SecArmour is a group of security professionals and researchers who have been actively working in security field. We understand the threats posed by computing industry these days and can effectively tackle these problems. We provide solutions to vulnerabilities existing in a system and test how deeply an attacker can penetrate along with the forensic analysis of such activities. We recover the lost data as well. In addition to this, we provide solutions to existing security threats. We also provide corporate training to help organisations prevent their systems against further attacks.
2. INTRODUCTION
SecArmour is a group of security professionals and researchers
that provides solutions to various security problems and tests how
deeply an attacker can penetrate into an organisation’s details.
We provide many other solutions like data recovery and
forensics.
We also provide corporate training to help organisations prevent
their systems against further attacks.
We ensure that your information remains:
• Confidential
• Accurate
• Available when needed
www.secarmour.com
2
3. OBJECTIVES
The main objective of our company is to foresee the potential
security threats that can hamper the functioning of an
organisation and resolve them to provide unparalleled security
beyond compare.
We as a company strongly believe in the mantra of perfection
and satisfaction. We believe that satisfaction comes from
perfecting the solutions and satisfied customers is our topmost
priority.
www.secarmour.com
3
4. SPECIALIZATIONS
We specialize in many fields of security.
Our core security fields include:
• Penetration Testing
• Vulnerability Assessment
• Cyber Forensics
Additional fields:
• Data Recovery
• Incidence Response
www.secarmour.com
4
5. PENETRATION TESTING
Our penetration testing methodology is well aligned with
established standards and practices, combined with our
extensive experience.
RECONNAISANCE
•
•
•
•
SCANNING
GAINING
ACCESS
MAINTAINING
ACCESS
COVERING
TRACKS
Web application security testing
Network penetration testing
Automated port identification
Risk-based penetration testing
www.secarmour.com
5
6. VULNERABILITY ASSESSMENT
In Vulnerability Assessment we find out the existing vulnerabilities
and then enumerate the potential threats which can be triggered
by it.
Network
Surveying
Port Scanning
System and
Service
identification
Vulnerability
Research and
verification
• A network survey , often serves as an introduction to the
systems to be tested.
• Port scanning is an active probing of system ports on the
network and transport layer
• System fingerprinting and service identification is an active
probing of a system for responses .
• The focus of this part is to identify, understand and verify the
weakness, Mis-configuration and vulnerabilities within host or
network.
www.secarmour.com
6
7. CYBER FORENSICS
This refers to the post mortem analysis of the attack that took
place. It is kind of an investigative process which tries to find the
causes behind the attack and the entities that caused the attack.
We help in ensuring the maximum recovery of the systems along
with unearthing all the important information regarding the
attack.
• Disk forensics
• Network forensics
• Mobile device forensics
• Live forensics
• Memory forensics
• Multimedia forensics
• Internet forensics
www.secarmour.com
7
8. ADD ONS
• DATA RECOVERY
Data loss is a common issue which can happen due to a
number of reasons. We can also recover data lost due to
any attack or by careless handling of data.
• INCIDENCE RESPONSE
We can help organisation figure out the ways to handle
the attacks whether they have already taken place or
are about to take place. We even have special training
programs to help formation of INCIDENCE RESPONSE
TEAMS.
www.secarmour.com
8
9. PRODUCTS
Our products Zshield and Security Analyser are to be launched
soon. We aim at building best quality products which are easy to
use and maintain.
• Zshield ensures detection of any intrusion activities attempted
by internal/external attackers.
• Security Analyser
vulnerabilities.
www.secarmour.com
notifies
any
system
and
application
9
10. SECARMOUR ZSHIELD
Zshield ensures the confidentiality, integrity and availability of
critical resources with Intrusion Prevention Capability, including:
• Threat
containment
that
leverage existing network
infrastructure
• In-line Intrusion Prevention
• Intrusion
Prevention
to
automate response to threats
in real time
• Intrusion
Prevention
that
utilizes multiple
response
technologies
• Forensic tools for session
reconstruction
to
simply
threat
mitigation
and
resolution
www.secarmour.com
10
11. SECARMOUR SECURITY ANALYSER
Easy-to-use tool designed for IT professional that help in testing
all perimeters of an organization for security and its posture that
expose your system to attacks. It ensures:
• Detection of vulnerable and
out-dated programs and
plug-ins
• Discovery, verification, risk
classification, impact
analysis, reporting and
mitigation
• Network and software audits
and vulnerability assessment
• Remediation tracking
according to business risk
www.secarmour.com
11
12. TRAINING PROGRAMME
Our training programs includes a vast variety of security
categories. Each category has a different set of challenges. We
guarantee efficient insight and remedial techniques in our
training program.
•
•
•
•
•
•
•
Network assessment to evaluate insecure networks
Website Security to ensure security against day to day attack
Reverse Engineering to find inner details of software
Data Recovery to recover any of your lost data
Penetration Testing to find out the level of visibility externally
Vulnerability Assessment to find all the vulnerable areas
Forensic Analysis to do post-exploit analysis of attack
www.secarmour.com
12
13. WORKSHOPS
We also organise workshops. We cover following categories:
•
•
•
•
•
•
•
Network Security
Digital Forensics
Software Reverse Engineering
Wireless Pentesting
Web Vulnerability Assessment
Data Recovery and Incident Response
Secure Programming Concepts
www.secarmour.com
13
14. WHY SECURITY?
Companies often wonder why do they need security. The extent
of potential damages is beyond imagination. Only a few know
the actual impact of insecure systems, which generally include:
•
•
•
•
•
•
•
•
•
Loss of confidential information
Unauthorized use
Security breaches
Tampering data
Financial fraud
Loss of customer’s goodwill
Monetary loss for fixing the damage
Irreversible negative publicity
Unavailability of network
www.secarmour.com
14
15. BENIFITS
Security is both a necessity and an investment these days.
Security can help an organisation in following ways:
• It helps prioritizing the potential threats
• It helps in building effective mitigation against attacks.
• It can save organizations from unauthorized flow
information.
• Enhances goodwill of the company
• Better market reputation and customer loyalty
• Increased productivity
• Huge return on investments
www.secarmour.com
of
15