Cycops India Company Profile

  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cycops India Company Profile as PDF for free.

More details

  • Words: 2,203
  • Pages: 7
IT Security solutions that work for your business W HEN IT CO MES TO SECURITY “TR UST NO O NE”

CyCops TRAINING SERVICES RESEARCH & DEVELOPMENT

CyCops INDIA private limited offers high-tech solution a reliable, high quality service in the field of Information security. Clients must know that working with Cycop’s consultants is a more professional, less risky way to develop in areas of information security than working completely in house with their own people. At CyCops, we work with you, helping you to identify your potential and become more innovative, competitive & efficient to help you grow exponentially in the global markets. We provide various products and services (Penetration testing, Vulnerability assessment, Wi-Fi security, Designing a security architecture, Compliance testing in terms of ISO 27001, Security audit for ISO27001, Incident response in case of a security breach to name a few.) to our clients to conceptualize & visualize technology driven business transformation initiatives. We have a complete service package for companies interested in foraying into the booming Market. We have a team of highly qualified experts to assist our clients. Today, more than ever, companies depend on growth to build a strong market value. But, as we know, growth is a double edged sword. Growth comes only when one is secure.

W E A RE E X P E R TS I N C US T OM M A D E S E RV I CE S . H O W CA N W E HE L P Y O U? At CyCops, we tailor services and trainings according to the customer requirement.

MISSION “To be a premier Information security Research and Development center and to excel in the development of India as a secured nation”.

VISION “To lead and inspire, through excellence in training and research the education and development of a Secured Nation”.

“SECURITY IS NOT SOMETHING YOU BUY, IT IS SOMETHING YOU DO”.

CyCOPS is IBM Enterprise Business Partner for its Information Protection, ISS Proventia Security and Managed Security Services. In conjunction with IBM, CyCops designs a fully Managed Service solution that automatically protects business critical data across enterprise and end-user computing infrastructure – either on site or remote data protection.





IBM offers a "Guarantee of Protection" of $50,000 per security breach when IBM manages your end-to-end security infrastructure. IBM has been awarded leadership in Managed Security Services 2007 and 2008: Gartner Magic Quadrant, Forester Wave and Frost & Sullivan. IBM invested $1.5 billion in security R&D in 2008.

This service will also help you to mitigate, monitor and manage the latest security threats and vulnerabilities with the backing of Industry leading ISS X-Force research and development team of 15,000 researchers.





CyCOPS and IBM commit to working together on joint marketing, collaborative selling and software integration and performance optimization. The relationship will deliver real-time, 24X7X365 security management monitored through dashboards with guaranteed SLA driven data protection.

IBM's Proventia Intrusion Prevention System (IPS) is the industry leading network security solution that prevents costly security breaches.



IBM's Managed Security Solutions are backed by the industry leading ISS X-FORCE R&D team, which monitors 4 billion events per day and protects 3,700+ clients across the globe; ensuring that you are pre-empting threats rather than reacting to security breaches.

Deploy Unified Communications with Confidence

Unified Communications Security Sipera Systems, the leader in real-time UC security, enables enterprises to deploy VoIP and unified communications simply and with confidence while helping service providers protect and offer new IP-based communication services.

Sipera's

purpose-built

UC

security

appliance protects against signaling and media vulnerabilities while maintaining the highest quality of service (QoS). It terminates encrypted UC traffic, offers

Years of UC Security experience is contained in Sipera unified communications (UC-Sec) products. These appliances benefit from the research conducted by Sipera VIPER Lab to provide comprehensive threat protection, policy enforcement, access control, and privacy in a single, real-time appliance. Overcome Challenges

Unified

fine-grained policy enforcement to apply different security and call routing rules, and solves firewall/NAT traversal among other UC deployment issues.

