1 / 22

Ofisgate Corporate

Ofisgate Corporate. Security Posture Assessment (SPA). L e a d i n g I C T s o l u t i o n c o m p a n y. Headquarters: Ofisgate S dn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia. Regional Office:

liseli
Download Presentation

Ofisgate Corporate

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ofisgate Corporate Security Posture Assessment(SPA) L e a d i n g I C T s o l u t i o n c o m p a n y Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia Regional Office: Ofisgate (s) Pte Ltd, 205B Thompson Road, Goldhill Centre, Singapore www.ofisgate.com

  2. Understand Your Current Security State Understanding your organization’s security state and identifying vulnerabilities is the first step toward protecting the confidentiality , integrity and availability of critical data. It is also an important component for achieving regulatory compliance. • Protection of Information Reliability SPA to secure ICT Assets www.ofisgate.com

  3. Understand Your Current Security State Your organization may be vulnerable to attack from the outside or the inside if you remain unaware of security issues, simply ignore them or don’t sufficiently manage them. An attack may take down your network or lead to the theft of sensitive data — customer information, employee information or intellectual property. The ensuing loss of public trust or the failure to comply with regulations could result in severe financial repercussions. A major security breach could also cause irrevocable damage to your organization’s reputation. IMPACT To effectively protect your organization, you first need to evaluate where you stand in relation to industry best practices and regulatory requirements. A gap assessment will help identify the most effective course of action based on your business objectives. SOLUTION www.ofisgate.com

  4. Understand Your Current Security State A ROADMAP TO A MORE SECURE NETWORK • Going much deeper than an ordinary assessment, the Internet Security Systems Information Security Assessment provides a comprehensive evaluation of your information security posture. • Based on the globally recognized ISO 17799 standard and industry best practices, the assessment by Ofisgate Sdn Bhd security experts will thoroughly document the results and provide you with specific recommendations for mitigating the identified risks and improving overall security posture www.ofisgate.com

  5. Benefits Of the Information Security Assessment Provides a clear understanding of current information security risks Identifies the potential impact of vulnerabilities on your network infrastructure Raises internal awareness of information security risks Enables more informed decision-making and identifies the gaps in organizational security controls, policies and processes Provides a specific, actionable plan to improve overall security posture based on business needs Enables you to proactively address security issues before they are exploited Helps to meet regulatory compliance requirements www.ofisgate.com

  6. SPA Scope of Work This document is intended to show and analyze network security issues to the management and technical staff. The audit report outlines: www.ofisgate.com

  7. Project Timeline www.ofisgate.com

  8. SPA Project Phase www.ofisgate.com

  9. Network Design Audit and Network Parameters Evaluation www.ofisgate.com

  10. Internal and External Network Devices Assessment Example www.ofisgate.com

  11. Host / Server and Desktop Security Assessment • HQ User Example www.ofisgate.com

  12. Application and Database Security Assessment Example www.ofisgate.com

  13. Operating System & Configuration Management 10 Windows Hosts 5 Linux Hosts 3 HQ Users 3 District Users 21 Hosts Example www.ofisgate.com

  14. Physical and Environment Security Audit One (1) Customer a Datacenter One (1) NOC Example www.ofisgate.com

  15. ICT Security Policy Assessment / Review One (1) Customer A ICT Security Policy Example www.ofisgate.com

  16. Internal Penetration Test Example www.ofisgate.com

  17. External Penetration Test Example www.ofisgate.com

  18. Report Presentation Example www.ofisgate.com

  19. Security Awareness One (1) Security Awareness Session www.ofisgate.com

  20. Training Three (3) Network Security Hands-On Training www.ofisgate.com

  21. Tools Nikto2 MATASANO Flint Firewall Checker www.ofisgate.com

  22. Thank You For enquiries about our products, services or to schedule a sales presentation: • e: sales_enquiries@ofisgate.com • For contact information: • OFISGATE SDN BHD (610820-A)2-15, Jalan Jalil Perkasa 13,Aked Esplanad, Bukit Jalil,57000 Kuala Lumpur, MALAYSIA. Tel: +603 8994 0778 Fax: +603 8994 0779 www.ofisgate.com

More Related