SlideShare a Scribd company logo
Aksit profile final
Established in 2006
Providing services in the domain of Information Security, comprising of
• Consultancy,
• Compliance,
• Network Security,
• Application Security,
• Cyber Forensics and
• IT Security Training.
Qualified, Certified Consultants
Six years, more than 1250 Web Application Security Audits
AKS IT Services
Our Services
• Consulting and Compliance
– Security Consulting & Implementation
– Information Risk Management
– ISO 27001 :2005 Implementation
– ISO-22301 Implementation
– Incident Handling
– Compliance With Various Guidelines
• Security Auditing
– Network Security Audit
– Vulnerability Assessment & Penetration Testing and
– Web Application Audit
– Mobile Application Audit
How We Help Our Clients
• Cyber Forensics
– Media Forensics
– Network Forensics
– Machine / Mobile Forensics
– Cyber Crime Investigation
– Fraud Investigation
• Corporate Training
– Security Awareness Training
– Cyber Forensics Training
– BCP/DR Workshop
– Preparatory courses for CISSP & CISA Certification
How We Help Our Clients
Indian Computer
Emergency
Response Team
(CERT-In)
Controller of
Certifying
Authorities
(CCA)
Indian Air Force
National
Technical
Research
Organization
National
Informatics
Centre
Indian Army
A few of the organizations we are empanelled with:
Vulnerability Assessment & Penetration
testing
 Vulnerability Assessment
 Identify and understand the existing vulnerabilities
 Scan the targeted network(s) and host(s), based on the defined scan
policy
 Collect the scan results and analyze for security loopholes,
configuration errors, default installation settings, overlooked setups,
password quality, firmware/software revisions, patch fixes, security
policy violations etc.
 Penetration Testing
Testing and validation of detected vulnerabilities
Provides independent analysis of your network to locate all exploitable
vulnerabilities
Advise on the most effective solutions to secure network
 Configuration Audit
 Study and analyze the Servers, Network Devices and Security
Device’s roles and configuration through configuration audit.
 Understand and evaluate the loopholes in the configuration, if
any.
 Facilitate in hardening of information systems.
 Network Performance Testing
 Evaluate the Bottlenecks, Protocol Utilisation, Broadcasting
and Network Error in the network, identify their remedial
solutions and recommend implementation of the same to
mitigate identified errors.
 Recommendations for Error free Network design.
 Top Ten Interfaces showing more bandwidth and protocol
utilisation.
 GAP Analysis
Our processes and methodology are benchmarked against industry
best practices and established standards. In this phase, a thorough
security assessment will be carried out with two goals in mind:
Identifying the present “As – Is” status vis –a – vis the desired
benchmark, and their impact on Information Security.
The ambit of this includes:-
 Administrative Security
 Physical Security
 Logical Security
 Processing Security
 Business Continuity Management (BCM)
 Identify gaps in the existing controls
Web Application Security Testing
The Standard used for Web Application Security Testing is
OWASP (Open Web Application Security Project). The OWASP
2010 represents a broad consensus about what are the most
critical application security flaws.
OWASP 2010
1. Injection Flaws
2. Cross Site Scripting (XSS)
3. Broken Authentication and Session
Management
4. Insecure Direct Object Reference
5. Cross Site Request Forgery
6. Security Misconfiguration
7. Insecure Cryptographic Storage
8. Failure to Restrict URL Access
9. Insufficient Transport layer
protection
10. Invalidate Redirect and Forwards
Methodology
 Understand the scope and purpose of the Website. Review the Web
Application structure and specifications so as to understand the basic
design of the Website.
 For the Web Application under review, identify, document and
understand the "high value objects" that a malicious attacker would
seek to steal or exploit (e.g., user IDs, customer data, passwords).
 Devise attacks or methods using proprietary AKS IT© techniques to
obtain the desired data objects.
 Once Web Application security is handled, check if a valid/invalid user
can use the Web Application in a manner so as to subvert the
underlying security model of the system.
 Various attacks are devised on each component and then relevant
vulnerabilities are demonstrated.
 Core Impact – The most comprehensive penetration testing solution
for assessing and testing critical security vulnerabilities throughout the
organization.
 Immunity Canvas – Canvas is a trusted security assessment tool that
allows penetration testing and hostile attack simulations to be
conducted by security professionals. Canvas offers a level of exploit
quality, availability, and real-world use unparalleled by any
competitors.
