SlideShare a Scribd company logo
1 of 5
Download to read offline
Gloriolesoft Consulting 
Information Security
                       Security and Privacy

Identity and Access    Enterprise           Application           Security Risk
Management,            Security Strategy    Security Strategy ,   Assessment,
Identity Lifecycle ,   and Roadmap,         Secure Policy,        Security Audit,
SOA Security           Security             Guidelines and        Regularity and
 and                   Architecture         Procedure             Compliance
Cloud Security         Blueprint , Design
                       and Governance
Engagement Lifecycle 
Assessment,                                              Secure                       Secure Package                   Manage
                                  Planning and
Strategy and                                             Architecture                 Implementation                   Security and
                                  Budgeting
Roadmap                                                  and Design                   and Deployment                   Educate
                                                                                                                  1.    Infrastructure
                                                                                      1.   Platform and
1.   Sit with CXOs and                                   1.  Architectural                                              readiness
                             1.   Define Governance                                        environment
     detailing business                                      blueprint                                            2.    Deployment at
                                  Model                                                    readiness
     vision ,strategy,                                   2. Architectural                                               Preprod , Preview and
                             2.   High level Plan,                                    2.   SW and Hardware
     direction and                                           Governance and                                             Production
                                  estimation and                                           licensing an d
     roadmap                                                 Design Authority                                     3.    UAT
                                  budgeting                                                procurement
2.   Develop strategic                                   3. Best practice and                                     4.    Security Testing
                             3.   Define delivery gate                                3.   Implementation
     Goal, benefit and                                       guidelines ,                                         5.    Operational Readiness
                             4.   Vendor selection                                         Identity life Cycle
     ROI                                                     technology feasibility                               6.    Go-Live
                                  and strategic                                       4.   Develop custom
3.   Build trust and                                         and vendor selection                                 7.    ITSM lifecycle
                                  alignment                                                code
     assess customer’s                                       based on best fit                                    8.    En User Training
                             5.   Detailed program                                    5.   Integration
     security posture                                        scorecard                                            9.    Security Awareness
                                  plan ,resource                                      6.   Static , Dynamic
4.   Evaluate existing                                   4. Develop policies,                                           Training
                                  ,ownership and                                           and interactive
     security policies,           milestone .                standard and                  security testing
     processes and           6.   Risk and Mitigation        process                  7.   Secure Code review
     standards, and               plan                   5. Architectural                  ,penetration testing
     security architecture                                   Decision                 8.   EIT, SIT
5.   Establish security                                  6. SAD [ Software            9.   Audit, reporting ,
     baseline and define                                     Architecture and              Management
     strategic security                                      Design]                       dashboard
     roadmap                                             7. HLSD [ High Level
6.   Identify the Risk                                       Solution Design ]
     Associated with                                     8. LLSD [Low Level
     Enterprise, i.e. both                                   solution Design]
     business and                                        9. Test Plan and Test
     technical risk                                          Strategy.
                                                         10. Application Security
                                                             Guidelines and
                                                             Strategy
                                                         11. App and Web
                                                             Security checklist
Service Offering ‐ Artifacts
                                                                                         Assurance,                             Managed
Identity , Account Lifecycle and                              Application
                                                                                         Risk, Governance,                      Security and
Cloud Security                                                Security
                                                                                         Regularity Compliance                  Infra Security
                                                         1.  Application Security
  1.    Develop Identity Life cycle strategy and             Roadmap, Strategy and                                         1.   Vulnerability
                                                                                          1.   Management Security
        Roadmap                                              Guidelines                                                         Management &
                                                                                               Dashboard
  2.    IAM Risk assessment , Gap analysis and           2. Secure process                                                      Incident Response
                                                                                          2.   Information Security
        Federation readiness.                                development through out                                       2.   Emergency Response
                                                                                               Assessment and Audits
  3.    Product Evolution, Licensing strategy and            SDLC                                                               and Forensic
                                                                                          3.   Outsourcing and Third-
        scorecard based product recommendation           3. E2E Security Testing [                                              Investigation
                                                                                               party security checks and
  4.    Cloud and API Gateway Security solution [            Static , Dynamic ,                                            3.   BCP/ DRP – Business
                                                                                               audits
        OAUTH2.0, OpenID, SAML2.0].                          Interactive and Glass box                                          Impact Analysis, DR
                                                                                          4.   Risk Assessment, Gap
  5.    IAM Architecture design and technical                testing]                                                           Strategy & Testing
                                                                                               Analysis, Control Design
        blueprint                                        4. Secure policies,                                               4.   ITSM - Continuous
                                                                                               & Test of Operating
  6.    Identity Data Modeling , Migration plan              guidelines and standard                                            Application
                                                                                               Effectiveness
  7.    Identity Lifecycle , Directory Services and          [OWASP TOP 10, SANS                                                Maintenance Services
                                                                                          5.   Standards and
        Access        Management         installation,       and Industry best                                             5.   IDS, IPS, Firewall
                                                                                               Regulatory Compliance
        configuration and customization                      practice]                                                          policy and Rule
                                                                                               Strategy
  8.    Account life cycle such as User                  5. Secure Code review,                                                 configuration
                                                                                          •    Sarbanes Oxley (SOX)
        provisioning , de-provisioning, self service         coding standard and                                           6.   Secure network design
                                                                                          •    Gramm-Leach-Bliley Act
        and password Management                              guidelines                                                         [F5, BigIP]
                                                                                               (GLBA)
  9.    Federated Identity Management , Trusted          6. Design and Architecture
                                                                                          •    HIPAA
        Identity Solution                                    review
                                                                                          •    Payment Card Industry
  10.   RBAC, Role Mapping                               7. Code scanning through
                                                                                               (PCI) standards
  11.   Authorization ,Policy Manager , runtime              Static scanning, Website
                                                                                          •    Basel II
        authorization and Entitlement                        testing and Webservice
                                                                                          •    SAS-70
  12.   SOA Security, Web Service Security                   Testing through dynamic
                                                                                          •    ISO 27001 Readiness
  13.    Public Key Infrastructure (PKI)                     scanning
                                                                                               review and Pre
  14.   Smart Cards management Solution,                 8. Application Vulnerability
                                                                                               certification services
        2Factor /Multifactor Authentication                  Assessment , Threat
  15.   Single Sign on , Web Single Sign On,                 modeling and
        Single Sign Off/ Logout and Enterprise               Penetration Testing
        Single On , Secure Token Services                9. Database security
  16.   Integration, custom adapter/connector                Assessment and security
        development                                          checklist for Non
  17.   Testing Plan and Strategy [UAT, SIT and              Standard Applications
        E2E Functional Testing and Performance           10. Training and awareness
        Testing]
Technology Enabler
                                                                                  Assurance,                           Managed
Identity , Account Lifecycle and                        Application
                                                                                  Risk, Governance,                    Security and
Cloud Security                                          Security
                                                                                  Regularity Compliance                Infra Security

