home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
  Information Security Consulting (ISCP)


 
 

Network Security Architecture Review and Design

 



Security Architecture

Identify and mitigate gaps in your security architecture
Security is the result of a marriage between complex technologies and ingrained processes. However, many organizations suffer from intermittent evolution of point solutions resulting in a fragmented framework of technologies and processes that ultimately weaken security.

Our Security Architecture service investigates your existing infrastructure to discover gaps or weaknesses in your security architecture to identify and mitigate known security threats or inherent weaknesses. Our consultants work hand-in-hand with your team to help identify, measure, document, and employ the critical processes and administrative activities required to effectively maintain your security posture.

 


Valiant's Security Architecture service covers the following areas:

  • Plan: Through a brief and comprehensive interview process, Valiant consultants will work your organization to develop strategies that are compliant with your corporate security policy while meeting your desired security standards.
  • Design: Valiant will design a solution that is scalable and conforms to your current IT infrastructure. Valiant will ensure that the design incorporates a balanced approach between security and usability, and is flexible to meet future requirements.
  • Implement: Valiant will implement a phased approach to ensure that services are functional in a test environment and that all design criteria are met. Valiant will deliver the final product in a timely manner and within budget. Valiant will ensure that client staff are familiar with the solution, and are capable of maintaining it in the long term


Security Technical Infrastructure

Integrate a multi-layered technical security solution for your network
An organization's network security posture is ultimately realized by the implementation of security technology. However, reliance upon a single technology to solve all network security vulnerabilities is often the first flaw in a network security program. Firewalls, virtual private networks (VPNs), public key infrastructure (PKI), intrusion detection systems (IDS), authentication, authorization, and accounting (AAA), encryption, virus scanners, and policy management are all solutions that require expertise to implement correctly.

With Valiant's Security Technical Infrastructure, our security experts assist you with developing criteria for product selection, identifying and designing architectural and operations requirements, pilot testing, building an implementation process, and integrating the solution. This service is designed to help implement a multi-layered technical security solution that aligns with your defined security policy, is tightly integrated into your infrastructure and operations, and ensures the continued security of your current network and future growth.

 


The Valiant Security Technical Infrastructure service assists in all phases of implementing a multi-layered security solution integrating technologies such as PKI, VPN, firewall, IDS, and AAA. Activities are performed in four phases:

  • Plan: Develop a technology strategy compliant with your corporate security policy and desired security posture.
  • Design: Develop a scalable solution that fits with your current IT infrastructure and is flexible to meet future requirements.
  • Implement: Implement a phased approach to ensure that services are functional in a test environment and all design criteria are met. Deliver final solution with complete knowledge transfer to operations staff.
  • Operate: Based on developed documentation outlining systems operations, Valiant can assist in tuning the solution to ensure sound operations and all security services are functioning as expected.
 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.