 Metasploit – It is a solution for security professionals in enterprise,
government & consulting firms who need to reduce costs by making
network security testing more effective & efficient. Metasploit Pro
improves the efficiency of the penetration testers by providing
unrestricted remote network access and enabling teams to efficiently
collaborate
Our Range of Products
 Nexpose - It is a vulnerability assessment, policy compliance and
remediation management solution designed for organizations with
large networks which require the highest levels of scalability,
performance, customizability and deployment flexibility.
 Nessus - It is the industry’s most widely-deployed vulnerability and
configuration assessment product. Nessus features are high-speed
discovery, configuration auditing, asset profiling, sensitive data
discovery, patch management integration, and vulnerability analysis of
your security posture.
 Acunetix - Acunetix web vulnerability scanner is a tool designed to
discover security holes in your web applications that an attacker
would likely abuse to gain illicit access to your systems and data. The
application can be used to perform scanning for web and application
vulnerabilities and to perform penetration testing against the
identified issues.
Mobile Forensics
 Oxygen Forensic Suite – It is mobile forensic software that goes beyond
standard logical analysis of cell phones, smartphones and tablets. Use of
advanced proprietary protocols and phone APIs makes it possible to pull
much more data than can be extracted by forensic tools utilizing standard
logical protocols, especially for smartphones.
 Susteen Secure View 3 - It provides affluent data to the mobile phone
forensic investigator or instructor with the foundation for law
enforcement, military/civil, consultant, corporate, and education
institutions to perform advanced, proficient mobile device investigations in
corporate IT, security, or criminal situations.
 Paraben’s Device Seizure - Device Seizure is designed to allow
investigators to acquire the data contained on cell/mobile
phones, smartphones, tablets, GPS, iPhones/iPads/iPod Touch/iPods, and
PDA devices without affecting data integrity. With mobile phones, it is
designed to retrieve data such as phone numbers, sms, pictures, call
history, and full data dumps.
Forensic Products
Computer Forensic
 TD2 - This second-generation product was engineered for standalone
forensic acquisitions in both field and lab settings, natively imaging
both SATA and IDE/PATA hard drives at drive limited speeds up to
9GB/min, in a 1:1 or a 1:2 (aka, “twinning”) configuration. One can
image SAS, and USB storage devices with TD2 by using the Tableau
Protocol Modules.
 Encase - It is a investigation solution, is for forensic practitioners who
need to conduct efficient, forensically sound data collection and
investigations using a repeatable and defensible process
 P2 Commander - It is a computer forensic solution for examiners who
need affordable, reliable digital analysis for computer investigations.
Built to process large volumes of data in a fast and efficient manner, P2
Commander is known for its advanced email and chat log analysis.
Continue…
 Network E-mail Examiner – Paraben’s Network E-mail Examiner is an
advanced network email archive analysis and conversion tool. Examine
Microsoft Exchange (EDB), Lotus Notes (NSF), and GroupWise e-mail
stores without the need for a long and painstaking restore process.
Analyze, search, and report on pertinent data within the email
database and export to many mail formats including PST.
 Chat & Email Examiner – Paraben’s Chat Examiner is another
specialized component of Paraben's P2 Forensic Collection that adds
one more powerful program to your toolkit. Whether your case has
ICQ, Yahoo, MSN, Trillian, Skype, Hello, or Miranda you'll be able to
handle whatever comes
 Passware Kit Forensic - This advanced password recovery suite
allows you to recover more passwords, from more programs, in a
shorter amount of time using many different methods including the
advanced XieveTM attack method, distributed computing, and live
memory acquisition.
 AKS IT provides the customized forensic workstation as per the
requirements of our customer. It can be of 2 types -
 One can set up forensic workstation in their lab itself .
 Another one is a forensic laptop which we can carry to the crime spot
for acquisition and analysis of data. It comes in a rugged carrying case.
Forensic Workstation
 ALSTOM,
 Andhra Pradesh Technology Services Ltd (APTS),
 Bharti Airtel,
 Central Board of Secondary Education (CBSE),
 Ericsson,
 General Insurance Corporation,
 HCL,
 Indian Railways,
 National Informatics Centre (NIC),
 NTPC,
 Ranbaxy,
 TCS,
 WIPRO.. and many more
Some of our Clients
Thank
You
AKS IT SERVICES (P) Ltd.
E-52, Sector-3, Noida, 201301
Ad