   Tivoli Identity Manager (TIM)
   Tivoli Access Manager (TAM)                      Rational Appscan for Source    Security Information &
   Tivoli Access Manager For eBusiness              Edition [Static]               Event Management
   (TAMESSO)
                                                                                   (SIEM)                          IBM ISS Siteprotector
   Tivoli Federated Identity Manager (TFIM , STS)   Rational Appscan Enterprise
   Tivoli Directory Server (TDS) & Directory        Edition [Interactive and                                       IDS, IPS
                                                                                   Tivoli Security Operations
   Integrator (TDI)                                 Dynamic]
                                                                                   Manager & Consul InSight
   Tivoli Security Policy Manager
                                                    Rational Appscan Standard
   Oracle Identity Manager (OIM)                                                   ArcSight Enterprise Security
                                                    Edition [ Dynamic and
   Oracle Access Manager (OAM)                                                     Manager
                                                    Glassbox]
   Oracle Entitlement Server (OES)
   Oracle Identity Directory and Oracle Virtual                                    NetIQ Security Manager
   Directory (OID, OVD)                                                            CA Security Command Center
   CA Identity Manager / Access control / Single
                                                    Fortify Software
   sign-on
                                                    SPI Dynamics                   Vulnerability & Threat
   CA SiteMinder, CA SSO, CA Identity
   Novell NSure Identity Manager, Access                                           Management
   Manager and Federation Solution
                                                                                   IBM Internet Scanner Software
   RSA Access Manager
   RSA Federated Identity Manager
                                                                                   IBM Proventia Network
   Microsoft ILM, UAM, TMG                                                         Enterprise Scanner
   Microsoft ADFS
   Ping Identity and Federation Service                                            IBM Proventia Management
                                                                                   SiteProtector

