Consultancy
We provide a spectrum of information security services to enterprises in the areas of Information Security Consulting, Security assessments, security architecture design, SIEM implementation, Compliance management etc and helping them to protect their information assets by proactively identifying the security threats and gaps.
Information Security Consulting Services
- Information Security Management Consulting
- Cloud security services
- Incident response plan and management
- Information Security Auditing Control and Framework
- Risk Identification, Management, Control and Risk Monitoring Framework
- Disaster Recovery and Business Continuity Planning
- Security Architecture Design
- Gap analysis and security roadmap design
- Development of Policies & Procedures
- High level architecture design
Compliance Management Services
- NIST Cyber Security Framework
- CIS Controls implementation
- IT Risks & Process
- Standards and regulations compliance
- ISO27001:2013
Implementation of SIEM solution based on Splunk
An in depth knowledge of Splunk helps companies to get a 360 degree visibility of their IT environment and obtain real time analytical data on security events.
We offer services such as:
- Splunk consulting services for strategy development to integrate Splunk to your corporate IT environment.
- Splunk architecture development for the technical design in accordance with the organizational requirements and make Splunk an integral part of your security network.
- Splunk deployment services to achieve maximum of its modules and the platform’s high performance and scalability
- Splunk fine-tuning to connect log sources to Splunk, normalize data flowing to it, configure its modules to process events from multiple network sources, develop custom correlation rules to let splunk report complex attacks.
- We help to shift your existing solution that fails to meet the security requirements to Splunk so that the platform helps you identify arising threats and respond to them properly.
ELK+AlienVault- Unified SIEM
OSSEC HIDS is a free Host-based Intrusion Detection System (HIDS) used for security detection, visibility, and compliance monitoring. It’s based on a multi-platform agent that forwards system data (e.g log messages, file hashes, and detected anomalies) to a central manager, where it is further analyzed and processed, resulting in security alerts. Elastic Stack is an open source software suite used to collect, parse, index, store, search, and present log data. It provides a web front-end that gives a high-level dashboard view of events that allows for advanced analytics and data mining deep into your store of event data.
A diverse set of capabilities such as File integrity monitoring,Intrusion and anomaly detection,Automated log analysis, Policy and compliance monitoring etc are provided by integrating OSSEC, OpenSCAP and Elastic Stack into a unified SIEM solution.
We offer services such as:
- ELK+OSSEC SIEM consultation
- ELK+OSSEC SIEM architecture development
- ELK+OSSEC SIEM deployment
- ELK+OSSEC SIEM fine tuning
- ELK+OSSEC SIEM migration services
- Elasticsearch based threat intelligence
Members
Upen Patel
Upen Patel is an Information Risk professional who guides the risk management team in the development of strategic program elements including providing input to IRM risk prioritization the enforcement and interpretation of BNY Mellon information risk policies and standards; Upen collaborates with subject matter experts to determine risk scoring methodology and communicate to our business partners potential impact from changes to information risk policy and provide education on information risk matters that involve legal or regulatory matters, acting as liaison for the multiple business sectors.
Upen has a MS in Information Assurance from Pace University, NY, MS In Environment Engineering from NYU Polytechnic Institute, and BS in Geology from York College (CUNY). He is also certified in CISA, CISM, CRISC,CCSP and CISSP.
Upen is closely associated with a ISACA New York Metropolitan Chapter for the past 8 years, he volunteers at ISACA events year around as his expertise aids in his passion to give back to the community. Upen also appreciates the opportunity the Chapter provides to earn CPE. As working as a volunteer, Upen enjoys working directly with the Board, and it him to improve his leadership skills and prepares him for a planned future run to be elected to the Board. Upen noted how he recently, volunteered for 2-day Data Privacy class which was held by ISACA, and learned up close all of the details needed to make a class a success. Right down to making sure the afternoon coffee was on time, since the students were looking forward to refreshments during the break. As a volunteer, you also get to interact with of everyone which helps for networking, getting to know other professionals in your field, and other soft skills. It is amazing the feelings of accomplishment and pride you get when you volunteer, and know you are helping make a difference.
Sumesh MS
Sumesh has been in the IT industry for over 12 years. He is specialized in developing IT security solutions and strategies for addressing the current challenge faced by organizations. He has worked with different lines of businesses including Software development, Education, Research & Development and Aviation. He is enthusiastic and passionate about open source security technologies and has implemented many IT security solutions using open source technologies. Throughout the career he has worked with various platforms such as *nix, Windows and different networking infrastructures. Data analytics and scripting are his major areas of interests and he is certified in CISSP, CISA,CISM,CCSP and OSCP.
Rucha Agre
Rucha is an experienced Information Security Professional with a demonstrated history of working in the information technology and services industry and skilled in network, infrastructure and cloud security. Her skill sets include firewall audits, device compliance management, attack surface management, incident and vulnerability management (on premise and cloud). She is experienced in developing information security policies and processes and posses good understanding of networking. Rucha is certified in CISSP and CCSP.