Value Added Services
Information Security Solutions : Anti-virus, Anti-spam, Application/ Enterprise Fire Wall, Web/email Content Filtering, Data Leak Prevention, Intrusion Prevention Systems, Patch Management, Two Factor Authentication, End Point Security, Log Management, Wi-Fi Security.
Infrastructure Management : Disaster Recovery Management, Network Access Controllers, Wireless Networking.
Consulting & Compliance : ISO 27001, ISO 20000-ITSM, BCP-BS 25999, PCI DSS, Building IT & Security Policies against Custom requirement, DR Planning, DR Testing Framework.
Solutions : Security Audits, ISMS Framework/Implementation, VA-PT, DR Audits, Network Audits.
ISO 27001 Consulting Services
iBox Solutions’ ISO 27001 Consulting services provide guidance and support to organizations looking to achieve certification. iBox’s ISO Consulting Services are customizable to the specific needs of each client. From trusted advisor to full service project leader, iBox can offer the services that meet your requirements. Our ISO expertise extends to all aspects of the process and includes :
Preparing and/or reviewing your ISMS plan
Performing a Gap Analysis
Management of the implementation process
Preparing for the Management review meeting
Preparing the SoA
Selecting and scheduling the Registrar
Attending Registrar audits
Preparing for Re-certifications
The need to protect customer and company data has become increasingly important. Maintaining reputation and avoiding costly legal battles are just two critical concerns. Today, organizations must not only identify and stop improper use of information and systems; they are often challenged to investigate further to obtain digital evidence. Such investigations demand specialized skills that often exceed in-house expertise.
iBox Solutions provides the forensic expertise necessary to appropriately collect and examine key electronic evidence. Our Forensic Consultants apply disciplined investigative techniques to identify the source, contain it, and gather the related evidence. We help you react quickly, effectively, and in an orderly, consistent manner.
Forensic services include the identification, acquisition and subsequent examination of key pieces of electronic data. Our investigators proceed in a manner which assures you and your legal team access to evidence which will withstand the challenges in any legal proceeding as it pertains to the methodology involved in its preservation, collection, analysis, and presentation.
Information security audits
To define the audit scope and the criteria, understand the business process and its security necessities. Assessment
of information security implementation & submit audit findings with recommendation.
Information technology and process audits
To define the audit scope and the criteria, understand the business process and networking requirements. Assessment of information technology process and its requirements & submit audit findings with recommendations.