We are a global cybersecurity provider founded in 2001 with more than 700 team members working out of our New York, Singapore, Dubai and Mumbai offices.
We offer services across 6 broad spectrums - Assessment, BCMS, GRC, Professional Services, MSSP & Trainings. We serve customers across industry verticals such as Banks and Financial Services, Technology and Media, Oil & Power, Airlines, E-commerce, Retail, etc.
We believe that cybersecurity is not a destination, it is a journey and we partner with our clients to address the dynamic cybersecurity threat landscape.
We are a PCI Qualified Security Assessor (QSA) and provide consulting and assessment services to clients globally. Our consultants also assist with compliance to PA-DSS, PTS and other security requirements for payment companies.
We offer a comprehensive methodology for implementing and maintaining an ISO 27001-based information security management system within your organization.
The adoption of cloud computing is an inevitable part of every company's digital transformation journey. Our experts help organizations move to the cloud while still ensuring risk is addressed and legal and regulatory requirements are complied with.
Attacks on Industrial Control Systems (ICS) have been on the rise and the convergence of IT and OT with the advent of Industrial Internet of Things (IIoT) is increasing the attack surface. Our ICS Security practice helps identify vulnerabilities and build a structured cybersecurity framework for your OT environment.
Our Digital Forensics and Incident Response team has been involved in investigating some of the most high-profile breaches in recent years. Be it attacks on SWIFT, ATMs, Internet Banking, Email Fraud, Mobile Forensics, we have investigated many different types of systems and technologies.
The best way to test the security posture of your organization is to conduct an adversary simulation exercise. Our red team assessments cover various scenarios leveraging social engineering, creation of fully undetectable malware, setting up customized C&C servers, and reaching targets while trying to be undetected by the blue teams.
From our Global Security Operations Center in Mumbai, Delhi & Dubai, we offer managed security services covering 24/7 security monitoring, incident response, brand monitoring and site takedown, vulnerability management, and threat intelligence. Our partnerships with security technology leaders such as IBM, Qualys, and Tenable ensure clients get state-of-the-art security without prohibitive capex investments.
Our Business Continuity Management and Disaster Recovery services are based on industry-leading standards such as ISO 22301. We provide the entire gamut of services, right from gap assessments, policy and procedure documentation, risk assessments, business impact analyses, and development of disaster recovery procedures as well as inputs to select the right DR technologies for your data centre.
Be it DevSecOps, Threat Modeling, or Secure Code Reviews, we have one of the most comprehensive Application Security programs to address all aspects of a secure SDLC. This is one of our largest teams and the technology landscape covered by our assessment team members includes web, client-server, kiosk-based, embedded code, APIs, containerized microservices, etc.
Y-O-Y Growth in Revenue
Increase in Employee Headcount
Increase in Cloud Security Projects
Increase in MSSP Business
Amongst the daily humdrum of various roles, responsibilities and activities; would like to take a pause and place on record a word of appreciation for the unstinted support provided by your team deployed for the security assessment engagement. They have adapted to the working environment and contributed towards sustaining the work process including active support in non-working hours (when called for).HDFC Bank
Their Mumbai team has significantly contributed to complete all the light reviews for Grandfather project. One of the milestones in the GF program. We thank you for all your efforts to meet secArch commitments.Morgan Stanley
On behalf of the ICT department in NCEMA, we would like to extend our appreciation and gratitude for your services and support in achieving the Information security CSA & Risk Management project. You have done a splendid job and been very professional. Your work ethics are a real treat.NCEMA, UAE
You have been very helpful and professional in designing the entire audit, thoroughly finding the gaps, helping us in closure of each and every gap and then conducting the post gap assessment audit. It was an extremely well done exercise. Every feedback that you gave for our various processes were very useful to us in maintaining the compliance and security of the project. Your deep understanding of PCI in particular and Information Security in general is commendable.Birlasoft, India
We would like to thank you for your support in Gap analysis and completion of audit smoothly. During the complete audit we found Network Intelligence team to be very supportive and cooperative which lead the audit completion in time . Once again thanks for getting successful Audit.Jumio
We are extremely happy with the way Network Intelligence team has performed exceptionally well in Red Team Assessment by showing great sense of dedication towards identification, follow-up and closure of vulnerabilities. It's a pleasure to have these guys in ICICI. Their professionalism and great work ethics are a matter of appreciation.ICICI Bank
Successfully developed first set of automation tools to differentiate service offerings.Acquired first US based customer.
Executed first international project for Dubai Stock Exchange.
Presented on Detection & Evasion of Web Application Attacks at Blackhat conference Awarded ISO 27001
Training operations started
Middle East operations commenced
GRC practice started.
SOC operations commenced
Network Intelligence became PCI DSS QSATied up with IBM & Microsoft as security partner
Launched Insights, a Security Analytics Platform.
Merged the consulting practices Torrid Networks with NIISingapore operations started
Raised $5mn from Helix Investments MSSP business trebles Y-o-Y. Flagship product Firesec launched.
In the previous post, we learned about the Tokens and Privileges which are assigned to the user by the system. In this blog series, we will take a look at the technical aspects of the Token Manipulation AttackRead More
In these series of blogpost, we are going to look at the Windows Token-based Attacks along with the full understanding of what are tokens and privileges and how ...Read More