   Web Sphere Data power                                                           CA Vulnerability Manager
   Apigee Gateway Appliance
   Layer 7

More Related Content

What's hot

Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark ShermanRinaldi Rampen
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Mobile security recipes for xamarin
Mobile security recipes for xamarinMobile security recipes for xamarin
Mobile security recipes for xamarinNicolas Milcoff
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleJeff Williams
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security FrameworksMarco Morana
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Suman Sourav
 
we45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45
 

What's hot (20)

Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Mobile security recipes for xamarin
Mobile security recipes for xamarinMobile security recipes for xamarin
Mobile security recipes for xamarin
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Secure Coding 2013
Secure Coding 2013 Secure Coding 2013
Secure Coding 2013
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
Security Development Lifecycle Tools
Security Development Lifecycle ToolsSecurity Development Lifecycle Tools
Security Development Lifecycle Tools
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
 
we45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Study
 

Similar to Gloriolesoft Consulting Security and Privacy Offering

Togaf9 Refcard2
Togaf9 Refcard2Togaf9 Refcard2
Togaf9 Refcard2jucaab
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
Cio by request 1 pager
Cio by request 1 pagerCio by request 1 pager
Cio by request 1 pagerCIO_By_Request
 
Cio by request 1 pager
Cio by request 1 pagerCio by request 1 pager
Cio by request 1 pagerscheppelem
 
Blaze automation profile 2011 by sridhar ponugupati
Blaze automation profile 2011 by sridhar ponugupatiBlaze automation profile 2011 by sridhar ponugupati
Blaze automation profile 2011 by sridhar ponugupatiBlaze_Hyd
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsNetcetera
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Leardon Solutions Product Development and Commercialization Lifecycle
Leardon Solutions Product Development and Commercialization LifecycleLeardon Solutions Product Development and Commercialization Lifecycle
Leardon Solutions Product Development and Commercialization Lifecycleleardonsolutions
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
Baldwin.kristen
Baldwin.kristenBaldwin.kristen
Baldwin.kristenNASAPMC
 
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]21041200 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412REDceo.net
 
Best Practices Frameworks 101
Best Practices Frameworks 101Best Practices Frameworks 101
Best Practices Frameworks 101shailsood
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
Bladwin.kristen
Bladwin.kristenBladwin.kristen
Bladwin.kristenNASAPMC
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...IBM Sverige
 
The Groop Project Checklist
The Groop Project Checklist The Groop Project Checklist
The Groop Project Checklist thegroop
 
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...Chandrashekhar More
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA securitykesavars
 

Similar to Gloriolesoft Consulting Security and Privacy Offering (20)

Togaf9 Refcard2
Togaf9 Refcard2Togaf9 Refcard2
Togaf9 Refcard2
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Cio by request 1 pager
Cio by request 1 pagerCio by request 1 pager
Cio by request 1 pager
 
Cio by request 1 pager
Cio by request 1 pagerCio by request 1 pager
Cio by request 1 pager
 
Blaze automation profile 2011 by sridhar ponugupati
Blaze automation profile 2011 by sridhar ponugupatiBlaze automation profile 2011 by sridhar ponugupati
Blaze automation profile 2011 by sridhar ponugupati
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Leardon Solutions Product Development and Commercialization Lifecycle
Leardon Solutions Product Development and Commercialization LifecycleLeardon Solutions Product Development and Commercialization Lifecycle
Leardon Solutions Product Development and Commercialization Lifecycle
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Baldwin.kristen
Baldwin.kristenBaldwin.kristen
Baldwin.kristen
 
