You are on page 1of 7

CONSULTING FOR INFORMATION SECURITY

Frontier helps organizations develop and rollout successful information security programs

FRONTIER BUSINESS SYSTEMS

A brief profile

Overview Rs. 196 crores in sales, 500 people and growing,. 14th year of operation. Regional offices in Bangalore. Chennai, Hyderabad and Cochin. Satellite offices across the country. Businesses Professional services (Information Security Consulting, ITIL Practice, Infrastructure Management Services) Networking (Network design and execution, Enterprise network security, switching and routing),Computing (Enterprise Sun and IBM P Series, Storage Area Networks) Power conditioning (Design and execution of large scale electric cabling projects and backup power) and Software (IBM Software, Microsoft Gold partner and Citrix Gold partner). Industry recognition Dataquest: Solution Provider Silver Award Dataquest: Most Influential Partners in India Indian Express: Best System integrator Principal Awards: Multiple awards year on year

C O N S U LT I N G F O R I N F O R M AT I O N S E C U R I T Y
F RONTIER ' S
TEAM INFORMATION SECURITY CONSULTING

HELPS

ORG ANIZATIONS

UNDERSTAND

INFORMATION SECURITY , IDENTIFY VULNERABILITIES , ASSESS AND M I T I G AT E RISK AND MEET THE

COMPLIANCE REQUIREMENTS OF BUSINESS .

INFORMATION SECURITY CHALLENGES Information exists in bits and bytes. Unlike a physical and tangible asset, it is not visible or identifiable as a discrete asset. This poses a big challenge to detection of any information security vulnerabilities. It also could engender a false sense of security, since the organization could continue to use data that a hacker may have accessed and compromised. There has been a growing appreciation of these challenges in keeping information secure. Today mature organizations treat Information Security as an enterprise and business issue rather than a technical concern. Some of the reasons for elevating information security to a top management concern are :

s Emergence of security breaches motivated by financial gain. For


example, Credit Card and banking data theft witnessed from call centers and BPO firms over the last few years

s apprehensions about business damage if there is a Client


compromise of privacy or identity theft. This is particularly true of BPO organizations, where it is critical to maintain and demonstrate strong confidentiality processes

s Increased security risk on account of suppliers, vendors and


partners sharing a common network and information base

s Competitive intelligence theft, as recently seen in the case Risk of


of a leading Indian telecom company

s incidents of malicious insider activities Escalating s Discontented ex-employees compromising security by exploiting
ineffective internal systems and processes

FRONTIER BUSINESS SYSTEMS

INFORMATION SECURITY - A BUSINESS REQUIREMENT

CONTINUOUS MONITORING

Steering Committee B U I L D I N G B L O C K S Baseline Current State Risk Assessment Build ISMS Rollout ISMS Audit

Several organizations have adopted Information Security Governance as a holistic approach towards systematic enterprise risk management. This helps ensure that information security is aligned with the company's strategic goals and meets the organizational objectives. INFORMATION SECURITY FROM FRONTIER Our consulting teams take a process based approach to each assignment, with meticulous project planning and attention to detail. The approach has built in quality checks to ensure high quality delivery while adhering to project timelines. The deliverables are structured to be clear and concise, and offer management not only a technological perspective, but a business perspective as well for each recommendation.

C O N S U LT I N G F O R I N F O R M AT I O N S E C U R I T Y

INFORMATION SECURITY CONSULTING SERVICES


Frontier offers a wide range of Consulting services to address the complete spectrum of information security requirements of enterprises through the complete information life-cycle.
CONSULTING SERVICES ORGANIZATIONAL BENEFITS

ASSESS
Enterprise Security Audit To audit against international standards and frameworks and report on the compliance of processes, applications, technical security and user awareness. Assessment of Technical Controls and Prioritize the Implementation of Controls. Establish an effective Technical Vulnerabilities Reduction Metrics Our Proof of Concept documents add value to the Customers in taking immediate necessary action to ensure that the Systems are hardened To check for the security of the applications as per the OWASP guidelines. Evaluate the portfolio of applications on web connected devises and each layer of application logic for potential vulnerabilities. Compliance audit against ISO27001, GLBA, HIPAA, SAS 70, SOX, SEBI Clause 49, RBI Guidelines and other international security standards/ guidelines To check for the adequacy and compliance of the security policies, procedures and standards.

Vulnerability Assessments

Penetration Testing

Application Security Assessment

Compliance Audit

Security Process Review

DESIGN
BCP/ DRP Consulting Ensuring Business Resilience and providing immediate , accurate and measured response to emergency situations. Facilitate the recovery of Critical Business Process to reduce the overall negative impact on Business and revenue Top Driven and Consistent approach to address Compliance and Risk Management. Establishes Information System/Process Assurance . Frontier's Information Security Consulting follows established methodologies to enable Organization get Certified to ISO 27001 and sustain the ISMS certification. Designing and Developing Information Security Policies, procedures, standards and guidelines after a detailed study of the business process and security requirement. Study the existing network design, network and security device positioning and suggest/ recommend redesign of the network taking into consideration confidentiality, integrity and availability of information and ease of network and security administration.

