top of page
female-hacker-with-her-team-cyber-terrorists-making-dangerous-virus-attack-government.jpg

Consultancy, Security Assessment and Auditing

1.  Compliance and Regulatory Consulting;

  • Assist in adhering to industry specific regulation and compliance standards

  • Data Protection and Privacy Compliance

​

2.  3 tier Architecture review;

  • Assess and design robust security architecture to protect against threats

  • Assess, Review and Design 3 tier firewall.

  • Assess, Review and Design network switches, wireless access point and routers

​

3.  Security Solution;

  • Web Application Firewall (WAF)

  • Network Security

        i. Network Detection and Response (NDR)
        ii. Intrusion Prevention System (IPS)
        iii. Internet Proxy
        iv. Email Security
        v. Anti Advanced Persistent Threat (APT)

  • EndPoint

        i. Next Generation Antivirus (NGAV)
        ii. Endpoint Detection and Response (EDR)

  • Database

        i. Database encryption
        ii. Database monitoring

bottom of page