Cohen Boeing Supp
Cohen Boeing SuppCohen Boeing Supp
Cohen Boeing Supp
 
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]21041200 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412
00 k-dev-slides(7)land dev seminar+demo -chuan[3a]210412
 
Best Practices Frameworks 101
Best Practices Frameworks 101Best Practices Frameworks 101
Best Practices Frameworks 101
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Bladwin.kristen
Bladwin.kristenBladwin.kristen
Bladwin.kristen
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
 
The Groop Project Checklist
The Groop Project Checklist The Groop Project Checklist
The Groop Project Checklist
 
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
Enterprise Architecture using TOGAF 's ADM - Architecture Delivery Method (...
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 

More from Debasis Chakraborty

London Entrepreneur & Investor Network Venture
London Entrepreneur & Investor Network Venture  London Entrepreneur & Investor Network Venture
London Entrepreneur & Investor Network Venture Debasis Chakraborty
 
Top 10 reasons - Why you should visit India
Top 10 reasons - Why you should visit IndiaTop 10 reasons - Why you should visit India
Top 10 reasons - Why you should visit IndiaDebasis Chakraborty
 
Basic security concepts essential for all architects
Basic security concepts essential for all architectsBasic security concepts essential for all architects
Basic security concepts essential for all architectsDebasis Chakraborty
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunityDebasis Chakraborty
 
Nike strategy and acquisition EMBA 2014
Nike strategy and acquisition EMBA 2014Nike strategy and acquisition EMBA 2014
Nike strategy and acquisition EMBA 2014Debasis Chakraborty
 
Company valuation debasis chakraborty emba 2014 403503
Company valuation debasis chakraborty emba 2014 403503Company valuation debasis chakraborty emba 2014 403503
Company valuation debasis chakraborty emba 2014 403503Debasis Chakraborty
 
A2 business memo benihana global-ops_ debasis chakraborty_403503
A2 business memo  benihana global-ops_ debasis chakraborty_403503A2 business memo  benihana global-ops_ debasis chakraborty_403503
A2 business memo benihana global-ops_ debasis chakraborty_403503Debasis Chakraborty
 
A1 business memo global ops- seb_debasis chakraborty_403503
A1 business memo  global ops- seb_debasis chakraborty_403503A1 business memo  global ops- seb_debasis chakraborty_403503
A1 business memo global ops- seb_debasis chakraborty_403503Debasis Chakraborty
 
Gloriolesoft Consulting Cloud Virtualization Service Offering
Gloriolesoft Consulting Cloud Virtualization Service Offering Gloriolesoft Consulting Cloud Virtualization Service Offering
Gloriolesoft Consulting Cloud Virtualization Service Offering Debasis Chakraborty
 
Salesforce and Social CRM to accelerate your business
Salesforce  and Social CRM to accelerate your businessSalesforce  and Social CRM to accelerate your business
Salesforce and Social CRM to accelerate your businessDebasis Chakraborty
 

More from Debasis Chakraborty (12)

LEIN Venture
LEIN VentureLEIN Venture
LEIN Venture
 
London Entrepreneur & Investor Network Venture
London Entrepreneur & Investor Network Venture  London Entrepreneur & Investor Network Venture
London Entrepreneur & Investor Network Venture
 
Top 10 reasons - Why you should visit India
Top 10 reasons - Why you should visit IndiaTop 10 reasons - Why you should visit India
Top 10 reasons - Why you should visit India
 
Marketing strategy
Marketing strategyMarketing strategy
Marketing strategy
 
Basic security concepts essential for all architects
Basic security concepts essential for all architectsBasic security concepts essential for all architects
Basic security concepts essential for all architects
 
Payment industry trends and opportunity
Payment industry trends and opportunityPayment industry trends and opportunity
Payment industry trends and opportunity
 