ISO/IEC 27001:2005 Consulting

Security Policy Design

Network Security Architecture

DEPLOY
Security Policy Deployment To implement organization wide information security policies and procedures to ensure that corporate information and assets are protected from unauthorized access, disclosure and modification.

MANAGE
Enterprise Security Management To manage the security process and controls organization wide 24/7 and provide real time alerts and recommendations thereby ensuring proactive security measures and preventing disruption of service. To manage the networking & security devices ( servers, routers, firewalls, IPS, UTM's etc) organization wide 24/7 and provide real time alerts and recommendations thereby ensuring proactive security measures and preventing disruption of service. Customized sessions focusing on security concepts, policies & procedures for organizations. Interactive

Security Product Management

Education & Training

FRONTIER BUSINESS SYSTEMS

EXPERIENCE AND EXPERTISE Frontiers team comprises of highly qualified and experienced Information Security Professionals and have International Security Certifications like CISA (Certified Information System Auditor), CISSP (Certified Information System Security Professional) ISO 27001 LA (Lead Auditor), CCNP, CEH, CCIE, CCSA etc. The Team comes with rich experience in implementing and rolling out Information Security Processes for Organizations across different verticals. Our consulting team has consulted organizations from Industry verticals such as IT/ITES, Banking, Financial Institutions, Pharmaceuticals, Manufacturing and government. They have consulted in assessing, design and deployment of robust Information Security Management Systems. We have helped many organizations in meeting information compliance standards such as ISO27001 among many others. Our Security Consulting goes beyond traditional security measures. In addition to assisting Organizations in establishing best security practices, we partner organizations through the entire Information Security lifecycle assisting them in meeting ongoing security challenges and work with them in taking proactive steps to ensure the security and reliability of business systems. FRONTIER PROVIDING COMPREHENSIVE INFRASTRUCTURE SOLUTIONS AND SERVICES
ENTERPRISE LEVEL

IT BENEFITS OF WORKING WITH FRONTIER w Complete portfolio of Information Security Consulting services w Consulting team with experience in executing complex projects w BFSI and Manufacturing industry consulting IT, ITES, experience w certifications such as CISSP / CISA / CISM / CEH / Industry ISO27001 LA w Technology expertise across multiple domains w has over a decades experience in executing Frontier complex projects for enterprise customers w Immaculate record of customer retention & consistent acquisition of new customers w partnering with over 2000+ customers Currently w A flat organization structure. Fast and flexible

Frontier Business systems (P) Ltd is a Rs. 196 crore, 500 people IT infrastructure solutions and services organization. We are recognized as being among the best in design and delivery of solutions in all components of the IT infrastructure: Professional services (Information Security Consulting, ITIL Practice, Infrastructure Management Services) Networking (Complex and enterprise level network design and execution, Enterprise network security, switching and routing),Computing (Enterprise Sun and IBM P Series, Storage Area Networks) Power conditioning (Design and execution of large scale electric cabling projects and backup power) and Software. With over twelve years of consistently rapid growth and customer acquisition in a highly competitive environment, Frontier is financially sound and is recognized as a highly competent and professional player by the industry, customers and the press. Frontier has a flat organization structure enabling it to be fast and flexible and offering customers quick turnaround times. The entire organization is customer focused and works diligently at delivering customer satisfaction. It is a partner of choice for many organizations for all their IT infrastructure solutions, provisioning and services.

C O N S U LT I N G F O R I N F O R M AT I O N S E C U R I T Y

Contact us Infosec@frontier.in Mobile: 9844844250 Frontier Business Systems Pvt Ltd #3 Wood Street, Bangalore - 560 025. Ph: 080 - 44229191 Fax: 080 - 44229192 Frontier Business Systems Pvt Ltd Woodhead Centre, # 23, Sivaganga Road, Nungambakkam, Chennai - 600 034 Ph: 044 - 44229191 Fax: 044 - 44229192 Frontier Business Systems Pvt Ltd # 7-1/58, Flat # 201, 2nd Floor, Concourse Complex, Ameerpet Road, Hyderabad - 500 016 Ph: 040 - 44229191 Fax: 040 - 44229192 Frontier Business Systems Pvt Ltd 1st Floor Building NB 4, Unit No 7, Sona Udyog Premises Co-operative Society Ltd., Parsi Panchayat Road, Andheri East, Mumbai - 400 069 Ph: 022 - 44229191 Fax: 022 - 44229192 Frontier Business Systems Pvt Ltd G - 380, Marath, Panampally Nagar, Cochin - 682 036 Ph: 0484 - 4014562 Fax: 0484 - 4014559

You might also like