Any Customer with Internet facing IT Assets.
Not Relevant.
CSP/08
Vulnerability Assessment and Penetration Testing
Malware Free File, Document Protection, File Sanitisation , KIOSK Based Installation , CDR Solution
- Application Security Testing.
- Vulnerability Assessment.
- Penetration Testing.
- Compliance Report (PCI/HIPPA/NIST/CIS) for Various Governing local or international bodies.
- Security Testing with Purple Approach. Don’t just find the security bugs but also test the capabilities of security controls deployed by customer.
- Basic OR Advanced VAPT services as per customers requirement.
- Certified and experienced resources to execute the project.
- Use of commercial, open source and in-house developed tools.
Differentiators
- Perform VAPT with Purple Approach. Don’t just find the security bugs but also test the capabilities of Security Control Devices.
- Certified and Experienced resources to execute the project.
- One time re-verification of reported security bugs included in the service offering.
Solution
- Based on Purple Teaming approach.
- Combination of commercial, open source and in-house developed tools.
- Manual payload development as per scope of work.
- Executive Summary and Detailed reporting.
Features
NA
Solution Components
- Vulnerability Assessment tools (Commercial, Open Source and in-house developed)
- Local Virtual Machine Instance for Internal LAN testing.
- Red and Blue skilled engineers.
- Re-verification of identified security problems.
Frameworks
- NIST Framework.
- OWASP Framework.
- Cyber Kill Chain Framework.
- ATTACK MITRE Framework.
- CERT-IN Guidelines
Client end Requirment
NA
Support
NA
Training
- Number of modules: 3
- Module1: Red team tactics
- Module2: Popular Security Frameworks.
- Module 3: Playing in cyber range (Red vs Blue).
- Duration of training: 5 days
Scope
- Internet facing Applications.
- Number of sub-domains per website/application.
- Internet facing IP addresses.
- Internal LAN's
- Cloud Services.
- Mobile Applications.
Architechture
NA
Infrastructure/Operation
NA
Technical Specifications
NA
Current Market
NA
Target Clients
NA
Pricing / commercial model
NA
Use cases
NA
Differentiators
- Perform VAPT with Purple Approach. Don’t just find the security bugs but also test the capabilities of Security Control Devices.
- Certified and Experienced resources to execute the project.
- One time re-verification of reported security bugs included in the service offering.
Solution
- Based on Purple Teaming approach.
- Combination of commercial, open source and in-house developed tools.
- Manual payload development as per scope of work.
- Executive Summary and Detailed reporting.
Features
NA
Solution Components
- Vulnerability Assessment tools (Commercial, Open Source and in-house developed)
- Local Virtual Machine Instance for Internal LAN testing.
- Red and Blue skilled engineers.
- Re-verification of identified security problems.
Frameworks
- NIST Framework.
- OWASP Framework.
- Cyber Kill Chain Framework.
- ATTACK MITRE Framework.
- CERT-IN Guidelines
Client end Requirment
NA
Support
NA
Training
- Number of modules: 3
- Module1: Red team tactics
- Module2: Popular Security Frameworks.
- Module 3: Playing in cyber range (Red vs Blue).
- Duration of training: 5 days
Scope
- Internet facing Applications.
- Number of sub-domains per website/application.
- Internet facing IP addresses.
- Internal LAN's
- Cloud Services.
- Mobile Applications.
Architechture
NA
Infrastructure/Operation
NA
Technical Specifications
NA
Current Market
NA
Target Clients
NA
Pricing / commercial model
NA
Use cases
NA