We provide a wide spectrum of professional IT Security services including the following:
Planning stage
- IT Security infrastructure design and planning
- Reviews on the network infrastructure from network, system and operation viewpoints according to the organization business requirements
- recommend the best solution based on the latest technology available , vulnerabilities trend and business requirements.
- Cloud Security and Consultancy Services
- Cloud Adoption Consultancy Studies (e.g. Cloud Readiness Studies, Design, Service Model Analysis and Planning)
- Secure Cloud Design Advisory Services
- Cloud Risk Audit Program Development
- Mobile Strategy Studies
- Mobile Computing Strategy & Policy Development
- Mobile Infrastructure Design & Planning Service
- Mobile Device Management Studies (e.g. BYOD Readiness Studies, Design and Planning)
- IT Security professionals training
- Our trainings provide up-to-date IT Security knowledge to end-user and technical staff.
Review stage
- IT Security Assessment
- Perform periodic review and assessment for clients
- Provide pre-launch IT security risk assessment services before new systems implementation
- Assist clients in identifying current vulnerabilities, threats and prioritizes remediation activities to mitigate technical risks according to business impacts and requirements
- IT Security Audit and IT Audit Support Services
- Provide periodic effectiveness and efficiency review of IT systems through IT Audit
- Perform General IT Audit and Application IT Audit to support financial audit and due diligence review
- Conduct IT security audit review of IT systems through industry best practices (e.g. ISO 27001, COBIT, PCI-DSS, HKSAR Government S17, G3)
- Cloud Security Assessment Services
- Perform Cloud Risk Security Assessment for Cloud User or Cloud Service Provider according to Cloud Security Alliance Cloud Control Matrix or other tailor-made Cloud Audit program
- Launch Cloud Application Vulnerability using system or web application testing depending the Cloud Service Model
- Compliance Audit Review
- Perform IT Compliance Audit to IT systems (e.g. banking application, stock trading system)
- Conduct Compliance Review on critical IT systems (e.g. HKMA Cyber-Resilience Assessment Framework, SFC Code of Conduct review, etc)
- Penetration Test and Simulated Attack
- Conduct system, network and application penetration test using Black/Gray Box hacking method
- Launch Non-intrusive penetration methods to application based on industry best practices (e.g. OSSTMM, OWASP, etc)
- Perform Simulated Attack / Red Teaming
- Privacy Impact Assessment Review
- Conduct Privacy Impact Assessment Review according to the Personal Data Privacy Ordinance review
- Perform Privacy Compliance Review based on corporate privacy policy and sensitive data requirement
- Mobile Application Review
- Conduct Secure Design Review of Mobile Application
- Perform Non-intrusive pre-launch mobile penetration to mobile application based on industry best practices (e.g. OSSTMM, OWASP, etc)
- Conduct Secure Code Review of mobile application
Implement stage
- System Hardening
- Review and develop System or Application Hardening Guide for client applications based on industry best practices (e.g. SANS 20 CSC, CIS Critical Security Controls, CIS Security Benchmarks)
- Evaluate and revise security hardening requirement for client to fit into the patch and hardening configuration guide
- Develop security hardening scripts for client according to the hardening configuration guide
- Policy revision
- Review and update IT Security policies and procedures according to industry best practices
- Develop security checklists and user level security policies practices guide for client
- Assist clients in
- reviewing, revising and refining existing IT security policies
- procedures against business requirement, international best
- Security solution implementation, integration and customization services
- Assist clients to implement and configure specific security solutions, such as
- Smart Card Infrastructure design and implementation
- IT Security Incident Management solution implementation
- Authentication and Identity Management solution implementation
- Single sign-on solution implementation
- eWalker product suites(installation and configuration)
Monitor
- Security Incident handling services
- Develop Security Incident Handling and Response Procedures for client
- Assist client to perform Security Incident Handling and Response after security attack
- Provide Post-Security attack security incident response containment and incident management
- Digital Forensics Investigation services
- Perform Post-incident Digital Forensics Investigation Services to determine and identify the cause of incident, time and propose the rectification recommendations
- Contain and Acquire Digital Evidence for forensics investigation or court litigation purpose based on the FORZA framework
- Provide Forensics and Investigation Support Services for Court Litigation cases
- Security Monitoring Advisory Services
- Lead the SIEM readiness gap anaysis
- Advise client on SIEM and detection, monitoring and threat intelligence infrastructure establishment
- Perform SIEM infrastructure testing through eWalker Tai-Chi methodology
- Review and enhance your SIEM rules based on latest Cyber Threat Intelligence
Qualified Security Assessor (QSA)
- Identify and address potential security vulnerabilities.
- Conduct comprehensive security assessments aligned with PCI DSS requirements.
- Implement effective remediation strategies.
- Perform cybersecurity gap analyses focused on payment card data.
- Maintain ongoing compliance to avoid penalties or legal consequences.