More Related Content

What's hot (20)

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
Jennifer Mary
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
Mohit Belwal
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Application Security Testing(AST)
Application Security Testing(AST)Application Security Testing(AST)
Application Security Testing(AST)
Arvind Bhardwaj [AB]
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
Lee Wei Yeong
 
SEI CERT Podcast Series
SEI CERT Podcast SeriesSEI CERT Podcast Series
SEI CERT Podcast Series
James W. De Rienzo
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
Atif Ghauri
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
Thomas Malmberg
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended Use
Kaspersky
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
u10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubeinu10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubein
Kent Haubein
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
Application Security
Application SecurityApplication Security
Application Security
florinc
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
Priyanka Aash
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
Michael Man
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
Jennifer Mary
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
Mohit Belwal
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
Lee Wei Yeong
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
Atif Ghauri
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
Thomas Malmberg
 
IIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended UseIIC IoT Security Maturity Model: Description and Intended Use
IIC IoT Security Maturity Model: Description and Intended Use
Kaspersky
 
u10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubeinu10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubein
Kent Haubein
 
Application Security
Application SecurityApplication Security
Application Security
florinc
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
Priyanka Aash
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 

Viewers also liked (12)

47 Sylvan Ave, Pleasant Ridge, Forsale2
47 Sylvan Ave, Pleasant Ridge, Forsale247 Sylvan Ave, Pleasant Ridge, Forsale2
47 Sylvan Ave, Pleasant Ridge, Forsale2
Julie Thayer
 
176 Ardmore
176 Ardmore176 Ardmore
176 Ardmore
Julie Thayer
 
421 West Kalama, Madison Heights, Forsale2
421 West Kalama, Madison Heights, Forsale2421 West Kalama, Madison Heights, Forsale2
421 West Kalama, Madison Heights, Forsale2
Julie Thayer
 
6176 Atkins, Forsale2
6176 Atkins, Forsale26176 Atkins, Forsale2
6176 Atkins, Forsale2
Julie Thayer
 
Milliman cite auto auth brd
Milliman cite auto auth brdMilliman cite auto auth brd
Milliman cite auto auth brd
Alecia Chrin
 
Dmdc ccc-ticketing system requirements v7b
Dmdc ccc-ticketing system requirements  v7bDmdc ccc-ticketing system requirements  v7b
Dmdc ccc-ticketing system requirements v7b
Alecia Chrin
 
1422 North Blair, Royal Oak, Forsale2
1422 North Blair, Royal Oak, Forsale21422 North Blair, Royal Oak, Forsale2
1422 North Blair, Royal Oak, Forsale2
Julie Thayer
 
Presentación Import Talent
Presentación Import TalentPresentación Import Talent
Presentación Import Talent
Josep Fernández
 
586 E. Oakridge,Ferndale,Forsale1
586 E. Oakridge,Ferndale,Forsale1586 E. Oakridge,Ferndale,Forsale1
586 E. Oakridge,Ferndale,Forsale1
Julie Thayer
 
14025 Ludlow, Oak Park
14025 Ludlow, Oak Park14025 Ludlow, Oak Park
14025 Ludlow, Oak Park
Julie Thayer
 
Sample business system process maps
Sample business system process mapsSample business system process maps
Sample business system process maps
Alecia Chrin
 
Senior PM with Real World Experience
Senior PM with Real World ExperienceSenior PM with Real World Experience
Senior PM with Real World Experience
Alecia Chrin
 