• protecting IP PBXs and other devices

Communications • enforcing UC security policies • authenticating users and devices

Sipera has spent over five years defining UC • maintaining signaling and media privacy security through its extensive knowledge and expertise of security, VoIP, call control, and • addressing deployment issues such as configuration of phones and firewalls, media anchoring and more. telephony protocols. This unparalleled knowledge allows Sipera to overcome the To solve these challenges, Sipera has developed the security challenges associated with unified first comprehensive, real-time UC security appliance.. communications such as:

• Comprehensive UC security in a single

appliance for complete protection and improved ROI • Real-time platform with centralized

management

for

improved

performance • Proven

interoperability

with

IP

telephony vendors for simple and easy deployments

The Gartner Group estimates that more than 70 percent of all vulnerabilities discovered are internal and at application layer. And our experience shows that nine out of ten customers have at least one serious hole that could lead to customer data disclosure or total system compromise. The CyCops Penetration Testing service looks at a web site from the perspective of a malicious hacker and finds the holes before they can be exploited



CyCops group based out of Hyderabad was founded in 2008 by security specialist Krishna Chaitanya with the aim of bringing together a team of highly skilled, technically focused, and uncompromising security professionals.

• The Information Security market in Asia Pacific was worth about $420 million in 2006, and APRG predicts it will grow to nearly $1.1 billion by 2012.

CyCops offer a Power Packed, State of the Art training, Information Security Audit & Services which caters to the current need of the hour all across the Globe on Information Security! CyCops Security is a specialist information security company, with niche technical skills allowing us to deliver high quality penetration testing and other information security related services to our customers. We work with companies from around the globe assisting with their security requirements, allowing them to rest secured. CyCops is a company whose services are based around information security; with a difference. We specialize in researching new and recently disclosed vulnerabilities, pushing the boundaries of modern day network and application security testing. More than just using the publically available information related to security vulnerabilities, our team conducts independent research to discover new vulnerabilities that could affect our customers systems.

• The market for Information Security consulting in India will grow 23 percent annually through 2012 driven as strategies to integrate enterprise-wide security are implemented. • The overall network security market in India is expected to grow at a CAGR of 25 percent till 2010. • 62 percent of network security revenues come from the IT, ITeS and BFSI sectors



• Penetration Testing and Vulnerability Assessment • Security Architecture Design • Security Audit for ISO 27001

• CyCops SECURITY EXPERT (Job Oriented)

• Online Vulnerability Scanner

• Corporate Training (Custom Made)

• AI Network Monitor

• Individual Area Specialization Training.

• Vulnerability research and exploit writing

• Design and Implementation of wireless network and securing it.

• Wireless Encryption Technology

• Incident response

• Secured Protocol Development

• Computer Forensics

While we have a very technically focused team, CyCops understands the subtle differences in companies and believes the best service we offer is the flexibility in which we work with our customers to provide a service and report that fits their requirements.

B E NE F IT S  Detailed analysis of the current network architecture identifies vulnerabilities

Any of the services listed below can be combined or tailored to your needs and if a service you require does not appear in the list we are able to assist in evaluating the requirement and sourcing a provider.

 Three-phase approach to assessing the network ensures intruders don’t gain access to critical assets.

The following core services are currently offered by CyCops Security: • • • • • • • • • • • • • • • •

Application Security Reviews Security reviews of commercial products, for both vendors and customers Host Hardening Reviews Server and services reviews to ensure they adhere to security best practices Penetration Testing Internal and external security testing of web sites, network devices and network aware applications Real World Intrusion Testing Give your network perimeter the ultimate test Source Code Review In-depth security review of binary and web application source code Vulnerability Scanning Automated vulnerability scanning solution for regular network reviews Incident response Computer Forensics Disaster recovery Design and implementation of secured wireless networks

OU T C OME S  Network Infrastructure and Architecture Security Assessment Technical Report  Network Infrastructure and Architecture Security

Assessment

Summary  Next-step recommendations•  Half-day

workshop

Assessment Presentation.

