home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
  Information Security Consulting (ISCP)

 
 
Enterprise Risk Assessment
 

Identify exposure to security threats

With the ever-changing landscape of technology and threats in an increasingly complex network of data exchange, maintaining awareness and effective management of security vulnerabilities is a full-time responsibility. Identifying these vulnerabilities and establishing sound practices and configuration controls can greatly increase an organization's security posture and improve its ability to avoid future vulnerabilities.

 
The Valiant Risk Analysis service investigates your organization's systems, networks, operations, and procedures to determine exposures to known threats. Less invasive than our Penetration Testing service, Risk Analysis takes a holistic approach to identifying weaknesses in security by investigating all aspects of your information management process and systems. Once vulnerabilities and their effect on the security of valued data assets are identified, Valiant security consultants can help you develop a comprehensive plan to address the technology and operational weaknesses.

Valiant security consultants deliver the Risk Analysis service in four phases:
  • Plan: Determine the scope of systems and processes, interview key players to determine critical points within the network, and collect information to determine priorities and execution processes.
  • Design: Develop a process to locate and measure vulnerabilities and create appropriate testing procedures.
  • Implement: Analyze and review information with customer staff in regular meetings to determine findings and recommendations.
  • Operate: Work with customer to create an outline of procedures to improve security and reduce vulnerabilities.
 
 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.