cycops india company profile

7
TRAINING SERVICES RESEARCH & DEVELOPMENT CyCops IT Security solutions that work for your business WHEN IT COMES TO SECURITY “TRUST NO ONE” CyCops INDIA private limited offers high-tech solution a reliable, high quality service in the field of Information security. Clients must know that working with Cycop’s consultants is a more professional, less risky way to develop in areas of information security than working completely in house with their own people. At CyCops, we work with you, helping you to identify your potential and become more innovative, competitive & efficient to help you grow exponentially in the global markets. We provide various products and services (Penetration testing, Vulnerability assessment, Wi-Fi security, Designing a security architecture, Compliance testing in terms of ISO 27001, Security audit for ISO27001, Incident response in case of a security breach to name a few.) to our clients to conceptualize & visualize technology driven business transformation initiatives. We have a complete service package for companies interested in foraying into the booming Market. We have a team of highly qualified experts to assist our clients. Today, more than ever, companies depend on growth to build a strong market value. But, as we know, growth is a double edged sword. Growth comes only when one is secure. MISSION “To be a premier Information security Research and Development center and to excel in the development of India as a secured nation”. VISION To lead and inspire, through excellence in training and research the education and development of a Secured Nation”. WE ARE EXPERTS IN CUSTOM MADE SERVICES. HOW CAN WE HELP YOU? At CyCops, we tailor services and trainings according to the customer requirement. “SECURITY IS NOT SOMETHING YOU BUY, IT IS SOMETHING YOU DO”.

Upload: cycops

Post on 18-Nov-2014

276 views

Category:

Documents


3 download

DESCRIPTION

CyCops india private limited offers high-tech solution a reliable, high quality service in the field of Information security. At CyCops, we work with you, helping you to identify your potential and become more innovative, competitive & efficient to help you grow exponentially in the global markets. We provide various products and services (Penetration testing, Vulnerability assessment, Wi-Fi security, Designing a security architecture, Compliance testing in terms of ISO 27001, Security audit for ISO27001, Incident response in case of a security breach to name a few.) to our clients.

TRANSCRIPT

Page 1: cycops india company profile

TRAINING

SERVICES

RESEARCH & DEVELOPMENT

CyCops

IT Security solutions that work for your business

W HEN I T CO MES TO SECU RI TY “TR U ST NO O NE”

CyCops INDIA private limited offers high-tech solution a reliable,

high quality service in the field of Information security. Clients

must know that working with Cycop’s consultants is a more

professional, less risky way to develop in areas of information

security than working completely in house with their own

people. At CyCops, we work with you, helping you to identify

your potential and become more innovative, competitive &

efficient to help you grow exponentially in the global markets.

We provide various products and services (Penetration testing,

Vulnerability assessment, Wi-Fi security, Designing a security

architecture, Compliance testing in terms of ISO 27001, Security

audit for ISO27001, Incident response in case of a security

breach to name a few.) to our clients to conceptualize &

visualize technology driven business transformation initiatives.

We have a complete service package for companies interested

in foraying into the booming Market. We have a team of highly

qualified experts to assist our clients.

Today, more than ever, companies depend on growth to build a

strong market value. But, as we know, growth is a double

edged sword. Growth comes only when one is secure.

MISSION

“To be a premier Information security

Research and Development center and to

excel in the development of India as a

secured nation”.

VISION

“To lead and inspire, through excellence in

training and research the education and

development of a Secured Nation”.

WE ARE EXP ERTS IN CUS TOM MADE SERVICES. HOW CA N W E HELP Y OU?

At CyCops, we tailor services and trainings according to the customer requirement.

“SECURITY IS NOT SOMETHING YOU

BUY, IT IS SOMETHING YOU DO”.

Page 2: cycops india company profile

CyCOPS is IBM Enterprise Business Partner for its

Information Protection, ISS Proventia Security and

Managed Security Services. In conjunction with IBM,

CyCops designs a fully Managed Service solution that

automatically protects business critical data across

enterprise and end-user computing infrastructure –

either on site or remote data protection.

This service will also help you to mitigate, monitor and

manage the latest security threats and vulnerabilities

with the backing of Industry leading ISS X-Force

research and development team of 15,000 researchers.

CyCOPS and IBM commit to working together on joint

marketing, collaborative selling and software

integration and performance optimization. The

relationship will deliver real-time, 24X7X365 security

management monitored through dashboards with

guaranteed SLA driven data protection.

• IBM offers a "Guarantee of

Protection" of $50,000 per

security breach when IBM

manages your end-to-end security

infrastructure.

• IBM has been awarded leadership

in Managed Security Services

2007 and 2008: Gartner Magic

Quadrant, Forester Wave and

Frost & Sullivan.

• IBM invested $1.5 billion in

security R&D in 2008.

