SlideShare a Scribd company logo
CyCOPS  (I) Pvt. Ltd.
Agenda Who we are? Vision Team Experience Future Prospects What We do? FINS VULPEN, SACT, SADI, Decontamination, WiFi Sec & COFOIN What We Train? Research & Development Contact Us
Who we are? CyCops group based out of Hyderabad was founded in 2008 with the aim of bringing together a team of  highly skilled ,  technically focused , and  uncompromising  security professionals.  CyCops Security is a specialist information security company, with niche technical skills allowing us to deliver high quality penetration testing and other information security related services to our customers.
“ TO LEAD AND INSPIRE, THROUGH EXCELLENCE IN TRAINING, SERVICES AND RESEARCH TOWARDS THE DEVELOPMENT OF INDIA AS A  SECURED NATION ”. OUR VISION
Our Team Size: Total team:- 25 Prime Practitioners:- 4 Krishna Chaitanya Suraparaju Lakshmi Kanth Reddy Naveen Kumar Singh Justin Prasad Additional Security Practitioners: 20  Certifications we hold:- CISSP, CEH, CHFI, CISA, etc… Experience: - All the members of CyCops have got a minimum experience of 3+ years in the field of Information Security. Have working experience with international clientele.
Experience Trained state cops  (Intelligence Department)  in catching Cyber Criminals. Trained  Tanzanian Revenue Authority  on Ethical Hacking & Computer Forensics Investigation. Trained corporates like  HSBC, GENPACT, GOOGLE, IBM, Kennametal,CtrlS, Adept Technologies  etc…  Seminars on Information security and Ethical Hacking has been given at places like  GMR’s  National conference,  MIT  (Manipal institute of Technology) etc… Have experience in deploying IS services at defense organizations like ( RCI, MCEME,  Radiant Global, Inc.  etc…)
Partnered with IBM CyCOPS is IBM Enterprise Business Partner for its Information Protection, ISS Proventia Security and Managed Security Services. In conjunction with IBM, CyCops designs a fully Managed Service solution that automatically protects business critical data across enterprise and end-user computing infrastructure – either on site or remote data protection. This service will also help you to mitigate, monitor and manage the latest security threats and vulnerabilities with the backing of Industry leading ISS X-Force research and development team of  15,000 researchers . CyCOPS and IBM commit to working together on joint marketing, collaborative selling and software integration and performance optimization. The relationship will deliver real-time, 24X7X365 security management monitored through dashboards with guaranteed SLA driven data protection.
What IBM gives? IBM offers a "Guarantee of Protection" of  $50,000  per security breach when IBM manages your end-to-end security infrastructure. IBM has been awarded leadership in Managed Security Services 2007 and 2008: Gartner Magic Quadrant, Forester Wave and Frost & Sullivan. IBM invested  $1.5 billion  in security R&D in 2008. IBM's Proventia Intrusion Prevention System (IPS) is the industry leading network security solution that prevents costly security breaches. IBM's Managed Security Solutions are backed by the industry leading ISS X-FORCE R&D team, which monitors 4 billion events per day and protects 3,700+ clients across the globe; ensuring that you are pre-empting threats rather than reacting to security breaches.
Partnered with Sipera Systems Unified Communications Security Sipera Systems, the leader in real-time UC security, enables enterprises to deploy VoIP and unified communications simply and with confidence while helping service providers protect and offer new IP-based communication services.  Offered services protecting IP PBXs and other devices enforcing UC security policies authenticating users and devices maintaining signaling and media privacy addressing deployment issues such as configuration of phones and firewalls, media anchoring and more.
What we do?
Services
FINS (Framework on Information Security) “ Security is not something you  buy , it is something you  do ”.