47 Sylvan Ave, Pleasant Ridge, Forsale2
47 Sylvan Ave, Pleasant Ridge, Forsale247 Sylvan Ave, Pleasant Ridge, Forsale2
47 Sylvan Ave, Pleasant Ridge, Forsale2
Julie Thayer
 
421 West Kalama, Madison Heights, Forsale2
421 West Kalama, Madison Heights, Forsale2421 West Kalama, Madison Heights, Forsale2
421 West Kalama, Madison Heights, Forsale2
Julie Thayer
 
6176 Atkins, Forsale2
6176 Atkins, Forsale26176 Atkins, Forsale2
6176 Atkins, Forsale2
Julie Thayer
 
Milliman cite auto auth brd
Milliman cite auto auth brdMilliman cite auto auth brd
Milliman cite auto auth brd
Alecia Chrin
 
Dmdc ccc-ticketing system requirements v7b
Dmdc ccc-ticketing system requirements  v7bDmdc ccc-ticketing system requirements  v7b
Dmdc ccc-ticketing system requirements v7b
Alecia Chrin
 
1422 North Blair, Royal Oak, Forsale2
1422 North Blair, Royal Oak, Forsale21422 North Blair, Royal Oak, Forsale2
1422 North Blair, Royal Oak, Forsale2
Julie Thayer
 
Presentación Import Talent
Presentación Import TalentPresentación Import Talent
Presentación Import Talent
Josep Fernández
 
586 E. Oakridge,Ferndale,Forsale1
586 E. Oakridge,Ferndale,Forsale1586 E. Oakridge,Ferndale,Forsale1
586 E. Oakridge,Ferndale,Forsale1
Julie Thayer
 
14025 Ludlow, Oak Park
14025 Ludlow, Oak Park14025 Ludlow, Oak Park
14025 Ludlow, Oak Park
Julie Thayer
 
Sample business system process maps
Sample business system process mapsSample business system process maps
Sample business system process maps
Alecia Chrin
 
Senior PM with Real World Experience
Senior PM with Real World ExperienceSenior PM with Real World Experience
Senior PM with Real World Experience
Alecia Chrin
 
Ad

Similar to Aksit profile final (20)

Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdfPenetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
resume IT security
resume IT securityresume IT security
resume IT security
Michael Moore
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
Dr. Afnan Ullah Khan
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
Jonathan Fuller
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
Rhys A. Mossom
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
ITrust - Cybersecurity as a Service
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
Saravanan Manickam
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
eForensicsMag
 
Standards and methodology for application security assessment
Standards and methodology for application security assessment Standards and methodology for application security assessment
Standards and methodology for application security assessment
Mykhailo Antonishyn
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
Aardwolf Security
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
Sanjoy Debnath
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
Shashikant Chavan CCNA, C|EH, ITIL V3
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdfPenetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
Rhys A. Mossom
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
eForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teasereForensics Free Magazine 01.12. teaser
eForensics Free Magazine 01.12. teaser
eForensicsMag
 
Standards and methodology for application security assessment
Standards and methodology for application security assessment Standards and methodology for application security assessment
Standards and methodology for application security assessment
Mykhailo Antonishyn
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
Aardwolf Security
 
Ad

Recently uploaded (20)

Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Buckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug LogsBuckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug Logs
Lynda Kane
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
#AdminHour presents: Hour of Code2018 slide deck from 12/6/2018
Lynda Kane
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Buckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug LogsBuckeye Dreamin' 2023: De-fogging Debug Logs
Buckeye Dreamin' 2023: De-fogging Debug Logs
Lynda Kane
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Datastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptxDatastucture-Unit 4-Linked List Presentation.pptx
Datastucture-Unit 4-Linked List Presentation.pptx
kaleeswaric3
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 

