Presented by ©2018|Solution Powered by Velox| Ver. 1.0.34.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Which server is right for you? Get in Contact with us
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Security Controls – What Works
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Delta Communications pvt. Ltd.... A complete telecom salutation....
Network security policy: best practices
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Clarity Educational Community Get the Results You Need When You Need Them Transitioning to CA PPM On Demand Presented by: Joshua.
systemhound © Raxco Software Belgium systemhound PC inventory software.
Tim Vander Kooi Systems
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CSI-E Computer Security Investigator – Enterprise.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Windows Small Business Server 2003 R2 Powering Small Businesses.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Security tools for records managers Frank Rankin.
Manage your projects efficiently and on a high level PROJECT MANAGEMENT SYSTEM Enovatio Projects Efficient project management Creating project plans Increasing.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Payment Card Industry (PCI) Rules and Standards
Review of IT General Controls
Phase 4: Manage Deployment
Securing Network Servers
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Critical Security Controls
Maintaining Windows Server 2008 File Services
Backdoor Attacks.
I S P S loss Prevention.
Computer Virus and Antivirus
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Business Risks of Insecure Networks
Infrastructure, Data Center & Managed Services
Avira Antivirus Support via a Dedicated Helpline Number The antivirus software of Avira is recommended as a reliable as well as a proficient software security.
Call AVG Antivirus Support | Fix Your PC
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Determined Human Adversaries: Mitigations
Unit 27: Network Operating Systems
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Increase and Improve your PC management with Windows Intune
IS4680 Security Auditing for Compliance
ScanPlus ATM Terminal Security by
Determined Human Adversaries: Mitigations
Designing IIS Security (IIS – Internet Information Service)
G061 - Network Security.
6. Application Software Security
A Warm welcome to you all from
IT Management, Simplified
Presentation transcript:

Presented by ©2018|Solution Powered by Velox| Ver. 1.0.34

Index About Us RBI Mandate SecureIT Modules SecureIT Alerts Engine Application Presentation Key Features Clients

About Us Velox is next generation cyber security company enterprise Cyber Security and IT Infrastructure monitoring solutions. Awarded as Top 20 Most Promising BI Solution Provider 2017 by World Class CIO Review Magazine. Velox is named as the Brand of The Year 2018 by Business Connect Magazine Velox is an ISO 9001:2015 certified organization. Velox has suit of Cyber Security products offering solutions to many industries such as banking, manufacturing and industrial automation systems.

RBI has issued a circular on 19th Oct. 2018 RBI Mandate RBI has issued a circular on 19th Oct. 2018 RBI has mandated 2 stages for compliance 1. Preparation of Cyber Security Framework Target date by RBI 31st March 2019 2. Implementation of Cyber Security Controls System & Mechanism

Modules in SecureIT RBI Mandate Inventory Management of Business IT Assets Preventing access of unauthorised software Environmental Controls Network Management and Security Secure Configuration Anti-virus and Patch Management User Access Control / Management Secure mail and messaging systems Removable Media User/Employee/Management Awareness Backup and Restoration

Inventory Management of Business IT Assets Details of the IT Asset (Hardware/Software/Network Devices, Key Personnel, Services etc.) Details of systems where customer data are stored Associated business applications, if any Criticality of the IT asset (For example, High/Medium/Low)

Preventing Access of Unauthorised Software Maintaining an up-to-date and centralized inventory of of authorized approved applications Installation of software/applications on end-user PCs, laptops etc. Application White lising, Blacklisting and Sandboxing mechanism Disabling scripts like JavaScript, Java and ActiveX controls when they are not in use. Internet usage, if any, is restricted to identified standalone terminal

Environmental Controls Appropriate controls for securing physical location of critical assets Protection from natural and man-made threats Mechanisms for monitoring of breaches of environmental controls relating to temperature, water, smoke, access alarms, service availability alerts (power supply, telecommunication, servers), access logs, etc.

Network Management and Security Appropriate configuration of Network Devices Periodically assessed to ensure that such configurations are securely maintained. Appropriate controls to secure wireless local area networks, Wireless access points, wireless client access systems. Network separation controls for UCB transactions

Secure Configuration The firewall configurations are set to the highest security level and evaluation of critical device Systems such as Network, application, database and servers are used dedicatedly for the purpose for which they have been set up.

Anti virus and Patch Management Systems and processes to identify, track, manage and monitor the status of patches to servers, operating system and application software running at the systems used by the UCB officials. Implement and update antivirus protection for all servers and applicable end points preferably through a centralized system.

Secure Mail & Messaging Systems Security to prevent Mails & message system Email spoofing, identical mail domains, protection of attachments, malicious links etc. Document and implement email server specific controls.

Removable Media USB and removable devices Protection Secure the usage of removable media on workstations/PCs/Laptops, etc. Secure deletion of data on such media after use Scanned for malware/anti-virus prior to providing read/write access

User/Employee/Management Awareness Awareness/training for staff on basic information security controls (Do’s and Don’ts), incident reporting, etc. Board members may be kept updated on basic tenets/principles of IT risk/cyber security risk at least once a year. The end-users should be made aware to never

Backup and Restoration Periodic back up of the important data and store the same data ‘offline’ Transferring important files to a storage device that can be detached from a computer/system after copying all the files.

Technical Flow of Online Backup

Secured Monitoring Solution SecureIT provides IT administrator a complete 360 degree view of entire IT Infrastructure & Network thereby increasing the Cyber Security and manageability of an Organization. Monitoring IT Infrastructure, Making Cyber Space Secured…

Salient Features Velox rated as an only Indian Company in IT Industry for IT Infrastructure Monitoring & Cyber Security solutions. The solution requires less Hardware thereby saving the BOM. Platform Independent - Works on Windows, Unix & Linux and DBs like Oracle ,MS SQL Server & MY SQL. Monitoring Cyber Security platforms covers Data Centres, NOC & SOC. Highly Parameterised thus requires less customisation & support. Consumes very less bandwidth. One single dashboard for all the modules. Remove worries of IT Infrastructure security & monitoring by applying proactive centralised controls. Cost effective perpetual licensing.

Infrastructure & Government Our Clients Banking Infrastructure & Government Business

Velox Solutions Pvt Ltd Thank You Velox Solutions Pvt Ltd 906 & 908, 9th floor, Vashi Infotech Park, Plot No.16, Sector No.30A, Vashi, Navi Mumbai-400705. Phone No. : +91-22-62233070 / +91-22-66738684 Email ID : info@velox.co.in sales@velox.co.in Website : www.velox.co.in Mumbai | Pune | Bangalore | Dubai | USA