Cyber Architecture and design consulting
We use a mix of interviews, tools and experience to provide consulting services on customer environment and roadmap services.
Our design principles are based on defined standards like NIST, etc., and other global frameworks. We also need to take into account compliances which are applicable to the domain. We don’t offer the full range of ISMS services which are required for complying to PCI, HIPAA or other norms , however our best practices on designing solutions are based on these guidelines.
Security control implementations
Our team has spent many years on the field implementing next generation security solutions which includes firewalling technologies to end point EDR solutions. We offer professional services for very critical customers across ASEAN and are proficient in this field. We offer various services under this head.
Some of the technologies we handle under security controls implementations are as below
- NGFW implementation
- DDOS protection and assessment
- DDOS simulation
- HSM Security
- Application Security Solutions
- Threat protection implementation
- Identity solutions implementation
- Complex network security implementations
- EDR solutions implementations
The third party understanding and deployment of this tools is a huge specialization for team. We have tied up with extremely high end solutions and solution providers to deliver a comprehensive security solution around this space.
The team uses the native tools to build a robust solution in the cloud and then works to enhance through third party tools. AWS Identity & Access Management (IAM) is a speciation which is used to strengthen the security of the identity store by doing audit, understanding the strengthening of the setup. The various functions arising out of AWS Single Sign-On and AWS Directory Service are used extensively by the team to achieve the functionalities which gives the robustness to the core of the customers infra. We also try and explore the use of Amazon Cognito inside customer applications security enhancement requirements.
Workmates teams are specialized in using the tools natively provided by AWS to achieve the security posture to enhance their security soluton.
AWS Network Firewall , AWS Shield and AWS Web Application Firewall (WAF) are three things which our network security teams specialize in and offer best of the breed integrated solutions. The tools help us thwart 90% of the attacks if configured well and is part of the well documented managed services.