Risk based transaction monitoring
Cyber Security
Data Leak prevention strategy
Vendor Risk Management
Vulnerability assessment and Penetration Test and Red Team Exercises
Cloud based log search
Threat Mitigation and Remediation Stratergy
Network Management and Security Secure Configuration
Audit Log settings
Digital Forensic Investigation
Penetration testing
Cloud and Data center Services
Cloud Computing
Application Security Life Cycle (ASLC)
Consulting
Anti-Phishing
Information Technology