threat (APT) assessmen t
works by bringing in threat-speci�ic technical visibility
and the research capabilities of our world-class
intelligenc e team to identify whether an organization
is or has been compromised, by whom, and what
types of attacks y ou ma y be tar geted by in the futur e.
Zero-day Analysis
Our world-class research and developmen t team
consisting of leading information security
researchers carry out zero-day analysis that
gives organization detailed information about
unkno wn threats and its impact on their
infrastructur e.
Code Review
Our sour ce code review servic e gives organization an
in-dep th pictur e of vulnerabilities present within an
application 's code to minimiz e threats and secure the
application.
Compliance Review
Our Complianc e Reviews are to assess your
security strengths and weaknesses against
international best practic es and standar ds,
including ISO 27001, PCI DSS, SOX, HIPAA, and
GLBA, and provides practical recommendations to
align security with c orporate objectiv es.
Application Security Audit
In the fast growing world of application developmen t,
the threat of security vulnerabilities in application
code is much gr eater than with c orporate ne tworks.
Social Engineering
It is a widely known fact that the humans are
weakest link in any information security system.
Seasoned hackers know that it may be easier to
convince naive emplo yees into disclosing their
passwords than carrying out sophisticated and
protracted brute f orce attack.
Security Outsourcing
By combining best-of-breed technology with
aggressive knowledge-driv en security pr ofessionals,
our Security Outsour cing servic e provide 24/7/365
enterprise security managemen t, allowing
organization to f ocus on their business.
Security Policy & Program
In Security Policy & Program servic e, we work with
organization 's IT and corporate managemen t to
understand their short-, medium- and long-term
objectiv es which help us develop and implemen t
security policies and programs that facilitate
organization 's growth while mitigating the potential
for futur e vulnerabilities.
Solutions
Auriseg solutions platf orm consists of a div erse range of industry c entric solutions tailor ed speci�ically to mee t
the growing needs of progressive organizations. Our solutions are based on years of industry experienc e,
designed to be �le xible, scalable and highly op timized for accomplishing speci�ic inf ormation security needs.
Our backup and disaster recovery solution help organization manage data ef�icien tly in
addition with backup, c opy managemen t, data pr otection and eff ective disaster r ecovery.Backup &
Disaster Recovery
Our Enterprise Security Monitoring solution is an award-winning product that combines
real-time log managemen t, event correlation and analysis. The result is extraor dinary
infrastructur e visibility , security and c ontrol.Enterprise Security Monitoring
Our next generation security monitoring platform rede�ines SIEM by combining network
monitoring, traditional log-centric SIEM, forensics, complianc e, and big data managemen t
and analytics.Security Information &
Event Management
Our Network Behavior Analysis solution helps analyz e behavior of organization 's network
including threats within a network, suspicious activities, unusual network behavior and
unusual user activity .
Network
Behavior Analysis
Our DLP solution helps organization secure data by identifying, monitoring and controlling
�low of sensitiv e data thr oughout the or ganization.Data Leakage Prevention
Our Application Control solution specializes in providing advanced level of application
security by providing high-level application control and only allowing trusted applications
to be run.
Application
Control
Our Vulnerability Management solution features effective vulnerability scanning,
classi�ication, work�low, ticketing and reporting integrated into a single dashboard. Our
approach ensures that our clients continue to receive nonstop expert guidance from our
security team round the clock.
Vulnerability
Management
Our APT Protection solution uses cutting edge technology and provides protection to
organization against targeted and unknown attacks.APT
Protection
Our Compliance Monitoring solution provides organization with the ability to monitor
changes to IT infrastructure as well to ensure that it satis�ies compliance requirements.
Compliance mandates such as PCI, ISO27001, and ADSIC requires businesses to protect,
track, and control access to and usage of sensitive information.
Compliance
Monitoring
Our Threat Management solution provides in-depth protection from emerging threats and
blended vulnerabilities. It also delivers early warning and actionable security intelligence
tailored to your environment.
Threat
Management
Our Email Security solution protects you against spam, viruses and other email threats.
Email
Security
Our Identity & Access Management solution offers a comprehensive and integrated
identity management, endpoint compliance and usage policy enforcement capabilities.
Our solution actively monitors and controls users and devices to provide enhanced
security across the infrastructure.
Identity & Access
Management
Our Partners
About Auriseg
Auriseg is a leading information security company
based out of Chennai, India With a spread over footprint
and rich experience, Auriseg provides complete
information security solutions specializing in
implementing holistic, integrated, and sustainable
information protection programs. We are a full service
information security provider committed to delivering
technology solutions to ensure impenetrable security
to more than 100 customers across India and
USA.
Using our industry knowledge, security-related
expertise and technology capabilities, we offer unique
technology platform and integrated services
framework for our clients. Our industry expertise
extends over Banking-Finance-Insurance, IT and
Consulting, Telecommunications, Research &
Development, and Government. Our solutions
encompass security assurance, compliance,
governance, monitoring, and management services.
Over the years we have perfected the way to holistically manage risks on a continual basis while
progressively reducing the cost. As a global leader, we have with us, some of the best talents in
the industry. Our professionals are extensively trained and certi�ied in CISSP, CISA, CISM, GIAC
GCIH, GIAC GSEC, CEH, CBCP, PMP, ITIL, CoBIT, ISO 20000 and ISO 27001.
Rich and current knowledge on
security risks, threats, and vul-
nerabilities affecting contem-
porary enterprises
Unwavering focus on develop-
ing better ways to manage and
mitigate security risks with
innovative tools, technologies,
processes, and practices
Strong research and develop-
ment
Among the strengths that
distinguish us in the Global
Marketplace are:
AURISEG
Information Security
AURISEG Consulting Private Limit ed
India | USA | Dubai | Singapore | Ghana [email protected]
www.auriseg.com