Security - cetin.rs
Audit and Strategy
Support customers to be better prepared for threats or ensure compliance with the regulatory requirements. The service addresses risk management, applied technologies and organization readiness.Benefits
- Improvement of organizational and technical capabilities
- Optimization of the Risk response with the most efficient defense strategies
- Support for educated management decisions
- Consultancy and support from highly skilled and experienced professionals
- Compliance with industry standard methodologies, standards and best practices
Risk Assessment
Security Strategy
Awareness Program
Audit Preparation
Risk Assessment
represents an assessment of security risks, maturity of the organization and used procedures, defense capabilities of the technology, and proposing the most efficient remediation action plan.
Security Strategy
includes creation or support for security strategy, roadmap, and governance, in in-line with the business and IT strategies, considering the as-is state, risks, external constraints, and attention to efficiency.
Awareness Program
measures the security awareness of the organization and provides proper response, like training and other improvement possibilities to increase the attention to security.
Audit Preparation
helps the organization to get prepared for the industry standard ISO 27001 audit, with ISMS governance framework, and the technical, and organizational capabilities to be compliant with IT. Services also include consultations from the physical and technical domains.
Enterprise Security Services
We help customers build technology defense around their business, services, assets, and data. Within this area, we offer expertise in designing, implementing, supporting, and O&M of selected technologies in different security domains.Benefits
- Increased defense capabilities of the infrastructure and the applications
- Optimized solutions to address the cyber threat
- Tailored and multi-layer protection
- Consultancy and support from highly skilled and experienced architects and engineers
- Services measured with set of performance indicators and ensured with SLAs
Infrastructure Protection
Endpoint Protection
Content and Application
Cloud Security
Infrastructure Protection
includes DDoS Protection, Intrusion Detection System (IDS), Linux security forensics, Privilege Access Management (PAM), Identity Management and Authentication services (IAM), Security information and event management system (SIEM), Network Behavioral Analytics (NBA).
Endpoint Protection
contains extensive functions for Malware protection and detection, Managed Endpoint Security, Host Intrusion Detection, and Mobile Device Management.
Content and Application
security represents protection for applications and data with solutions of API security, Web Application Firewall, PKI and cryptography, Web Content Management, Data Loss Prevention, or Email Security.
Cloud Security
contains security in the Microsoft cloud, supports provision to the design and implementation of a secure environment in O365 and Azure, and ensures security management.
Security Operations Center Services
Security Operations Center (SOC) is the “eye” and the “hand” of Security. SOC is a set of technologies, functions, procedures, and the organization, to defend the information systems and data; assess, monitor, and react to the cyberthreat. The service covers the implementation of SOC services or providing 5/8 or 24/7 SOCaaS.Benefits
- Increased visibility and reaction capabilities to manage cyber threats
- Better control over the security exposure of the infrastructure and the applications
- Consultancy and delivery from highly skilled and experienced cyber security engineers
- Services measured with set of performance indicators and ensured with SLAs
Design and Implementation
Infrastructure Management
Monitoring and Analysis
Design and Implementation
starts with assessment, analysis, IT architecture, and topology investigation, then continues with planning and implementation (architecture, processes, operational documentation, and organization) and integration.
Infrastructure Management
covers lifecycle management, operation and maintenance of the infrastructure, integration of sources, development of use cases, analytics, dashboards, and reports.
Monitoring and Analysis
provide for security events and announcements coming from different sources to be collected, analyzed and triaged by using set of rules and automations. Based on the score, incidents are then sent to the relevant teams, while saved as evidence.
Incident Management
Vulnerability Management
Threat Management
Incident Management
is available for consultancy after a security incident has been detected and handed over to the resolution teams. Also, incidents are tracked for reporting and resolution analyses.
Vulnerability Management
assesses to detection of security vulnerabilities, analyzes and reports them, and initiates remediation activities. After triggering the remediation, the progress and its effectiveness are tracked and reported.
Threat Management
enables us to quickly react to threats and control security exposure. Threat sources are monitored to gather information, analyze risk and relevance, and trigger remediation.