How it Works
Tell us what you need by filling in the form
Receive Verified supplier details
Compare Quotations and seal the deal
X
I agree to the terms and privacy policy
144188195215245280

Presidio Information Risk Management

Pune, Maharashtra

| GST  27AASFP6543K1ZI

View Mobile Number

Offering remote penetration testing services, technology risk assessment services etc....Read More

Technology Risk Assessment Services
Get Best Quote

The need for proactive and robust Information Security and Risk Management in today’s connected world is of paramount importance. At the same time one needs to maintain electronic relationships and provide access to a wide audience of partners, from customers to employees. We help you fortify your business assets and protect critical information to mitigate Operational and Technology Risk and ensure business continuity. We assist you to decide which of the Information Security measures and strategies are vital to your organization by factoring in your unique business environment and goals. Presidio Information Risk Management delivers this with utmost Quality and Integrity through a partnership model with customers where we add value with our domain knowledge and experience.

View Complete Details

Yes I'm interested

Internal Vulnerability Assessment
Get Best Quote

Periodic, controlled testing of internal and external access points to organisation’s network protects key resources and information assets. This assessment service determines the nature of security vulnerabilities which exist on the network devices, servers as well as hosts, and methods of mitigation. The internal vulnerability assessment covers network equipments, databases and operating system platforms like Windows , Solaris and Linux. This activity is usually performed by executing tool-based scans on the network and hosts within the client’s internal network.

View Complete Details

Yes I'm interested

Remote Penetration Testing
Get Best Quote

Today, the chances of a security breach in an organization leveraging the Internet for ongoing business is much more than what it used to be in the past. The key reason behind this increased exposure of organizations to these threats is the adoption of newer technologies, exposure to multiple external networks, internet and easily available sophisticated hacking tools to exploit vulnerabilities. here must be a way for organizations to test if the protective measures that they have put together to secure the enterprise are adequate or not. The goal of our penetration testing service is to determine if the protective controls put in place by your organization to safe guard its information assets can be compromised. The penetration testing exercise gives your organization the picture of the overall security of the infrastructure as seen from the internet. We perform vulnerability analysis to determine all potential vulnerabilities for each network service running on each identified host. Our consultants perform vulnerability measurement and data collection to identify methods of entry into an organisation’s corporate network through exploitation of network vulnerabilities. At the end we provide mitigation solutions for all identified loopholes in the network including LAN and WAN set up.

View Complete Details

Yes I'm interested

Web Application Security Architecture Design and Testing
Get Best Quote

Network and Web Application Security Architecture Design and Testing

 

 

As connectivity increases, so does the risk of network and application attacks. In this environment, two factors drive the need for a security system: the need to maintain the integrity of data communications and the need to protect intellectual property and information assets.
A secure architecture requires assessment and configuration of every aspect of the network. We recommend an optimal architecture and provide product recommendations. We set up authentication, authorization, access control and data integrity policies as well as best practice
policies for critical applications and products.

View Complete Details

Yes I'm interested

Network Architecture Base Lining and Hardening
Get Best Quote

To maintain enterprise-wide security architecture, minimum security baselines
need to be established for network infrastructure components, based on the value of information that is either maintained in or transmitted through them. Our network infrastructure hardening and baseline services identify configuration management, monitoring, testing, and maintenance for infrastructure components based on the value assigned to them.

View Complete Details

Yes I'm interested

Risk Based Information Security Audits
Get Best Quote

Information Security audits involve a set of periodic, pro-active compliance and assurance
reviews that help in assessing Technology and Operational Risks of your organization and
mitigate the same in timely manner. They encompass security architecture, policy, processes
and vulnerability assessment.

View Complete Details

Yes I'm interested

Business Continuity Planning, Bs25999 Certification
Get Best Quote

A sound contingency strategy and tactical business continuity planning are essential for every organization. We are dedicated to minimizing the effects that misfortune could have on your business. We work closely with you to develop customized business continuity solutions addressing your company’s specific needs and budget. Presidio IRM has successfully completed BS25999 consulting and gap assessment assignment for a multinational company. We help organizations in developing BCP strategy, BCP Plan, Business Impact Analysis, BCP test Plan, DR planning and conducting BCP training.