Aksit profile final

  • 2. Established in 2006 Providing services in the domain of Information Security, comprising of • Consultancy, • Compliance, • Network Security, • Application Security, • Cyber Forensics and • IT Security Training. Qualified, Certified Consultants Six years, more than 1250 Web Application Security Audits AKS IT Services
  • 4. • Consulting and Compliance – Security Consulting & Implementation – Information Risk Management – ISO 27001 :2005 Implementation – ISO-22301 Implementation – Incident Handling – Compliance With Various Guidelines • Security Auditing – Network Security Audit – Vulnerability Assessment & Penetration Testing and – Web Application Audit – Mobile Application Audit How We Help Our Clients
  • 5. • Cyber Forensics – Media Forensics – Network Forensics – Machine / Mobile Forensics – Cyber Crime Investigation – Fraud Investigation • Corporate Training – Security Awareness Training – Cyber Forensics Training – BCP/DR Workshop – Preparatory courses for CISSP & CISA Certification How We Help Our Clients
  • 6. Indian Computer Emergency Response Team (CERT-In) Controller of Certifying Authorities (CCA) Indian Air Force National Technical Research Organization National Informatics Centre Indian Army A few of the organizations we are empanelled with:
  • 7. Vulnerability Assessment & Penetration testing  Vulnerability Assessment  Identify and understand the existing vulnerabilities  Scan the targeted network(s) and host(s), based on the defined scan policy  Collect the scan results and analyze for security loopholes, configuration errors, default installation settings, overlooked setups, password quality, firmware/software revisions, patch fixes, security policy violations etc.  Penetration Testing Testing and validation of detected vulnerabilities Provides independent analysis of your network to locate all exploitable vulnerabilities Advise on the most effective solutions to secure network
  • 8.  Configuration Audit  Study and analyze the Servers, Network Devices and Security Device’s roles and configuration through configuration audit.  Understand and evaluate the loopholes in the configuration, if any.  Facilitate in hardening of information systems.  Network Performance Testing  Evaluate the Bottlenecks, Protocol Utilisation, Broadcasting and Network Error in the network, identify their remedial solutions and recommend implementation of the same to mitigate identified errors.  Recommendations for Error free Network design.  Top Ten Interfaces showing more bandwidth and protocol utilisation.
  • 9.  GAP Analysis Our processes and methodology are benchmarked against industry best practices and established standards. In this phase, a thorough security assessment will be carried out with two goals in mind: Identifying the present “As – Is” status vis –a – vis the desired benchmark, and their impact on Information Security. The ambit of this includes:-  Administrative Security  Physical Security  Logical Security  Processing Security  Business Continuity Management (BCM)  Identify gaps in the existing controls
  • 10. Web Application Security Testing The Standard used for Web Application Security Testing is OWASP (Open Web Application Security Project). The OWASP 2010 represents a broad consensus about what are the most critical application security flaws. OWASP 2010 1. Injection Flaws 2. Cross Site Scripting (XSS) 3. Broken Authentication and Session Management 4. Insecure Direct Object Reference 5. Cross Site Request Forgery 6. Security Misconfiguration 7. Insecure Cryptographic Storage 8. Failure to Restrict URL Access 9. Insufficient Transport layer protection 10. Invalidate Redirect and Forwards
  • 11. Methodology  Understand the scope and purpose of the Website. Review the Web Application structure and specifications so as to understand the basic design of the Website.  For the Web Application under review, identify, document and understand the "high value objects" that a malicious attacker would seek to steal or exploit (e.g., user IDs, customer data, passwords).  Devise attacks or methods using proprietary AKS IT© techniques to obtain the desired data objects.  Once Web Application security is handled, check if a valid/invalid user can use the Web Application in a manner so as to subvert the underlying security model of the system.  Various attacks are devised on each component and then relevant vulnerabilities are demonstrated.
  • 12.  Core Impact – The most comprehensive penetration testing solution for assessing and testing critical security vulnerabilities throughout the organization.  Immunity Canvas – Canvas is a trusted security assessment tool that allows penetration testing and hostile attack simulations to be conducted by security professionals. Canvas offers a level of exploit quality, availability, and real-world use unparalleled by any competitors.  Metasploit – It is a solution for security professionals in enterprise, government & consulting firms who need to reduce costs by making network security testing more effective & efficient. Metasploit Pro improves the efficiency of the penetration testers by providing unrestricted remote network access and enabling teams to efficiently collaborate Our Range of Products