WHAT DO WE TEST?  Internet gateways  Modems  Wireless networks

 Social engineering

Former President –U.S.A.

with

Network

Infrastructure and Architecture Security

 Physical entry

"You know, we have to be right 100 percent of the time. And the enemy only has to be right once to hurt us”. -

Executive

 Etc…

Proper handling of information security issues requires not only commitment to deal with these problems but also adequate knowledge concerning them. C Y C OPS S E CU R IT Y E XP ER T This training is designed for IT users with minimal knowledge of IT. This provides guidance for avoiding major security-breach related disasters.

CyCops are a Certified Information Security group specializes in providing high-end corporate training and Services throughout INDIA and abroad as well. We specialize in researching new and recently disclosed vulnerabilities, pushing the boundaries of modern day network, Operating Systems and application security testing. More than just using the publically available information related to security vulnerabilities, our team conducts independent research to discover new vulnerabilities that could affect our customers systems.

C OR P OR AT E S EC UR IT Y T R A IN IN G

CyCops offer training in various modules of security. These sessions are designed to help students or employees to acquire the legal knowledge and skills they need to do their jobs efficiently.

This training is for Information Technology

The following are the fields in which training is provided.

professionals, who would need to know the security tools they are dealing with and who are

interested

in

their

optimal

implementations..

IN D IV ID U A L A RE A T RA IN IN G This is the highest level of information security

training,

which

would

allow

candidates to develop security tools as well as build the most complicated security information subsystems

• • • • • • • • • • • • • • • • •

Introduction to Information Security Penetration Testing & Ethical Hacking OS Hardening Forensics Investigation Shell scripting & Programming basics Reverse Engineering Malware Analysis Reversing Applications Wireless Security RFID Bluetooth Designing and Implementation of Firewalls & IDS/IPS Log Analysis Incidence Response Public Key Infrastructure Disaster Recovery Personality Development (For job oriented only)

Real education must ultimately be limited to men who insist on knowing–the rest is mere sheep-herding. Ezra Loomis Pound (1885-1972) U.S. poet.

Krishna Chaitanya Founder & Managing Director- CyCOPS (I) Pvt. Ltd. focusing on information security services and Trainings, located in the Hyderabad. He has over 6 years of professional experience working as a security system architect, security engineer, consultant, and as a Senior Manager, Technology Services Group. He has worked with clients to build complete security architectures that include policies, standards, strategies, design architectures and procedures that enable them to control security and performance on their systems. He has also performed vulnerability assessments of client systems for security. He has assisted companies in preparing for audits of their information security systems and methods. He specializes in Penetration testing methodology. He has established himself as an industry professional by delivering presentations on information security at such prestigious industry conferences as SVPNPA’s Ethical Hacking session, TechTatva, Manipal Institute of Technology (M.I.T) a national level technical fest and GMR’s National workshop on Information Security. He has been interviewed by television media on topics like (Bypassing Firewall, Valentine’s Day virus etc…) as a part of general security awareness. He has his technical writings published on portals like Economic Times, Data stronghold etc….

G. Lakshmikanth Reddy He is an expert in computer forensics, web application security, shell coding etc. He is been performing pen tests for many organizations and has been training corporates and students for four years now. He has also been to Tanzania to train the Tanzanian Revenue Authority in ethical hacking and computer forensics.

Naveen Kumar Singh He has an experience of three years in security pertaining to concepts of network security, pentesting, wi-fi security, rfid. He also has been training corporate and students on security. He has been speaking about Information security with the media and also at conferences as the one conducted by Manipal Institute of technology (M.I.T). Worked on advanced concepts like WIMAX security and Mobile adaptive routing.

G. Justin Around four years of diversified professional work and experience in Information Security, Attack and Penetration, Forensic Investigations, Reverse Engineering along Wi-Fi Architecture & security, Incidence Response with implementation experience in e-security products and networking products in multi-platform environments.

Related Documents

Company Profile
November 2019 51
Profile Company
April 2020 31
Company Profile
July 2020 27
Company Profile
November 2019 48