• IBM's Proventia Intrusion

Prevention System (IPS) is the

industry leading network security

solution that prevents costly

security breaches.

• IBM's Managed Security Solutions

are backed by the industry leading

ISS X-FORCE R&D team, which

monitors 4 billion events per day

and protects 3,700+ clients across

the globe; ensuring that you are

pre-empting threats rather than

reacting to security breaches.

Page 3: cycops india company profile

Unified Communications Security

Sipera Systems, the leader in real-time UC

security, enables enterprises to deploy VoIP

and unified communications simply and with

confidence while helping service providers

protect and offer new IP-based

communication services.

Years of UC Security experience is contained

in Sipera unified communications (UC-Sec)

products. These appliances benefit from the

research conducted by Sipera VIPER Lab to

provide comprehensive threat protection,

policy enforcement, access control, and

privacy in a single, real-time appliance.

Overcome Unified Communications

Challenges

Sipera has spent over five years defining UC

security through its extensive knowledge and

expertise of security, VoIP, call control, and

telephony protocols. This unparalleled

knowledge allows Sipera to overcome the

security challenges associated with unified

communications such as:

• protecting IP PBXs and other devices

• enforcing UC security policies

• authenticating users and devices

• maintaining signaling and media privacy

• addressing deployment issues such as configuration

of phones and firewalls, media anchoring and more.

To solve these challenges, Sipera has developed the

first comprehensive, real-time UC security appliance..

Deploy Unified Communications with

Confidence

Sipera's purpose-built UC security

appliance protects against signaling and

media vulnerabilities while maintaining

the highest quality of service (QoS). It

terminates encrypted UC traffic, offers

fine-grained policy enforcement to apply

different security and call routing rules,

and solves firewall/NAT traversal among

other UC deployment issues.

• Comprehensive UC security in a single

appliance for complete protection and

improved ROI

• Real-time platform with centralized

management for improved

performance

• Proven interoperability with IP

telephony vendors for simple and easy

deployments

Page 4: cycops india company profile

CyCops group based out of Hyderabad was founded in 2008 by security

specialist Krishna Chaitanya with the aim of bringing together a team of

highly skilled, technically focused, and uncompromising security

professionals.

CyCops offer a Power Packed, State of the Art training, Information Security

Audit & Services which caters to the current need of the hour all across the

Globe on Information Security!

• Penetration Testing and Vulnerability Assessment

• Security Architecture Design

• Security Audit for ISO 27001

• Design and Implementation of wireless network and securing it.

• Incident response

• Computer Forensics

• CyCops SECURITY EXPERT (Job Oriented)

• Corporate Training (Custom Made)

• Individual Area Specialization Training.

• Online Vulnerability Scanner

• AI Network Monitor

• Vulnerability research and exploit writing

• Wireless Encryption Technology

• Secured Protocol Development

CyCops Security is a specialist information security company, with niche

technical skills allowing us to deliver high quality penetration testing and other

information security related services to our customers. We work with

companies from around the globe assisting with their security requirements,

allowing them to rest secured.

CyCops is a company whose services are based around information security;

with a difference. We specialize in researching new and recently disclosed

vulnerabilities, pushing the boundaries of modern day network and application

security testing. More than just using the publically available information

related to security vulnerabilities, our team conducts independent research to

discover new vulnerabilities that could affect our customers systems.

The Gartner Group estimates

that more than 70 percent of

all vulnerabilities discovered

are internal and at application

layer. And our experience

shows that nine out of ten

customers have at least one

serious hole that could lead to

customer data disclosure or

total system compromise. The

CyCops Penetration Testing

service looks at a web site

from the perspective of a

malicious hacker and finds the

holes before they can be

exploited

����������

• The Information Security market in

Asia Pacific was worth about $420

million in 2006, and APRG predicts

it will grow to nearly $1.1 billion by

2012.

• The market for Information

Security consulting in India will

grow 23 percent annually through

2012 driven as strategies to

integrate enterprise-wide security

are implemented.

• The overall network security

market in India is expected to grow

at a CAGR of 25 percent till 2010.

• 62 percent of network security

revenues come from the IT, ITeS

and BFSI sectors

����������

Page 5: cycops india company profile

While we have a very technically focused team, CyCops understands the subtle differences in companies

and believes the best service we offer is the flexibility in which we work with our customers to provide a

service and report that fits their requirements.

Any of the services listed below can be combined or tailored to your needs and if a service you require

does not appear in the list we are able to assist in evaluating the requirement and sourcing a provider.