VULPEN  ( VUL nerability Assessment &  PEN etration testing) Vulnerability Assessment & Penetration Testing   Automated Vulnerability Scanning Solution External Penetration Testing Internal Penetration Testing Application Testing Software's & Techniques: No1 Penetration testing & Vulnerability Assessment tool in the world. All Open source Tools Custom designed 0’day Vulnerabilities Self developed scripts etc…
SACT  ( S ecurity  A udit &  C ompliance  T est) Positioning of  ISO 27001 with in an organization   Physical Security Access control Risk Management System Planning Data Analysis  Compliance with standards like (PCI, HIPAA, COBIT, OSSTM , OWASP etc…) Advantages:  It provides confidence at all levels Organization level Operation level Commercial level Legal level Financial level Human level
SADI  (Security Architecture design and implementation) Strategic planning of network layout Security policies, standards, and procedures Risk assessment  Disaster recovery strategies Business continuity management
Decontamination  Antivirus company detects an infected system every 4.5 seconds Do you know that 80% of the loss via the internet is caused because of  Malware 27% protected systems are infected by Malware.(Panda)  Antivirus companies are passive in response Example: Confiker virus infected all the major networks before getting reported. Variants of confiker infected the UK naval base network even after patches were deployed. Organized attacks are being planned keeping  in mind a targeted sector.  Twenty seven percent of the systems are vulnerable even after patches were deployed. Software's & Techniques: Incident response Measures to lower loss in terms of downtime and theft of data All Open source Tools Reversing malware and designing procedures for its removal Custom designed scripts for virus removal
Wi-Fi Security Wireless Architecture design and implementation:   Deploying wireless plans Site survey and network planning Infrastructure hardware and software Wireless problem discovery and solutions   Securing wireless LAN’s  Designing and implementing security for wireless LAN’s Wireless security: Vulpen for wireless Custom Firmware for Wireless Penetration Testing Implementing wireless IDS Implementing user authentication in wireless. Deployment of high layer VPN in wireless
COFOIN  (Computer Forensics Investigation) Digital Fraud IP Theft E-Stalking Breach of Contract Computer Break-ins Forgeries Murder Industrial Espionage Theft Assault Inappropriate Data Duplication Unauthorized Data Duplication Bankruptcy Data Investigation Private Investigation of Personal Computers
What we Train? CYCOPS  C ertified  S ecurity  T echnician  CYCOPS  C ertified  S ecurity  M anager CYCOPS  C ertified  S ecurity  E xpert  CYCOPS  C ertified  S ecurity  C hief In-house Corporate Trainings
What we Train? Intro InfoSec Shell Scripting & Programming Basics  VULPEN OS Hardening COFOIN Reverse Engineering WiFi Sec SADI LOG Analysis  Incidence Response  PKI Disaster Recovery
THANK YOU

More Related Content

Cy Cops Company Presentation

  • 1. CyCOPS (I) Pvt. Ltd.
  • 2. Agenda Who we are? Vision Team Experience Future Prospects What We do? FINS VULPEN, SACT, SADI, Decontamination, WiFi Sec & COFOIN What We Train? Research & Development Contact Us
  • 3. Who we are? CyCops group based out of Hyderabad was founded in 2008 with the aim of bringing together a team of highly skilled , technically focused , and uncompromising security professionals. CyCops Security is a specialist information security company, with niche technical skills allowing us to deliver high quality penetration testing and other information security related services to our customers.
  • 4. “ TO LEAD AND INSPIRE, THROUGH EXCELLENCE IN TRAINING, SERVICES AND RESEARCH TOWARDS THE DEVELOPMENT OF INDIA AS A SECURED NATION ”. OUR VISION
  • 5. Our Team Size: Total team:- 25 Prime Practitioners:- 4 Krishna Chaitanya Suraparaju Lakshmi Kanth Reddy Naveen Kumar Singh Justin Prasad Additional Security Practitioners: 20 Certifications we hold:- CISSP, CEH, CHFI, CISA, etc… Experience: - All the members of CyCops have got a minimum experience of 3+ years in the field of Information Security. Have working experience with international clientele.
  • 6. Experience Trained state cops (Intelligence Department) in catching Cyber Criminals. Trained Tanzanian Revenue Authority on Ethical Hacking & Computer Forensics Investigation. Trained corporates like HSBC, GENPACT, GOOGLE, IBM, Kennametal,CtrlS, Adept Technologies etc… Seminars on Information security and Ethical Hacking has been given at places like GMR’s National conference, MIT (Manipal institute of Technology) etc… Have experience in deploying IS services at defense organizations like ( RCI, MCEME, Radiant Global, Inc. etc…)
  • 7. Partnered with IBM CyCOPS is IBM Enterprise Business Partner for its Information Protection, ISS Proventia Security and Managed Security Services. In conjunction with IBM, CyCops designs a fully Managed Service solution that automatically protects business critical data across enterprise and end-user computing infrastructure – either on site or remote data protection. This service will also help you to mitigate, monitor and manage the latest security threats and vulnerabilities with the backing of Industry leading ISS X-Force research and development team of 15,000 researchers . CyCOPS and IBM commit to working together on joint marketing, collaborative selling and software integration and performance optimization. The relationship will deliver real-time, 24X7X365 security management monitored through dashboards with guaranteed SLA driven data protection.
