SOME QUESTIONS REMAINS...

“As we do our best to secure our information...”

  • How do we convert business objectives into technology objectives?
  • Whether our policy and processes cover information security and controls effectively?
  • Whether information systems are aligned with best practices and global standards?
  • Are we maintaining safety of Network infrastructure?
  • How to comply with customer-centric data privacy and protection requirements?
  • How to investigate data breaches and system compromises?

INFORMATION SECURITY

“The information security is looked fromvarious perspectives”

" Information Systems and Technology is ubiquitous" - which invariably extends to filiation that various concerns related to Information Systems of various industrial verticals are omnipresent.”

Information Security, The necessary inevitable of todays world!!
Information, output of data processing is one of the most important assets in any organization. Technology is deployed to manage these assets. Over a period of time, use of technology has gradually increased helping organizations to improve efficiency and effectiveness, thus improving overall ability to achieve its strategic aims. This makes security of the information - which stands closely coupled with management of the technology - a key concern.
 

Primarily, the information security is looked from four perspectives -

 

  • Confidentiality (Only authorized access)
  • Integrity (Only authorized modifications)
  • Availability (Systems are available as per the business requirements) and
  • Non-Repudiation (Non denial of digital communication / contract).

To protect the information assets to the desired level, organizations require to be on the wavefront of the latest technology, must be updated about possible threats to the information and corresponding countermeasures.
In a field where change is the only constant, many a times, it is very difficult to ensure security level — thus making services of security professional an integrated part of the technology.

 

"A Team of Experts is a Key of Success"

  • WHO ARE WE?

    A team of security professionals with solid technology, functional and business process background providing multi facet information security solutions.

  • EXPERTISE AND CAPABILITIES

    Domain Expertise: Information Technology Security and Risk, Network and Industrial Control/ Process Control Network security. Business Processes and Controls Professional Certifications: CISA, CISSP, ISO 9001, ISO 27001, Various Cisco and Microsoft certifications.

  • ACADEMIC BACKGROUND

    BE, BCS, MCM, FCA

    EXPERIENCED TEAM

    All team members have minimum 20+ years of expedience in the Industry with solid technical and business background.

SERVICES

Services Offered
  • • Information Systems Auditing and Assurance.
  • • Bank IS audit as per regulators guidelines.
  • • Data Center, Disaster Recover site.
  • • Technology vendor audit.
  • • IT Risk assessment.
  • • Specific focus audits such as Server / RDBMS (Database)/ Process Control Network.
Service Organizations
  • • Implementation of BCP and DR policy and processes.
  • • End-to-end support in obtaining ISO 27001 (ISMS),ISO 9001 (Quality) certifications.
  • • Data Center, Disaster Recover site.
  • • Drafting of policy and processes for compliance with HIPPA requirements.
Training
  • • Security Awareness trainings for IT teams and IT users for various verticals such as Banks,
       Private companies.
  • • Network security tools and techniques including extensive hands on practice session.
  • • Process Control Network Cyber security.
  • • Trained CISA aspirants in their exam preparation.
  • • Training and awareness for Business Continuity and Disaster Recovery processes.
Policiesand Compliance
  • • Creation, Documentation and Implementation of Information Security Policies for various verticals
       such as Banks, Manufacturing companies and.
Services Related to Business Applications
  • • Core banking application testing to improve security, internal controls and functionality.
  • • Gap analysis between business requirements and application functionality.
  • • Testing of Security and controls for accounting and financial application, during/ post implementation.
  • • Data migration testing.
Consultancy services
  • • Website hardening, Securing against malware infections.
  • • Security improvements fora web application, including finding various vulnerabilities as per
       OWASP guidelines.
  • • Securely configuring Firewall as per the business requirements.
  • • Forensic analysis of e-mails.

CONTACTS

Vijay Bhalerao
Mob no:- +91 9822055881
E-mail:- univijay@unisoftpune.com
Web:- www.unisoftpune.com

Copyright © 2017 Unisoft Pune. All rights reserved