cycops india company profile
DESCRIPTION
CyCops india private limited offers high-tech solution a reliable, high quality service in the field of Information security. At CyCops, we work with you, helping you to identify your potential and become more innovative, competitive & efficient to help you grow exponentially in the global markets. We provide various products and services (Penetration testing, Vulnerability assessment, Wi-Fi security, Designing a security architecture, Compliance testing in terms of ISO 27001, Security audit for ISO27001, Incident response in case of a security breach to name a few.) to our clients.TRANSCRIPT
TRAINING
SERVICES
RESEARCH & DEVELOPMENT
CyCops
IT Security solutions that work for your business
W HEN I T CO MES TO SECU RI TY “TR U ST NO O NE”
CyCops INDIA private limited offers high-tech solution a reliable,
high quality service in the field of Information security. Clients
must know that working with Cycop’s consultants is a more
professional, less risky way to develop in areas of information
security than working completely in house with their own
people. At CyCops, we work with you, helping you to identify
your potential and become more innovative, competitive &
efficient to help you grow exponentially in the global markets.
We provide various products and services (Penetration testing,
Vulnerability assessment, Wi-Fi security, Designing a security
architecture, Compliance testing in terms of ISO 27001, Security
audit for ISO27001, Incident response in case of a security
breach to name a few.) to our clients to conceptualize &
visualize technology driven business transformation initiatives.
We have a complete service package for companies interested
in foraying into the booming Market. We have a team of highly
qualified experts to assist our clients.
Today, more than ever, companies depend on growth to build a
strong market value. But, as we know, growth is a double
edged sword. Growth comes only when one is secure.
MISSION
“To be a premier Information security
Research and Development center and to
excel in the development of India as a
secured nation”.
VISION
“To lead and inspire, through excellence in
training and research the education and
development of a Secured Nation”.
WE ARE EXP ERTS IN CUS TOM MADE SERVICES. HOW CA N W E HELP Y OU?
At CyCops, we tailor services and trainings according to the customer requirement.
“SECURITY IS NOT SOMETHING YOU
BUY, IT IS SOMETHING YOU DO”.
CyCOPS is IBM Enterprise Business Partner for its
Information Protection, ISS Proventia Security and
Managed Security Services. In conjunction with IBM,
CyCops designs a fully Managed Service solution that
automatically protects business critical data across
enterprise and end-user computing infrastructure –
either on site or remote data protection.
This service will also help you to mitigate, monitor and
manage the latest security threats and vulnerabilities
with the backing of Industry leading ISS X-Force
research and development team of 15,000 researchers.
CyCOPS and IBM commit to working together on joint
marketing, collaborative selling and software
integration and performance optimization. The
relationship will deliver real-time, 24X7X365 security
management monitored through dashboards with
guaranteed SLA driven data protection.
• IBM offers a "Guarantee of
Protection" of $50,000 per
security breach when IBM
manages your end-to-end security
infrastructure.
• IBM has been awarded leadership
in Managed Security Services
2007 and 2008: Gartner Magic
Quadrant, Forester Wave and
Frost & Sullivan.
• IBM invested $1.5 billion in
security R&D in 2008.
• IBM's Proventia Intrusion
Prevention System (IPS) is the
industry leading network security
solution that prevents costly
security breaches.
• IBM's Managed Security Solutions
are backed by the industry leading
ISS X-FORCE R&D team, which
monitors 4 billion events per day
and protects 3,700+ clients across
the globe; ensuring that you are
pre-empting threats rather than
reacting to security breaches.
Unified Communications Security
Sipera Systems, the leader in real-time UC
security, enables enterprises to deploy VoIP
and unified communications simply and with
confidence while helping service providers
protect and offer new IP-based
communication services.
Years of UC Security experience is contained
in Sipera unified communications (UC-Sec)
products. These appliances benefit from the
research conducted by Sipera VIPER Lab to
provide comprehensive threat protection,
policy enforcement, access control, and
privacy in a single, real-time appliance.
