What can we do for you?

project-management
Consultancy
Ideation / Solutioning
Technology Blueprint
Project Health Check
Project Management
Project Management Office
Business Analyst
cyber-risk
Cyber Risk Management
Manage Detect & Response
Security Assessment
Red Team
media-reputation
Online Media Reputation
Online Media Monitoring
Search Engine Reputation
Media Campaign

Consultancy

ideation
IDEATION / SOLUTIONING
This process involves understanding of the client’s business pains or problems, studying their current infrastructure, evaluating their priorities and immediate needs, specifying the mix of hardware and software required to meet the project goals, customization and implementation of the proposed components at the client's site(s) or on the cloud.
tech-blueprint
TECHNOLOGY BLUEPRINT
The objective of the Technology Blueprint service is to provide visibility to the organization on the pre-requisite changes required on People, Process, Infrastructure, Systems and Policies to achieve the information requirements of the business strategies.
This blueprint will outlines the organization's future goals and documents the specific steps that are needed to accomplish these goals.
The outcome of this will define which specific technologies are to be used, as well as the employees or third-party contractors charged with managing them.
health
PROJECT HEALTH CHECK
Project health checks (PHC) are used to determine whether projects are well-governed and inherent risks are being identified and controlled. PHCs may include meetings or interviews with key stakeholders, review of project documentation to determine whether the project is following its timeline, is on budget, is achieving its expected objectives and is managing risks effectively.
The benefits of periodic project health checks impact the project manager as well as the company, the business, stakeholders and project sponsors.

Project Management

PROJECT MANAGEMENT OFFICE
PMO defines a function within an organization that defines the standards for project management. And we can do a whole lot more than that too!
We ensure that projects and programs are run in a repeatable, standardized way by providing:
  • Governance
  • Transparency
  • Reusability
  • Delivery support
  • Traceability
business-analyst
BUSINESS ANALYST
Business Analyst serves as an interlink between the client and the development team that allows realizing every aspect of the project as close to the envisioned as possible.
  • Determine the project’s business objectives and desired outcomes.
  • Plan the requirements efforts, execute on requirements elicitation and facilitation.
  • Create a full set of visual models for the requirements.
  • Create any needed requirements documentation.
  • Manage changes to requirements throughout the entire project lifecycle.
  • Transition requirements knowledge to the development and test teams.
  • Measure the success of the project.

Cyber Risk Management

MANAGE, DETECT AND RESPONSE SERVICES
Provide services to companies and organizations that aim to improve the way they detect threats, respond to incidents, and monitor their IT assets continuously. Incident response is the methodology an organization uses to respond to and manage a cyber-attack.
Service offered:
  • Security Event Monitoring
  • Threat Intelligence and Vulnerability Management
  • Business Email Compromise (BEC) Monitoring and Response
  • End Point Protection and Incident Handling
  • Web Application Firewall
SECURITY ASSESSMENT
Refers to a methodology that transforms and enhances an organization’s risk management capabilities. This service will provide a clear view of the security status and possible security threats within the organization can be identified.
Service offered:
  • Reconnaissance / Profiling
  • Vulnerability Assessment
  • External Penetration Testing
  • Internal Penetration Testing
RED TEAM
An exercise that attack organization's digital infrastructure as an attacker would, in order to test the organization's defenses.
The red team closely mimics a real attacker’s active and stealthy attack methods by using tactics, techniques and procedures (TTPs) seen on real, recent incident response engagements. This helps assess your security team’s ability to detect and respond to an active attacker scenario.

Online Media Reputation

media-monitoring
ONLINE MEDIA MONITORING
Provide client with information visibility to manage social media risk on digital channels. Maintain real-time coverage of social media, blogs, forums and review sites
Service offered:
  • Media Coverage
  • Sentiment Analysis
  • Trending Analysis
  • Influencer Analysis
search-engine
SEARCH ENGINE REPUTATION
Persistently track, alert, investigate and mitigate search results that are negative, malicious, fraudulent or infringe on organization. By reposition negative information downwards and positive information upwards.
Service offered:
  • SERP Analysis
  • Amplification exercise
  • Result Monitoring (after amplification exercise)
MEDIA CAMPAIGN
Develop and create media campaign on various platform to amplify information of interest to specific target audience which includes content strategy and editorial.
Service offered:
  • Creating Media Campaign
  • Content Amplification
  • Content Monitoring