  • 13.  Nexpose - It is a vulnerability assessment, policy compliance and remediation management solution designed for organizations with large networks which require the highest levels of scalability, performance, customizability and deployment flexibility.  Nessus - It is the industry’s most widely-deployed vulnerability and configuration assessment product. Nessus features are high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, patch management integration, and vulnerability analysis of your security posture.  Acunetix - Acunetix web vulnerability scanner is a tool designed to discover security holes in your web applications that an attacker would likely abuse to gain illicit access to your systems and data. The application can be used to perform scanning for web and application vulnerabilities and to perform penetration testing against the identified issues.
  • 14. Mobile Forensics  Oxygen Forensic Suite – It is mobile forensic software that goes beyond standard logical analysis of cell phones, smartphones and tablets. Use of advanced proprietary protocols and phone APIs makes it possible to pull much more data than can be extracted by forensic tools utilizing standard logical protocols, especially for smartphones.  Susteen Secure View 3 - It provides affluent data to the mobile phone forensic investigator or instructor with the foundation for law enforcement, military/civil, consultant, corporate, and education institutions to perform advanced, proficient mobile device investigations in corporate IT, security, or criminal situations.  Paraben’s Device Seizure - Device Seizure is designed to allow investigators to acquire the data contained on cell/mobile phones, smartphones, tablets, GPS, iPhones/iPads/iPod Touch/iPods, and PDA devices without affecting data integrity. With mobile phones, it is designed to retrieve data such as phone numbers, sms, pictures, call history, and full data dumps. Forensic Products
  • 15. Computer Forensic  TD2 - This second-generation product was engineered for standalone forensic acquisitions in both field and lab settings, natively imaging both SATA and IDE/PATA hard drives at drive limited speeds up to 9GB/min, in a 1:1 or a 1:2 (aka, “twinning”) configuration. One can image SAS, and USB storage devices with TD2 by using the Tableau Protocol Modules.  Encase - It is a investigation solution, is for forensic practitioners who need to conduct efficient, forensically sound data collection and investigations using a repeatable and defensible process  P2 Commander - It is a computer forensic solution for examiners who need affordable, reliable digital analysis for computer investigations. Built to process large volumes of data in a fast and efficient manner, P2 Commander is known for its advanced email and chat log analysis. Continue…
  • 16.  Network E-mail Examiner – Paraben’s Network E-mail Examiner is an advanced network email archive analysis and conversion tool. Examine Microsoft Exchange (EDB), Lotus Notes (NSF), and GroupWise e-mail stores without the need for a long and painstaking restore process. Analyze, search, and report on pertinent data within the email database and export to many mail formats including PST.  Chat & Email Examiner – Paraben’s Chat Examiner is another specialized component of Paraben's P2 Forensic Collection that adds one more powerful program to your toolkit. Whether your case has ICQ, Yahoo, MSN, Trillian, Skype, Hello, or Miranda you'll be able to handle whatever comes  Passware Kit Forensic - This advanced password recovery suite allows you to recover more passwords, from more programs, in a shorter amount of time using many different methods including the advanced XieveTM attack method, distributed computing, and live memory acquisition.
  • 17.  AKS IT provides the customized forensic workstation as per the requirements of our customer. It can be of 2 types -  One can set up forensic workstation in their lab itself .  Another one is a forensic laptop which we can carry to the crime spot for acquisition and analysis of data. It comes in a rugged carrying case. Forensic Workstation
  • 18.  ALSTOM,  Andhra Pradesh Technology Services Ltd (APTS),  Bharti Airtel,  Central Board of Secondary Education (CBSE),  Ericsson,  General Insurance Corporation,  HCL,  Indian Railways,  National Informatics Centre (NIC),  NTPC,  Ranbaxy,  TCS,  WIPRO.. and many more Some of our Clients
  • 19. Thank You AKS IT SERVICES (P) Ltd. E-52, Sector-3, Noida, 201301