banner

The New Paradigm

Have you invested a fortune in training, compliances, advanced detection technologies and yet your infrastructure is still being compromised?

Let’s get to the fundamentals of cyber protections. Let’s re-think it from its core. Let’s have a new Assurance Framework.

People

It is not just about training your staff with a blanket awareness programme. Every organization is different in its nature of business, in breadth and in depth. It is ineffective to have one cyber training framework for the entire organization.

We need business centric awareness at the board and senior management levels; operational centric training for the mid-level and technical oriented training for the specialized groups.

Process

Many organizations continue to focus on achieving high compliances rather than addressing their operational vulnerability. It is important to know that scoring high compliances does not imply high security posture.

Deep Vulnerability Assessment and Penetration Testing (Deep VAPT) is key. It is important that Deep VAPT be performed regularly by world-class professionals from countries at war. Such groups typically come with strong experiences in countering state funded threats and attacks.

Platform

Unlike the past, advanced threats today are highly sophisticated and stealthful. Alongside that, mainstream protection technologies have also evolved from primarily signature based filtering to various forms of advanced, non-signature centric detection. Unfortunately, the fundamental is still about detection. With millions of new advanced threats being developed and proliferated daily in the internet, most of such threats are not detectable in the first place.

Non-detection centric strategies become critical. Such strategies should be deployed to augment the chosen detection technologies to complete the protection framework.

SASA SOFTWARE

A 9-layer, ultra-deep-scanning anti-malware & sanitization (CDR) powerhouse augmentable by uni-directional data diodes with Wintel based proxies

ADVENICA

A 1G high-end cross-domain and data diode solution with Linux based proxies for CII protection with patented segregation technologies

ICS2

A SCADA monitoring platform that specializes in real-time behavioural analytics of OPC data passively extracted from control systems

DarkTrace

An Enterprise Immune System that catches Ransomware & other Emerging Threats early with the World's Leading Machine Learning & AI Platform for Cyber Security

Ceedo

An application containerization
technology to intelligently isolate
applications (not just browsers) from
its host environment.

IT Care Center

End-to-end management solution for your IT operations, on a single platform. A robust platform, yet an affordable one, with the optimal Total Cost of Ownership (TCO)

Granite

A cost-effective digital GRC management and training platform with importable framework templates (e.g. ISO27001, PCI DSS, GDPR etc) to ease the pain of risk and compliance management.

SOPHOS

A user-friendly, simple-to-deploy
enterprise solution that encompasses
endpoint, network, email, mobile and
encryption security with
Unified Threat Management (UTM).

Bluechip

A platform-agnostic
hardware-isolated computation
and storage system with
HW root of trust

Good Hackers Alliance

An alliance of hand-picked hacking groups especially from countries at digital wars with world-class track records in Deep Cyber Audit & VAPT

Virtus Assure

An independent assurance services consultancy focused on providing corporate governance, risk management, and internal audit for exchange listed companies