View Complete Details

Yes I'm interested

User Awareness Training
Get Best Quote

User Awareness Training

Get Latest Price

Information Security is the responsibility of every individual and not just the IT and Administration Departments. The probability of internal threats to Information Assets is more than External threats. Compliance and regulatory requirements expect every individual associated with an organization to know their responsibility towards Information Security. We design and conduct customized user awareness training programs for management, IT team and end users.

View Complete Details

Yes I'm interested

Security AMC

Get Latest Price

Few companies have the internal staff to address their security initiatives effectively. Our security AMC services offer clients the opportunity to purchase a specified number of man-days over the course of a 12-month contract. During the contract period, they have access to the full resources of our dedicated information security services practice. For more information on security AMC please visit security AMC page on our website.

View Complete Details

Get Best Quote
Yes I'm interested

ISO 27001:2005 - standard for Information Security. Typically our work begins with a gap assessment and risk review utilizing risk assessment tools, industry standard methodologies and our proprietary methods. We then highlight areas of noncompliance, and work with stakeholders to design a clear road map to attaining the ISO 27001 certification. We develop all required documentation, provide training and ongoing consultation to clients and help them throughout certification process. We also assist customers who have achieved certification, in ongoing compliance ensuring they continue to operate within the guidelines of the standard and reap the rewards of a structured approach to information security management system. Customers can outsource all ongoing certification management activities to us enabling them cost effective and efficient way of maintaining certification with minimal operational overhead on internal staff.

View Complete Details

Get Best Quote
Yes I'm interested

An audit of this nature is typically carried out at the enterprise IT organization level and its objective is to assess the IT infrastructure in the context of security and availability. The elements covered in this service are Network devices like firewalls, Intrusion detection systems, VPN etc., Database and Application Security, Disaster recovery
infrastructure and processes, Contingency plan and processes and further customization as per customer requirements

View Complete Details

Get Best Quote
Yes I'm interested

Due Diligence assessments are more broad-based assessments of information systems currently in place. They examine policy, technology infrastructure, and operational effectiveness and compliance of these systems. Strengths and weaknesses are identified and recommendations for program improvements are described. Assessments can be tailored to address specific needs and concerns. They can provide an independent evaluation of the security program.

View Complete Details

Get Best Quote
Yes I'm interested

Information technology (IT) controls form the backbone of the various software/ applications used by your company for effective financial reporting. IT controls are critical to ensure the integrity of your company’s financial reporting. Our Information Risk Management Professionals can help you plan technology process and control methodologies needed for Sarbanes-Oxley compliance efforts.

View Complete Details

Get Best Quote
Yes I'm interested

IT Services Management

Get Latest Price

IT Service Management best practices are being i adopted by organizations to improve the quality of their IT department service and reduce operational costs and overheads. Presidio IRM can help you in successful adoption of best business practices and standards and thus maximize returns on IT investment.

View Complete Details

Get Best Quote
Yes I'm interested

Get Price & Details

Get Price & Details

Get Price & Details

Get Price & Details

Ongoing Monitoring is one of the pillars of effective security program of any organization. At the same time it is time and resource consuming. Similarly if not managed well investments in antivirus software could go terribly wrong. Presidio has developed innovative and effective way of managing ongoing compliance requirements including log monitoring and incident reporting.

View Complete Details

Get Best Quote
Yes I'm interested

Offering remote penetration testing services, technology risk assessment services etc....Read More

Download Brochure

Nature of Business

Service Provider

GST Number

27AASFP6543K1ZI
View Complete Details

Get In Touch

Reach Us

Presidio Information Risk Management1st Floor, No. 1788, Sadashiv Peth, Deshmukh Colony, Sadashiv Peth,
Pune-411030, Maharashtra, India

Manager

Send SMS
Send Email
Send us a Quick Message!
Tell Us What Are You Looking For?
I agree to the terms and privacy policy
View Mobile Number  to reach us quickly
Tell us what you
need
Receive seller
details
Seal the deal
Save time! Get Best Deal
I agree to the terms and privacy policy