Aujas - Company Overview

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Aujas - Company Overview as PDF for free.

More details

  • Words: 781
  • Pages: 13
Aujas – An Overview “Aujas” in Sanskrit means “Strength & Energy in a Warrior”

This document contains information, which is the proprietary property of Aujas Networks Pvt. Ltd. (Aujas). This document is received in confidence and Its contents cannot be disclosed or copied without the prior written consent of Aujas.

Copyright © Aujas Networks Pvt. Ltd. All rights reserved

1

Aujas Aujas Confidential Confidential

About Aujas

Aujas is a pure-play Digital Security services company. We offer high-end Security Consulting, Professional & Operations services

• Started in Feb 2008 • Co-founded by experienced Security professionals • Funded by IDG Ventures • Global presence with in Bangalore, Mumbai, Delhi & Dubai • Team of 30+ with consultants from global consulting companies and leading technology companies

2

Mission Create a differentiated and scalable ecosystem of people, processes and technology to help customers minimize and mitigate Digital Security risk.

Vision To be the best in class, pure play provider of advanced secure Technologies & Services

Aujas Aujas Confidential Confidential

A Strong team at the helm Board of Directors

3

Management Team

Kiran Karnik Ex-President, NASSCOM

Srinivas Rao CEO & co-founder

Sudhir Sethi CMD – IDG Ventures

Sameer Shelke COO & co-founder

TCM CFO – IDG Ventures

Manjula Sridhar CTO & co-founder

Prof. N. Bala IIM-B

Shailendra Mishra Sr. VP – Sales, India & ME

Srinivas Rao CEO & co-founder

Navin Kotian VP – Mktg & Alliances

Aujas Aujas Confidential Confidential

Investor Information

4

Aujas Aujas Confidential Confidential

A Comprehensive Security Services Framework

IT GRC Services Mobility & Telecom Security

Software Security Services

Identity Management Services

Vulnerability Management Services ISO Mgmt Services

5

Aujas Aujas Confidential Confidential

IT Governance, Risk & Compliance offerings

6

Compliance Services

    

ISO 27001 ISO 20001 PCI DSS SAS 70 SOX, HIPAA

Security Audits & Assessments

   

IT Security Audit IT Security Base-lining services IT Security Policy Network & Internet Security audit

IT Risk Management Services

 IT Risk audit  IT Risk framework mgmt  IT Risk management

Continuous Compliance Management Services

 Controls monitoring  Compliance Management  IT GRC Automation

Aujas Aujas Confidential Confidential

Software and Application Security offerings

7

Secure Coding Training

 Secure Coding practices  Threat modeling  Security testing

PCI DSS Compliance services

 Application code review, VA  Secure coding training  Application security guidelines and framework

Application Security Assessment

   

Secure Software development Consulting

 Secure SDLC training  Transformation to Secure SDLC  Secure application development consulting

Code Review Threat Modeling Application Vulnerability Assessment (VA) Application Penetration Testing (PT)

Aujas Aujas Confidential Confidential

Vulnerability Management Services

Vulnerability Assessment

Penetration Testing

Patch Management

8

 Application VA  Server & OS VA  Network VA

 White box PT  Grey box PT  Black box PT

 Patch management process definition  Patch management solutions  Patch management Operations

Aujas Aujas Confidential Confidential

Aujas Identity Management services

Consulting

   

Executive workshop IAM strategy and Roadmap Readiness Assessment Architecture planning

Deployment

   

IAM deployment Enterprise Single sign-on RBAC Workflow process mgmt

Managed Services

   

Post rollout support Transition mgmt Change requests Performance optimization

Compliance

   

IAM Audit Separation of duties Account reconciliation Entitlement attestation

Aujas offers Identity management Services throughout the Life-cycle 9

Aujas Aujas Confidential Confidential

Aujas Mobile Security & Enterprise Telecom offerings Mobile Application Security

 Mobile application security assessment  Secure mobile application development consulting  Customized solutions for Encryption, GUI and Authentication

Mobile Communication Security

 Security consulting services  Security audit and assessment  Near field comm., Bluetooth, SMS, GPRS & WiFi

Mobile based Security solutions

 Authentication and Access mgmt (OTP & Mobile banking)  Solutions for Enterprise mobility

Enterprise Telecom / VoIP networks

• VoIP Security audit • VoIP security solutions • Telecom network audit

Aujas has developed IP & has security researchers with over 15 patents in this space.

10

Aujas Aujas Confidential Confidential

Aujas Forensic Services

Cyber Crime Incident response

Data Forensics

Entrapment

11

 Crime scene analysis and investigation  Collection and preservation of evidence  Root cause analysis

 Evidence recovery  Event reconstruction  Law enforcement

 Setting up honey net  Evidence gathering  Deterring the real attacks

Aujas Aujas Confidential Confidential

Security Awareness and Training services

Employees

IT Team

Software Development Team

12

 Security Awareness  Periodic Security Induction  Do’s and don’ts

 ISMS – ISO 27001  ITSM – ISO 20001  BCM – BS 25999

 Secure Coding (Dot Net, Java, ASP, C++)  Threat Modeling  Software Security testing

Aujas Aujas Confidential Confidential

Thank you www.aujas.com

13

Aujas Aujas Confidential Confidential

Related Documents