home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
  Information Security Assurance and Control Practice (ISAP)

 
 

Vulnerability Assessment and Penetration Testing

 



Vulnerability Assessment

Threats are always on the look out for vulnerabilities to exploit; it is therefore important that information systems are kept devoid of as much vulnerabilities as possible.  Our consultants use a situation-appropriate approach to cataloguing vulnerabilities and assessing if there are appropriate countermeasures to prevent the vulnerabilities being exploited.  

Once the assessment is completed, V-Tech consultants would provide detailed report on what are the risks of the vulnerabilities being exploited by insiders and external attackers and help managements make an appropriate decision on the countermeasures to be put in place.
 

 

Penetration Testing

This is a powerful tool to test the security perimeter of an information system – both internal and external.  Quite often referred to as ‘ethical hacking’ the process considers the vulnerabilities that are likely to be exploited by hackers and crackers.  The primary objective of penetration testing is to provide a well considered and informed view of the strengths and weaknesses of the security systems, supporting such views with evidence of the vulnerabilities.  Vulnerabilities will also be analyzed to determine appropriate countermeasures. Penetration Tests end with a report on the different levels of vulnerabilities uncovered by the test, including recommendations to resolve or mitigate these vulnerabilities, in order to reduce risks to an acceptable level in line with the risk appetite of management. 

 

V-Tech Penetration Test Teams use procedures and techniques almost similar to what real hackers do, using automated tools and perform live penetration attempts by test team members.  Depending on the nature of the network, a variety of conventional and unconventional penetration methods are adopted. 

 
 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.