Overcome Unified Communications
Challenges
Sipera has spent over five years defining UC
security through its extensive knowledge and
expertise of security, VoIP, call control, and
telephony protocols. This unparalleled
knowledge allows Sipera to overcome the
security challenges associated with unified
communications such as:
• protecting IP PBXs and other devices
• enforcing UC security policies
• authenticating users and devices
• maintaining signaling and media privacy
• addressing deployment issues such as configuration
of phones and firewalls, media anchoring and more.
To solve these challenges, Sipera has developed the
first comprehensive, real-time UC security appliance..
Deploy Unified Communications with
Confidence
Sipera's purpose-built UC security
appliance protects against signaling and
media vulnerabilities while maintaining
the highest quality of service (QoS). It
terminates encrypted UC traffic, offers
fine-grained policy enforcement to apply
different security and call routing rules,
and solves firewall/NAT traversal among
other UC deployment issues.
• Comprehensive UC security in a single
appliance for complete protection and
improved ROI
• Real-time platform with centralized
management for improved
performance
• Proven interoperability with IP
telephony vendors for simple and easy
deployments
CyCops group based out of Hyderabad was founded in 2008 by security
specialist Krishna Chaitanya with the aim of bringing together a team of
highly skilled, technically focused, and uncompromising security
professionals.
CyCops offer a Power Packed, State of the Art training, Information Security
Audit & Services which caters to the current need of the hour all across the
Globe on Information Security!
• Penetration Testing and Vulnerability Assessment
• Security Architecture Design
• Security Audit for ISO 27001
• Design and Implementation of wireless network and securing it.
• Incident response
• Computer Forensics
• CyCops SECURITY EXPERT (Job Oriented)
• Corporate Training (Custom Made)
• Individual Area Specialization Training.
• Online Vulnerability Scanner
• AI Network Monitor
• Vulnerability research and exploit writing
• Wireless Encryption Technology
• Secured Protocol Development
CyCops Security is a specialist information security company, with niche
technical skills allowing us to deliver high quality penetration testing and other
information security related services to our customers. We work with
companies from around the globe assisting with their security requirements,
allowing them to rest secured.
CyCops is a company whose services are based around information security;
with a difference. We specialize in researching new and recently disclosed
vulnerabilities, pushing the boundaries of modern day network and application
security testing. More than just using the publically available information
related to security vulnerabilities, our team conducts independent research to
discover new vulnerabilities that could affect our customers systems.
The Gartner Group estimates
that more than 70 percent of
all vulnerabilities discovered
are internal and at application
layer. And our experience
shows that nine out of ten
customers have at least one
serious hole that could lead to
customer data disclosure or
total system compromise. The
CyCops Penetration Testing
service looks at a web site
from the perspective of a
malicious hacker and finds the
holes before they can be
exploited
����������
• The Information Security market in
Asia Pacific was worth about $420
million in 2006, and APRG predicts
it will grow to nearly $1.1 billion by
2012.
• The market for Information
Security consulting in India will
grow 23 percent annually through
2012 driven as strategies to
integrate enterprise-wide security
are implemented.
• The overall network security
market in India is expected to grow
at a CAGR of 25 percent till 2010.
• 62 percent of network security
revenues come from the IT, ITeS
and BFSI sectors
����������
While we have a very technically focused team, CyCops understands the subtle differences in companies
and believes the best service we offer is the flexibility in which we work with our customers to provide a
service and report that fits their requirements.
Any of the services listed below can be combined or tailored to your needs and if a service you require
does not appear in the list we are able to assist in evaluating the requirement and sourcing a provider.
The following core services are currently offered by CyCops Security:
• Application Security Reviews
• Security reviews of commercial products, for both vendors and customers
• Host Hardening Reviews
• Server and services reviews to ensure they adhere to security best practices
• Penetration Testing
• Internal and external security testing of web sites, network devices and network aware applications
• Real World Intrusion Testing
• Give your network perimeter the ultimate test
• Source Code Review
• In-depth security review of binary and web application source code
• Vulnerability Scanning
• Automated vulnerability scanning solution for regular network reviews
• Incident response
• Computer Forensics
• Disaster recovery
• Design and implementation of secured wireless networks
BENEFITS
� Detailed analysis of the current network
architecture identifies vulnerabilities
� Three-phase approach to assessing the
network ensures intruders don’t gain
access to critical assets.