Nike strategy and acquisition EMBA 2014
Nike strategy and acquisition EMBA 2014Nike strategy and acquisition EMBA 2014
Nike strategy and acquisition EMBA 2014
 
Company valuation debasis chakraborty emba 2014 403503
Company valuation debasis chakraborty emba 2014 403503Company valuation debasis chakraborty emba 2014 403503
Company valuation debasis chakraborty emba 2014 403503
 
A2 business memo benihana global-ops_ debasis chakraborty_403503
A2 business memo  benihana global-ops_ debasis chakraborty_403503A2 business memo  benihana global-ops_ debasis chakraborty_403503
A2 business memo benihana global-ops_ debasis chakraborty_403503
 
A1 business memo global ops- seb_debasis chakraborty_403503
A1 business memo  global ops- seb_debasis chakraborty_403503A1 business memo  global ops- seb_debasis chakraborty_403503
A1 business memo global ops- seb_debasis chakraborty_403503
 
Gloriolesoft Consulting Cloud Virtualization Service Offering
Gloriolesoft Consulting Cloud Virtualization Service Offering Gloriolesoft Consulting Cloud Virtualization Service Offering
Gloriolesoft Consulting Cloud Virtualization Service Offering
 
Salesforce and Social CRM to accelerate your business
Salesforce  and Social CRM to accelerate your businessSalesforce  and Social CRM to accelerate your business
Salesforce and Social CRM to accelerate your business
 

Recently uploaded

trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 

Recently uploaded (20)

trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 

Gloriolesoft Consulting Security and Privacy Offering

  • 2. Information Security Security and Privacy Identity and Access Enterprise Application Security Risk Management, Security Strategy Security Strategy , Assessment, Identity Lifecycle , and Roadmap, Secure Policy, Security Audit, SOA Security Security Guidelines and Regularity and and Architecture Procedure Compliance Cloud Security Blueprint , Design and Governance
  • 3. Engagement Lifecycle  Assessment, Secure Secure Package Manage Planning and Strategy and Architecture Implementation Security and Budgeting Roadmap and Design and Deployment Educate 1. Infrastructure 1. Platform and 1. Sit with CXOs and 1. Architectural readiness 1. Define Governance environment detailing business blueprint 2. Deployment at Model readiness vision ,strategy, 2. Architectural Preprod , Preview and 2. High level Plan, 2. SW and Hardware direction and Governance and Production estimation and licensing an d roadmap Design Authority 3. UAT budgeting procurement 2. Develop strategic 3. Best practice and 4. Security Testing 3. Define delivery gate 3. Implementation Goal, benefit and guidelines , 5. Operational Readiness 4. Vendor selection Identity life Cycle ROI technology feasibility 6. Go-Live and strategic 4. Develop custom 3. Build trust and and vendor selection 7. ITSM lifecycle alignment code assess customer’s based on best fit 8. En User Training 5. Detailed program 5. Integration security posture scorecard 9. Security Awareness plan ,resource 6. Static , Dynamic 4. Evaluate existing 4. Develop policies, Training ,ownership and and interactive security policies, milestone . standard and security testing processes and 6. Risk and Mitigation process 7. Secure Code review standards, and plan 5. Architectural ,penetration testing security architecture Decision 8. EIT, SIT 5. Establish security 6. SAD [ Software 9. Audit, reporting , baseline and define Architecture and Management strategic security Design] dashboard roadmap 7. HLSD [ High Level 6. Identify the Risk Solution Design ] Associated with 8. LLSD [Low Level Enterprise, i.e. both solution Design] business and 9. Test Plan and Test technical risk Strategy. 10. Application Security Guidelines and Strategy 11. App and Web Security checklist
  • 4. Service Offering ‐ Artifacts Assurance, Managed Identity , Account Lifecycle and Application Risk, Governance, Security and Cloud Security Security Regularity Compliance Infra Security 1. Application Security 1. Develop Identity Life cycle strategy and Roadmap, Strategy and 1. Vulnerability 1. Management Security Roadmap Guidelines Management & Dashboard 2. IAM Risk assessment , Gap analysis and 2. Secure process Incident Response 2. Information Security Federation readiness. development through out 2. Emergency Response Assessment and Audits 3. Product Evolution, Licensing strategy and SDLC and Forensic 3. Outsourcing and Third- scorecard based product recommendation 3. E2E Security Testing [ Investigation party security checks and 4. Cloud and API Gateway Security solution [ Static , Dynamic , 3. BCP/ DRP – Business audits OAUTH2.0, OpenID, SAML2.0]. Interactive and Glass box Impact Analysis, DR 4. Risk Assessment, Gap 5. IAM Architecture design and technical testing] Strategy & Testing Analysis, Control Design blueprint 4. Secure policies, 4. ITSM - Continuous & Test of Operating 6. Identity Data Modeling , Migration plan guidelines and standard Application Effectiveness 7. Identity Lifecycle , Directory Services and [OWASP TOP 10, SANS Maintenance Services 5. Standards and Access Management installation, and Industry best 5. IDS, IPS, Firewall Regulatory Compliance configuration and customization practice] policy and Rule Strategy 8. Account life cycle such as User 5. Secure Code review, configuration • Sarbanes Oxley (SOX) provisioning , de-provisioning, self service coding standard and 6. Secure network design • Gramm-Leach-Bliley Act and password Management guidelines [F5, BigIP] (GLBA) 9. Federated Identity Management , Trusted 6. Design and Architecture • HIPAA Identity Solution review • Payment Card Industry 10. RBAC, Role Mapping 7. Code scanning through (PCI) standards 11. Authorization ,Policy Manager , runtime Static scanning, Website • Basel II authorization and Entitlement testing and Webservice • SAS-70 12. SOA Security, Web Service Security Testing through dynamic • ISO 27001 Readiness 13. Public Key Infrastructure (PKI) scanning review and Pre 14. Smart Cards management Solution, 8. Application Vulnerability certification services 2Factor /Multifactor Authentication Assessment , Threat 15. Single Sign on , Web Single Sign On, modeling and Single Sign Off/ Logout and Enterprise Penetration Testing Single On , Secure Token Services 9. Database security 16. Integration, custom adapter/connector Assessment and security development checklist for Non 17. Testing Plan and Strategy [UAT, SIT and Standard Applications E2E Functional Testing and Performance 10. Training and awareness Testing]
  • 5. Technology Enabler Assurance, Managed Identity , Account Lifecycle and Application Risk, Governance, Security and Cloud Security Security Regularity Compliance Infra Security Tivoli Identity Manager (TIM) Tivoli Access Manager (TAM) Rational Appscan for Source Security Information & Tivoli Access Manager For eBusiness Edition [Static] Event Management (TAMESSO) (SIEM) IBM ISS Siteprotector Tivoli Federated Identity Manager (TFIM , STS) Rational Appscan Enterprise Tivoli Directory Server (TDS) & Directory Edition [Interactive and IDS, IPS Tivoli Security Operations Integrator (TDI) Dynamic] Manager & Consul InSight Tivoli Security Policy Manager Rational Appscan Standard Oracle Identity Manager (OIM) ArcSight Enterprise Security Edition [ Dynamic and Oracle Access Manager (OAM) Manager Glassbox] Oracle Entitlement Server (OES) Oracle Identity Directory and Oracle Virtual NetIQ Security Manager Directory (OID, OVD) CA Security Command Center CA Identity Manager / Access control / Single Fortify Software sign-on SPI Dynamics Vulnerability & Threat CA SiteMinder, CA SSO, CA Identity Novell NSure Identity Manager, Access Management Manager and Federation Solution IBM Internet Scanner Software RSA Access Manager RSA Federated Identity Manager IBM Proventia Network Microsoft ILM, UAM, TMG Enterprise Scanner Microsoft ADFS Ping Identity and Federation Service IBM Proventia Management SiteProtector Web Sphere Data power CA Vulnerability Manager Apigee Gateway Appliance Layer 7