SAAS based applications-security
- ● Application Pentest
- ● Security code review
- ● Product Deployment and IT security
- ● 3rd party audits
- ● Product development security assessments
- ● Vulnerability monitoring and updates
Data aggregation and analytics security
- ● Data classification and separation, secure storage
- ● Authorization controls and implementation of required controls
- ● Compliance certification
ISMS / ISO27001:2013
- ● Processes and security controls for IT and Information security
- ● Implementation
- ● Incident response
- ● Certification audit
COMPLIANCE TO SPECIFIC CUSTOMER REQUIREMENTS AND 3RD PARTY AUDITS
● Skill augmentation and workshops SAAS based applications - Compliance