Implementation Services
Onsite Consulting
Monitoring Services
Training
 



 
 

Configuration and Risk Assessment Service

The SYBOR Configuration and Risk Assessment Service extends visibility beyond the network perimeter to the application layer to help you achieve broader compliance and more effective identification and mitigation of security threats using NetIQ products. For example, NetIQ Secure Configuration Manager can audit and report on inappropriate permissions in Active Directory, which can result in too little or too much power over directory objects. Similarly, unused user accounts or too many administrator level accounts are security gaps, as are software patches not applied. This service helps you protect your Windows systems from exploits and lowers your IT risk level by identifying those security issues needing immediate attention. Our comprehensive, monitoring service collects, analyzes and performs policy configuration assessments and produces scored risk results for all critical systems.

This service  provides your enterprise with real time, 24x7x365 monitoring and response across your critical IT assets. SYBOR trained security experts will perform all activities necessary to keep the IT infrastructure secure and compliant including:


 
Site assessments


 Monitoring policy design, monitoring tool installation and configuration


 
Security & Compliance monitoring and incident management; Comprehensive reporting and response




Benefits

Comprehensive and scalable service
Our managed service monitors operating systems, databases, and applications across a range of platforms (windows,unix,iseries and oracle – Sybase and netware ).
Detailed reporting with audit workflow Our reports present information in a consistent format for detailed security analysis and vulnerability assessment for audit and compliance.
Robust multi-policy compliance
Our best practices templates enable complex environments to be assessed and reported for compliance against various government regulations as well as your internal IT policies.
Reduce costs of security and vulnerability assessment
Our highly trained experts help set up and configure log management, and utilize sophisticated analysis tools and structured processes to determine threat and exposure levels.
 


Service Features
Comprehensive deployment services SYBOR experts assist with critical vulnerability and threat identification and recommend policy templates to be used for security and vulnerability assessment that is just right for your environment.
Support for “non-standard” custom security checks
With our flexible information management architecture and proven processes, we can quickly develop support for new or custom data sources.
Report access for Audits
Assessment data is archived for secure, review, sorting, and reporting for internal audit purposes or to assist with reporting related to compliance with Payment Card Industry (PCI), Sarbanes-Oxley, and other requirements.
 Periodic on-going assessments
Best-of-breed technologies and structured processes used to correlate and analyze data to detect security threats and exposures. Customers receive reports with prioritized response.
Integration with other managed device data
When combined with data from firewalls, IDS/IPS sensors, and vulnerability scans, SYBOR can more accurately and efficiently identify those security events that represent real threats.
 


Remote Monitoring
Consulting
Implementation
Training
Vulnerability Assessment
Penetration Test
 





SYBOR has strategic associations with some of global leaders in ESM tools.

Clients includes :
Coke
ING Vysya
Citi Bank
Seimens