home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
  Service offerings

 
 
Education and Training                        Professional Services

Education and Training

Valiant offers certification oriented, custom made and generic non-certification training and education programs in the area of information security:


  • Certification oriented � Pioneering efforts have been made by Valiant to bring in a new learning experience in a variety of information security related certifications in our target market region � India and the Middle East . This includes workshops for the aspirants of certifications like CISSP, SSCP, CEH, CHFI, CBCP, CISA, CISM � Our expert faculty blend real-life experience with academic brilliance to bring to the class-room the best of learning experience for participants. These factors have contributed to Valiant's candidates attaining excellent scores in certification examinations and our enjoying well above the global pass rates among those trained by us.

    Most of Valiant trainings lead to vendor neutral certifications while a few vendor specific programs are also offered where the programs are highly focused on security like CCSP.

  • Custom made training programs are designed and delivered to business enterprises, law enforcement, armed forces, judiciary and government departments after carefully assessing training needs of specific groups. The complete training process cycle of assessing training need, discussing and finalizing needs and training approaches with training managers or executive management, creating need-based courseware and delivering highly focused training programs are all done in conformance with IBSTPI competency standards.

  • Generic non-certification programs � Not all skill sets required for a security professional result in a certification. Recognizing this and also recognizing that managers require upgrading of skills rather than prepare for examinations, Valiant offers training programs that are oriented towards imparting generic skill sets that can be adapted to organizational requirements. Some of our highly successful programs in this category include Creation and Implementation of Information Security Policies, Executive Management Security Briefings, Security Awareness for users, Security Self Assessment�

  • Why Valiant
      We are a pioneer in information security training in India and Middle East
    Our trainers are certified in their respective areas of specialization and have relevant industry experience
    Our instructional design and delivery conform to IBSTPI standards
    Our training programs blend theoretical rigor, industry practice knowledge, and excellent presentation skills
    Our programs have structured presentations supported often by case studies and hands-on skill enhancement sessions
    Our programs have in-built evaluation modules to assist participants focus on areas requiring further knowledge or skill enhancement
    Our training program participants go back with appropriate knowledge, skills and requisite confidence needed to secure information assets. 


 






Professional Services

Hardening of Servers and Network Components
Information Management
Virus Management
Network Optimization and Audit Services

 
Hardening of Servers and Network Components

A good perimeter security is a good starting point but does not guarantee absolute security. Other factors also influence the overall security of the information infrastructure. It has been reported in a number of independent studies and surveys that more than 60% of all attacks originate internally. Hardening or securing the servers and other network components that are used on the information network will significantly enhance the security levels in the organization.

Hardening involves the locking down of the servers and other components that are vulnerable in such a way that they are impregnable.

 

Blind lock down of all components will result in serious impairment of availability and will hamper efficient operations; hardening would be done in such a way as to attain the best balance between efficient operations of the information infrastructure and the required level of security driven by the risk levels considered comfortable to the organization.

Information Management

 

 

 

 

   


Virus Management

V-Tech Virus Management solutions core services are targeting the Virus outbreaks in the network.  V-Tech Virus management solutions comprise of Proactive and Reactive approach.
Proactive Approach provides the initial health check assessment phase and the periodic assessment of the antivirus infrastructure on a 1/2/3 yrs basis. 
The Reactive Approach Comprises of the trouble tickets which can be used when there is an outbreak of virus.

Network Optimization and Audit Services

Scope of Work :

  • Assessment of the network design and configuration.
  • Suggest and Re-engineer design, configurations for performance improvement.
  • Capacity assessment and engineering aligned with the business goals.

Deliverables:

  • Network Analysis, Audit and reconfiguration of the network devices.
  • Wireless Performance Analysis and reconfiguration(In case of a wireless network Infrastructure).
  • Optimization Solutions & Recommendations.
  • Proactively resolving network traffic issues.
  • Resolving and re-engineering network design issues.
 

 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.