OUTCOMES
� Network Infrastructure and Architecture
Security Assessment Technical Report
� Network Infrastructure and Architecture
Security Assessment Executive
Summary
� Next-step recommendations•
� Half-day workshop with Network
Infrastructure and Architecture Security
Assessment Presentation.
WHAT DO WE TEST?
� Internet gateways
� Modems
� Wireless networks
� Physical entry
� Social engineering
� Etc…
"You know, we have to be right 100 percent of the time. And the enemy only has to be right once to hurt us”. -
Former President –U.S.A.
CYCOPS SECURITY EXPERT
This training is designed for IT users with
minimal knowledge of IT. This provides
guidance for avoiding major security-breach
related disasters.
CORPORATE SECURITY TRAIN ING
This training is for Information Technology
professionals, who would need to know the
security tools they are dealing with and who
are interested in their optimal
implementations..
INDIV IDUAL AREA TRAIN ING
This is the highest level of information
security training, which would allow
candidates to develop security tools as well
as build the most complicated security
information subsystems
Proper handling of information security issues requires not only commitment to deal with these problems
but also adequate knowledge concerning them.
CyCops are a Certified Information Security group specializes in providing high-end corporate training and
Services throughout INDIA and abroad as well. We specialize in researching new and recently disclosed
vulnerabilities, pushing the boundaries of modern day network, Operating Systems and application security
testing. More than just using the publically available information related to security vulnerabilities, our team
conducts independent research to discover new vulnerabilities that could affect our customers systems.
CyCops offer training in various modules of security. These sessions are designed to help students or
employees to acquire the legal knowledge and skills they need to do their jobs efficiently.
The following are the fields in which training is provided.
• Introduction to Information Security
• Penetration Testing & Ethical Hacking
• OS Hardening
• Forensics Investigation
• Shell scripting & Programming basics
• Reverse Engineering
• Malware Analysis
• Reversing Applications
• Wireless Security
• RFID
• Bluetooth
• Designing and Implementation of Firewalls & IDS/IPS
• Log Analysis
• Incidence Response
• Public Key Infrastructure
• Disaster Recovery
• Personality Development (For job oriented only)
Real education must ultimately be limited to men who insist on knowing–the rest is mere sheep-herding.
Ezra Loomis Pound (1885-1972) U.S. poet.
Krishna Chaitanya
Founder & Managing Director- CyCOPS (I) Pvt. Ltd. focusing on information security services and Trainings, located in the Hyderabad. He has over 6
years of professional experience working as a security system architect, security engineer, consultant, and as a Senior Manager, Technology
Services Group. He has worked with clients to build complete security architectures that include policies, standards, strategies, design
architectures and procedures that enable them to control security and performance on their systems. He has also performed vulnerability
assessments of client systems for security.
He has assisted companies in preparing for audits of their information security systems and methods. He specializes in Penetration testing
methodology. He has established himself as an industry professional by delivering presentations on information security at such prestigious
industry conferences as SVPNPA’s Ethical Hacking session, TechTatva, Manipal Institute of Technology (M.I.T) a national level technical fest and
GMR’s National workshop on Information Security. He has been interviewed by television media on topics like (Bypassing Firewall, Valentine’s Day
virus etc…) as a part of general security awareness. He has his technical writings published on portals like Economic Times, Data stronghold etc….
G. Lakshmikanth Reddy
He is an expert in computer forensics, web application security, shell coding etc. He is been performing pen tests for many organizations and has
been training corporates and students for four years now. He has also been to Tanzania to train the Tanzanian Revenue Authority in ethical
hacking and computer forensics.
G. Justin
Around four years of diversified professional work and experience in Information Security, Attack and Penetration, Forensic Investigations, Reverse
Engineering along Wi-Fi Architecture & security, Incidence Response with implementation experience in e-security products and networking
products in multi-platform environments.
Naveen Kumar Singh
He has an experience of three years in security pertaining to concepts of network security, pentesting, wi-fi security, rfid. He also has been training
corporate and students on security. He has been speaking about Information security with the media and also at conferences as the one
conducted by Manipal Institute of technology (M.I.T). Worked on advanced concepts like WIMAX security and Mobile adaptive routing.