Aujas – An Overview “Aujas” in Sanskrit means “Strength & Energy in a Warrior”
This document contains information, which is the proprietary property of Aujas Networks Pvt. Ltd. (Aujas). This document is received in confidence and Its contents cannot be disclosed or copied without the prior written consent of Aujas.
Copyright © Aujas Networks Pvt. Ltd. All rights reserved
1
Aujas Aujas Confidential Confidential
About Aujas
Aujas is a pure-play Digital Security services company. We offer high-end Security Consulting, Professional & Operations services
• Started in Feb 2008 • Co-founded by experienced Security professionals • Funded by IDG Ventures • Global presence with in Bangalore, Mumbai, Delhi & Dubai • Team of 30+ with consultants from global consulting companies and leading technology companies
2
Mission Create a differentiated and scalable ecosystem of people, processes and technology to help customers minimize and mitigate Digital Security risk.
Vision To be the best in class, pure play provider of advanced secure Technologies & Services
Aujas Aujas Confidential Confidential
A Strong team at the helm Board of Directors
3
Management Team
Kiran Karnik Ex-President, NASSCOM
Srinivas Rao CEO & co-founder
Sudhir Sethi CMD – IDG Ventures
Sameer Shelke COO & co-founder
TCM CFO – IDG Ventures
Manjula Sridhar CTO & co-founder
Prof. N. Bala IIM-B
Shailendra Mishra Sr. VP – Sales, India & ME
Srinivas Rao CEO & co-founder
Navin Kotian VP – Mktg & Alliances
Aujas Aujas Confidential Confidential
Investor Information
4
Aujas Aujas Confidential Confidential
A Comprehensive Security Services Framework
IT GRC Services Mobility & Telecom Security
Software Security Services
Identity Management Services
Vulnerability Management Services ISO Mgmt Services
5
Aujas Aujas Confidential Confidential
IT Governance, Risk & Compliance offerings
6
Compliance Services
ISO 27001 ISO 20001 PCI DSS SAS 70 SOX, HIPAA
Security Audits & Assessments
IT Security Audit IT Security Base-lining services IT Security Policy Network & Internet Security audit
IT Risk Management Services
IT Risk audit IT Risk framework mgmt IT Risk management
Continuous Compliance Management Services
Controls monitoring Compliance Management IT GRC Automation
Aujas Aujas Confidential Confidential
Software and Application Security offerings
7
Secure Coding Training
Secure Coding practices Threat modeling Security testing
PCI DSS Compliance services
Application code review, VA Secure coding training Application security guidelines and framework
Application Security Assessment
Secure Software development Consulting
Secure SDLC training Transformation to Secure SDLC Secure application development consulting
Code Review Threat Modeling Application Vulnerability Assessment (VA) Application Penetration Testing (PT)
Aujas Aujas Confidential Confidential
Vulnerability Management Services
Vulnerability Assessment
Penetration Testing
Patch Management
8
Application VA Server & OS VA Network VA
White box PT Grey box PT Black box PT
Patch management process definition Patch management solutions Patch management Operations
Aujas Aujas Confidential Confidential
Aujas Identity Management services
Consulting
Executive workshop IAM strategy and Roadmap Readiness Assessment Architecture planning
Deployment
IAM deployment Enterprise Single sign-on RBAC Workflow process mgmt
Managed Services
Post rollout support Transition mgmt Change requests Performance optimization
Compliance
IAM Audit Separation of duties Account reconciliation Entitlement attestation
Aujas offers Identity management Services throughout the Life-cycle 9
Aujas Aujas Confidential Confidential
Aujas Mobile Security & Enterprise Telecom offerings Mobile Application Security
Mobile application security assessment Secure mobile application development consulting Customized solutions for Encryption, GUI and Authentication
Mobile Communication Security
Security consulting services Security audit and assessment Near field comm., Bluetooth, SMS, GPRS & WiFi
Mobile based Security solutions
Authentication and Access mgmt (OTP & Mobile banking) Solutions for Enterprise mobility
Enterprise Telecom / VoIP networks
• VoIP Security audit • VoIP security solutions • Telecom network audit
Aujas has developed IP & has security researchers with over 15 patents in this space.
10
Aujas Aujas Confidential Confidential
Aujas Forensic Services
Cyber Crime Incident response
Data Forensics
Entrapment
11
Crime scene analysis and investigation Collection and preservation of evidence Root cause analysis
Evidence recovery Event reconstruction Law enforcement
Setting up honey net Evidence gathering Deterring the real attacks
Aujas Aujas Confidential Confidential
Security Awareness and Training services
Employees
IT Team
Software Development Team
12
Security Awareness Periodic Security Induction Do’s and don’ts
ISMS – ISO 27001 ITSM – ISO 20001 BCM – BS 25999
Secure Coding (Dot Net, Java, ASP, C++) Threat Modeling Software Security testing
Aujas Aujas Confidential Confidential
Thank you www.aujas.com
13
Aujas Aujas Confidential Confidential