Projects

Projects

Prometis Cyber Security offers high value to its clients through its cyber security services. It is imperative to choose an experienced Cyber Security Company for those industries which thrive on the basis of the security systems. These industries include Financial institutions,  Healthcare companies, Government agencies, Technology companies, Small businesses, Educational institutions, Manufacture & Automobiles.

Prometis Cyber Security audits the companies and provides solutions that transform them into a secure and vigilant system. Prometis’ Resilient cyber risk approach.

Possess in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; acts as an incident “hunter,” not waiting for escalated incidents; closely involved in developing, tuning and implementing threat detection analytics.

Advanced training on anomaly detection; tool-specific training for data aggregation and analysis and threat intelligence. Intrusion Detection In-Depth Hacker Tools, Techniques, Exploits and Incident Handling; Intense Hands-on Pen Testing Skill Development; Analysis Tools and Techniques.

Case Study: Symantec DLP Solution.

Technology- Symantec DLP Solution.

Solution:

Symantec Data Loss Prevention for Endpoint addresses the risks associated with the storage and use of confidential data on laptops and desktops across the organization.

Case Study:

Case Study of A leading Financial Company providing Ratings, Research and Risk & Policy Advisory services. The Info-sec team was happy to achieve total point to point security on the Desktop – Laptop level.  A Workflow was created to enable access and monitoring of all users. Some HR process was also linked with Symantec DLP solution. This Company is now moving towards Network Monitor and Network prevent (WEB and SMTP) module.

Case Study - Symantec End Point Protection.

Technology: Symantec Drive Encryption (PGP Whole Disk Encryption).

Solution:

Lock down the entire contents of your system, or an external or USB flash drive you specify.  Use part of your hard drive space as an encrypted virtual disk volume with its own drive letter. Create secure, encrypted Zip archives. Put files and folders into a single encrypted, compressed package that can be opened on Windows systems that do not have PGP Desktop Email or PGP Desktop installed. Completely destroy files and folders so that even file recovery software cannot recover them.

Case Study:

Major vertical – a Publisher company was not able to control it’s network. Once the contract was given to VRL the following was deployed. DHCP Enforcement to the unmanaged / rogue system from the network. Patch  GAP was identified based on the risk pattern and deployed using SNAC policy. Risk was drastically reduced from Total Virus Count Per Month 109227 to Total Virus Count Per Month = 1101.

Case Study - Symantec End Point Protection.

Technology:  Symantec Web Gateway.

Solution:

Detect infected systems, Protect malware web site  access, Detect and protect BOTNET, Detect potential attack i.e. network scanning, spyware attack and spamming, URL Filtering, Protect call home traffic.

Case Study:

A manufacturing company was using Websense for URL filtering and IWSS (Trend Micro) for malware protection with ISA proxy which was giving latency in internet access. Users were always complaining of slow Internet Access. After deploying Symantec Web Gateway Inline with Isa proxy the performance improved drastically.

Case Study - Network Assessment

Technology: Network Assessment

A leading manufacturing company has requested the network assessment to identify the cyber threat vulnerability to get comprehensive visibility on the threats targeting their IT environment.

Challenge:

Despite significant investment in IT infrastructure client organisation took time to recover network devices when disaster occurred due to lack of understanding of HA/DR process.Client wanted to check the effectiveness of network infrastructure controls in place. High security breach risk as the critical business-related data stored in personal computer.

Solution:

A design plan to isolate the enterprise to be developed. Better handling of HA/DR process by doing frequent failover testing so that during the actual disaster it will take minimum time to restore services. CAPEX revision to onboard right resources.

 

Benefits:

Clients  IT infrastructure exposed key vulnerabilities in there IT assets and policies. With the recommendations the client has started the journey to make changes in network design and have right resources to support the environment