The following core services are currently offered by CyCops Security:

• Application Security Reviews

• Security reviews of commercial products, for both vendors and customers

• Host Hardening Reviews

• Server and services reviews to ensure they adhere to security best practices

• Penetration Testing

• Internal and external security testing of web sites, network devices and network aware applications

• Real World Intrusion Testing

• Give your network perimeter the ultimate test

• Source Code Review

• In-depth security review of binary and web application source code

• Vulnerability Scanning

• Automated vulnerability scanning solution for regular network reviews

• Incident response

• Computer Forensics

• Disaster recovery

• Design and implementation of secured wireless networks

BENEFITS

� Detailed analysis of the current network

architecture identifies vulnerabilities

� Three-phase approach to assessing the

network ensures intruders don’t gain

access to critical assets.

OUTCOMES

� Network Infrastructure and Architecture

Security Assessment Technical Report

� Network Infrastructure and Architecture

Security Assessment Executive

Summary

� Next-step recommendations•

� Half-day workshop with Network

Infrastructure and Architecture Security

Assessment Presentation.

WHAT DO WE TEST?

� Internet gateways

� Modems

� Wireless networks

� Physical entry

� Social engineering

� Etc…

"You know, we have to be right 100 percent of the time. And the enemy only has to be right once to hurt us”. -

Former President –U.S.A.

Page 6: cycops india company profile

CYCOPS SECURITY EXPERT

This training is designed for IT users with

minimal knowledge of IT. This provides

guidance for avoiding major security-breach

related disasters.

CORPORATE SECURITY TRAIN ING

This training is for Information Technology

professionals, who would need to know the

security tools they are dealing with and who

are interested in their optimal

implementations..

INDIV IDUAL AREA TRAIN ING

This is the highest level of information

security training, which would allow

candidates to develop security tools as well

as build the most complicated security

information subsystems

Proper handling of information security issues requires not only commitment to deal with these problems

but also adequate knowledge concerning them.

CyCops are a Certified Information Security group specializes in providing high-end corporate training and

Services throughout INDIA and abroad as well. We specialize in researching new and recently disclosed

vulnerabilities, pushing the boundaries of modern day network, Operating Systems and application security

testing. More than just using the publically available information related to security vulnerabilities, our team

conducts independent research to discover new vulnerabilities that could affect our customers systems.

CyCops offer training in various modules of security. These sessions are designed to help students or

employees to acquire the legal knowledge and skills they need to do their jobs efficiently.

The following are the fields in which training is provided.

• Introduction to Information Security

• Penetration Testing & Ethical Hacking

• OS Hardening

• Forensics Investigation

• Shell scripting & Programming basics

• Reverse Engineering

• Malware Analysis

• Reversing Applications

• Wireless Security

• RFID

• Bluetooth

• Designing and Implementation of Firewalls & IDS/IPS

• Log Analysis

• Incidence Response

• Public Key Infrastructure

• Disaster Recovery

• Personality Development (For job oriented only)

Real education must ultimately be limited to men who insist on knowing–the rest is mere sheep-herding.

Ezra Loomis Pound (1885-1972) U.S. poet.

Page 7: cycops india company profile

Krishna Chaitanya

Founder & Managing Director- CyCOPS (I) Pvt. Ltd. focusing on information security services and Trainings, located in the Hyderabad. He has over 6

years of professional experience working as a security system architect, security engineer, consultant, and as a Senior Manager, Technology

Services Group. He has worked with clients to build complete security architectures that include policies, standards, strategies, design

architectures and procedures that enable them to control security and performance on their systems. He has also performed vulnerability

assessments of client systems for security.

He has assisted companies in preparing for audits of their information security systems and methods. He specializes in Penetration testing

methodology. He has established himself as an industry professional by delivering presentations on information security at such prestigious

industry conferences as SVPNPA’s Ethical Hacking session, TechTatva, Manipal Institute of Technology (M.I.T) a national level technical fest and

GMR’s National workshop on Information Security. He has been interviewed by television media on topics like (Bypassing Firewall, Valentine’s Day

virus etc…) as a part of general security awareness. He has his technical writings published on portals like Economic Times, Data stronghold etc….

G. Lakshmikanth Reddy

He is an expert in computer forensics, web application security, shell coding etc. He is been performing pen tests for many organizations and has

been training corporates and students for four years now. He has also been to Tanzania to train the Tanzanian Revenue Authority in ethical

hacking and computer forensics.

G. Justin

Around four years of diversified professional work and experience in Information Security, Attack and Penetration, Forensic Investigations, Reverse

Engineering along Wi-Fi Architecture & security, Incidence Response with implementation experience in e-security products and networking

products in multi-platform environments.

Naveen Kumar Singh

He has an experience of three years in security pertaining to concepts of network security, pentesting, wi-fi security, rfid. He also has been training

corporate and students on security. He has been speaking about Information security with the media and also at conferences as the one

conducted by Manipal Institute of technology (M.I.T). Worked on advanced concepts like WIMAX security and Mobile adaptive routing.