  • 8. What IBM gives? IBM offers a "Guarantee of Protection" of $50,000 per security breach when IBM manages your end-to-end security infrastructure. IBM has been awarded leadership in Managed Security Services 2007 and 2008: Gartner Magic Quadrant, Forester Wave and Frost & Sullivan. IBM invested $1.5 billion in security R&D in 2008. IBM's Proventia Intrusion Prevention System (IPS) is the industry leading network security solution that prevents costly security breaches. IBM's Managed Security Solutions are backed by the industry leading ISS X-FORCE R&D team, which monitors 4 billion events per day and protects 3,700+ clients across the globe; ensuring that you are pre-empting threats rather than reacting to security breaches.
  • 9. Partnered with Sipera Systems Unified Communications Security Sipera Systems, the leader in real-time UC security, enables enterprises to deploy VoIP and unified communications simply and with confidence while helping service providers protect and offer new IP-based communication services. Offered services protecting IP PBXs and other devices enforcing UC security policies authenticating users and devices maintaining signaling and media privacy addressing deployment issues such as configuration of phones and firewalls, media anchoring and more.
  • 12. FINS (Framework on Information Security) “ Security is not something you buy , it is something you do ”.
  • 13. VULPEN ( VUL nerability Assessment & PEN etration testing) Vulnerability Assessment & Penetration Testing   Automated Vulnerability Scanning Solution External Penetration Testing Internal Penetration Testing Application Testing Software's & Techniques: No1 Penetration testing & Vulnerability Assessment tool in the world. All Open source Tools Custom designed 0’day Vulnerabilities Self developed scripts etc…
  • 14. SACT ( S ecurity A udit & C ompliance T est) Positioning of ISO 27001 with in an organization   Physical Security Access control Risk Management System Planning Data Analysis Compliance with standards like (PCI, HIPAA, COBIT, OSSTM , OWASP etc…) Advantages: It provides confidence at all levels Organization level Operation level Commercial level Legal level Financial level Human level
  • 15. SADI (Security Architecture design and implementation) Strategic planning of network layout Security policies, standards, and procedures Risk assessment Disaster recovery strategies Business continuity management
  • 16. Decontamination Antivirus company detects an infected system every 4.5 seconds Do you know that 80% of the loss via the internet is caused because of Malware 27% protected systems are infected by Malware.(Panda) Antivirus companies are passive in response Example: Confiker virus infected all the major networks before getting reported. Variants of confiker infected the UK naval base network even after patches were deployed. Organized attacks are being planned keeping in mind a targeted sector. Twenty seven percent of the systems are vulnerable even after patches were deployed. Software's & Techniques: Incident response Measures to lower loss in terms of downtime and theft of data All Open source Tools Reversing malware and designing procedures for its removal Custom designed scripts for virus removal
  • 17. Wi-Fi Security Wireless Architecture design and implementation:   Deploying wireless plans Site survey and network planning Infrastructure hardware and software Wireless problem discovery and solutions   Securing wireless LAN’s Designing and implementing security for wireless LAN’s Wireless security: Vulpen for wireless Custom Firmware for Wireless Penetration Testing Implementing wireless IDS Implementing user authentication in wireless. Deployment of high layer VPN in wireless
  • 18. COFOIN (Computer Forensics Investigation) Digital Fraud IP Theft E-Stalking Breach of Contract Computer Break-ins Forgeries Murder Industrial Espionage Theft Assault Inappropriate Data Duplication Unauthorized Data Duplication Bankruptcy Data Investigation Private Investigation of Personal Computers
  • 19. What we Train? CYCOPS C ertified S ecurity T echnician CYCOPS C ertified S ecurity M anager CYCOPS C ertified S ecurity E xpert CYCOPS C ertified S ecurity C hief In-house Corporate Trainings
  • 20. What we Train? Intro InfoSec Shell Scripting & Programming Basics VULPEN OS Hardening COFOIN Reverse Engineering WiFi Sec SADI LOG Analysis Incidence Response PKI Disaster Recovery