List vendor IT Security di Indonesia

  • Xynexis xynexis.com
  • Ethic Ninja ethic.ninja
  • Horangi horangi.com
  • Xecure IT xecureit.com
  • ITSec Asia itsec.asia
  • Spentera spentera.id
  • Mitra Integrasi Informatika mii.co.id
  • PT Global Innovation

Horangi

Products: Scanner, Hunter, Storyfier

Services: Security Assesment, Penetration Testing, Incident Response, Training

Xynexis

Information Security: Compliance & Certification, IT Security Risk Assessments, Security Assessments, Penetration Testing, Application

Security, Incident Response & Digital Forensics, Business Continuity / Disaster Recovery Reviews, PCI DSS QSA

IT Risk and Assurance: IT Risk Assessment, IT Audit, IT Processes, Application Reviews

IT Strategy Management: ITIL Service Management, Project Management & System Development Life Cycle, IT Governance

FireEye

Products: FireEye Helix, Network Security, Endpoint Security, Email Security, Threat Analytics Platform Services: FireEye as a Service, Threat Intelligence, Mandiant Consulting

Mandiant Consulting:

Am I at risk?

Red Team Operations Test how well your people, processes and technology protect your critical assets.

Penetration Testing Identify and mitigate security vulnerabilities to close off avenues of attack.

Industrial Control Systems Healthcheck Reduce security vulnerabilities in SCADA and ICS environments.

Mergers & Acquisitions Risk Assessment Conduct due diligence on cyber security for merger and acquisition targets.

Cyber Insurance Risk Assessment Obtain a quick, high-level analysis of your organization’s risk level based on the C.O.P.E framework.

Am I prepared?

Deployment and Integration Services Ensure your FireEye technology is properly implemented and integrated.

Incident Response Retainer Reduce your cyber incident response time and minimize incident impact.

Response Readiness Assessment Evaluate and improve your ability to detect, respond to, and contain advanced attacks.

Security Program Assessment Get informed, expert recommendations to improve your security program.

Tabletop Exercise Evaluate your incident response plan against scripted scenarios.

Am I compromised?

Compromise Assessment Identify current or past attacker activity in your environment.

I am breached!

Incident Response Services Contact Mandiant consultants at the first sign of a breach to help investigate and mitigate its effects.

Prepare for future events

Education Services Train your cyber security team to secure and defend the enterprise.

Cyber Defense Center Development Build and grow a security program to protect against advanced threats.

Cyber Threat Intelligence Services Design and build cyber threat intelligence (CTI) processes and solutions within your security operations.

ThreatSpace Practice responding to real-world threats — without real-world consequences.

results matching ""

    No results matching ""