Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by ©2018|Solution Powered by Velox| Ver. 1.0.34.

Similar presentations


Presentation on theme: "Presented by ©2018|Solution Powered by Velox| Ver. 1.0.34."— Presentation transcript:

1 Presented by ©2018|Solution Powered by Velox| Ver

2 Index About Us RBI Mandate SecureIT Modules SecureIT Alerts Engine
Application Presentation Key Features Clients

3 About Us Velox is next generation cyber security company enterprise Cyber Security and IT Infrastructure monitoring solutions. Awarded as Top 20 Most Promising BI Solution Provider 2017 by World Class CIO Review Magazine. Velox is named as the Brand of The Year 2018 by Business Connect Magazine Velox is an ISO 9001:2015 certified organization. Velox has suit of Cyber Security products offering solutions to many industries such as banking, manufacturing and industrial automation systems.

4 RBI has issued a circular on 19th Oct. 2018
RBI Mandate RBI has issued a circular on 19th Oct. 2018 RBI has mandated 2 stages for compliance 1. Preparation of Cyber Security Framework Target date by RBI 31st March 2019 2. Implementation of Cyber Security Controls System & Mechanism

5 Modules in SecureIT RBI Mandate
Inventory Management of Business IT Assets Preventing access of unauthorised software Environmental Controls Network Management and Security Secure Configuration Anti-virus and Patch Management User Access Control / Management Secure mail and messaging systems Removable Media User/Employee/Management Awareness Backup and Restoration

6 Inventory Management of Business IT Assets
Details of the IT Asset (Hardware/Software/Network Devices, Key Personnel, Services etc.) Details of systems where customer data are stored Associated business applications, if any Criticality of the IT asset (For example, High/Medium/Low)

7

8

9

10 Preventing Access of Unauthorised Software
Maintaining an up-to-date and centralized inventory of of authorized approved applications Installation of software/applications on end-user PCs, laptops etc. Application White lising, Blacklisting and Sandboxing mechanism Disabling scripts like JavaScript, Java and ActiveX controls when they are not in use. Internet usage, if any, is restricted to identified standalone terminal

11

12

13 Environmental Controls
Appropriate controls for securing physical location of critical assets Protection from natural and man-made threats Mechanisms for monitoring of breaches of environmental controls relating to temperature, water, smoke, access alarms, service availability alerts (power supply, telecommunication, servers), access logs, etc.

14

15

16 Network Management and Security
Appropriate configuration of Network Devices Periodically assessed to ensure that such configurations are securely maintained. Appropriate controls to secure wireless local area networks, Wireless access points, wireless client access systems. Network separation controls for UCB transactions

17

18

19

20

21 Secure Configuration The firewall configurations are set to the highest security level and evaluation of critical device Systems such as Network, application, database and servers are used dedicatedly for the purpose for which they have been set up.

22

23

24

25

26

27 Anti virus and Patch Management
Systems and processes to identify, track, manage and monitor the status of patches to servers, operating system and application software running at the systems used by the UCB officials. Implement and update antivirus protection for all servers and applicable end points preferably through a centralized system.

28

29

30 Secure Mail & Messaging Systems
Security to prevent Mails & message system spoofing, identical mail domains, protection of attachments, malicious links etc. Document and implement server specific controls.

31 Removable Media USB and removable devices Protection
Secure the usage of removable media on workstations/PCs/Laptops, etc. Secure deletion of data on such media after use Scanned for malware/anti-virus prior to providing read/write access

32

33 User/Employee/Management Awareness
Awareness/training for staff on basic information security controls (Do’s and Don’ts), incident reporting, etc. Board members may be kept updated on basic tenets/principles of IT risk/cyber security risk at least once a year. The end-users should be made aware to never

34

35

36 Backup and Restoration
Periodic back up of the important data and store the same data ‘offline’ Transferring important files to a storage device that can be detached from a computer/system after copying all the files.

37

38 Technical Flow of Online Backup

39 Secured Monitoring Solution
SecureIT provides IT administrator a complete 360 degree view of entire IT Infrastructure & Network thereby increasing the Cyber Security and manageability of an Organization. Monitoring IT Infrastructure, Making Cyber Space Secured…

40 Salient Features Velox rated as an only Indian Company in IT Industry for IT Infrastructure Monitoring & Cyber Security solutions. The solution requires less Hardware thereby saving the BOM. Platform Independent - Works on Windows, Unix & Linux and DBs like Oracle ,MS SQL Server & MY SQL. Monitoring Cyber Security platforms covers Data Centres, NOC & SOC. Highly Parameterised thus requires less customisation & support. Consumes very less bandwidth. One single dashboard for all the modules. Remove worries of IT Infrastructure security & monitoring by applying proactive centralised controls. Cost effective perpetual licensing.

41 Infrastructure & Government
Our Clients Banking Infrastructure & Government Business

42 Velox Solutions Pvt Ltd
Thank You Velox Solutions Pvt Ltd 906 & 908, 9th floor, Vashi Infotech Park, Plot No.16, Sector No.30A, Vashi, Navi Mumbai Phone No. : / ID : Website : Mumbai | Pune | Bangalore | Dubai | USA


Download ppt "Presented by ©2018|Solution Powered by Velox| Ver. 1.0.34."

Similar presentations


Ads by Google