آسام

Home Data and network security

Today’s information security is the biggest challenge in the IT era, and the protection of information against unauthorized access, change, sabotage and disclosure is essential and inevitable. Therefore, security of information assets is vital for all organizations and requires an effective management.

According to the dangers in the world today about all companies and organizations threatens need a secure network and system absolutely safe and reliable absolutely tangible, hence the series of technical knowledge and experience of professionals comprehensive plan Has provided network security and information security requirements based on international security standards for network and information security of organizations and agencies, and provides the following services:

  • Consulting, Design and Implementation of SOC Security Services (Security Operations Center)
  • Provide a Major Plan and Security Strategy in the Architecture Security
  • Organizations’ Information Structure in accordance with World Security Standards
  • Design, deployment and maintenance of the information security management system in accordance with IEC / ISO 27001 and in accordance with the organization’s requirements
  • Carrying out internal audits (designing and documenting procedures, procedures, instructions and security regulations) Information Security Management System based on IEC / ISO 27001
  • Implementation of an audit and compliance program in accordance with regulatory rules such as data protection and data security standards including FIPS, PCI-DSS, HIPPA
  • Security assessment and risk analysis, permeability testing, identification and documentation of security weaknesses and related threats, providing response plans at risk
  • Permeability test and complete report of network security status at network levels, operating systems, databases, services, and software types.
  • Security tests based on standard methodologies such as OSSTMM and OWASP
  • Preparation and Implementation of Business Continuity (BCP) and Disaster Recovery (DRP)
  • Security configuration and Hardening at all levels
  • Consulting, providing, designing, implementing and implementing Lawful Interception systems
  • Consulting, designing and implementing native security equipment
  • Professional and professional crime detection (forensic) in the network, mobile and computer systems
  • Implementing the Standard of Risk Management (ISO 31000)