Call Us : +91 80 22206130, +91 80 22206131

Information Security Solutions

Peak XV’s Information Security Service Suite is a comprehensive solution using best practices conforming to global standards.

Peak XV Services include:

Security Management Practices

Peak XV Security Team is composed of certified professionals and experts in the field of security. The Peak XV Security Team will

  • Evaluate the adequacy and completeness of the overall information security system in your organization
  • Evaluate security documentation, including security policies
  • Review roles and responsibilities
  • Build incident response teams
  • Review procedures pertaining to IT operations
  • Review the efficiency and adequacy of emergency plans

The Security Team's review also covers change management, configuration management, access controls, physical security, and communications infrastructure.

Vulnerability & Risk Assessment

Denial of Service attacks, viruses, and network penetration hacks can jeopardize millions of dollars’ worth of infrastructure, and result in substantial losses to intellectual property, business operations, and employee productivity. Knowledge of the risks and threats to your network is a business necessity for a client organization. Peak XV, with our knowledge and expertise, can recommend ways to eliminate vulnerabilities in your network. The Peak XV Threat Analysis Team will:

  • Analyze procedures for changing network configurations and creating accounts
  • Document every device on the network, including OS versions and patch levels, to identify possible security issues
  • Examine network systems, firewall architecture, and security policies
  • Determine vulnerabilities by using external probes and internal scans
  • Classify data, Analyze risk's involved, and Mitigate Risks

Penetration Testing

Peak XV Penetration Testing Team will use tools and techniques to expose the weaknesses in our client organization's security framework. Penetration testing is done from the external hacker's perspective. In security jargon, this is termed "Ethical Hacking." These tests reveal whether the security infrastructure in place is adequate, or if it has any loopholes.

Disaster Recovery & Business Continuity Planning

This involves:

  • Business Impact Analysis
  • Formulating a Plan
  • Design and Implementation Testing

Security Audits

Peak XV Audit Team consists of Certified Information Systems Security Professionals (CISSP), and experts who have proven experience and knowledge in the Information Security field. The team shall survey the existing infrastructure and will perform an extensive evaluation of the customer organization’s information systems. The Audit Team will report on the existing state of the customer organization’s information systems security framework, detailing the vulnerabilities, associated risk levels, and suggested remedies.

Our audit methodology uses four phases :

Survey phase : During this phase, the Audit Team will interact with members of the customer organization and survey their existing security infrastructure. The customer will provide the Audit Team with details about their organizational procedures. The customer is also given a comprehensive list of questionnaires to evaluate their organization’s compliance with industry standard security practices.
Probing phase : During this phase, the Audit Team will perform an extensive evaluation of the customer organization’s information systems, analyzing them for vulnerabilities. Probing is again performed in two stages.
Analysis Phase : During this phase, the Audit Team will analyze the data collected from the previous two phases, evaluating the risk levels and compliance with industry standard security practices.
Reporting phase : During this phase, the Audit Team will report on the existing state of the customer organization’s information systems security framework, detailing the vulnerabilities, associated risk levels, and suggested remedies. The deliverables for this phase are:

  • Network topology and security effectiveness report
  • Operating systems, services, and patch levels report
  • Security Infrastructure effectiveness report
  • Vulnerability analysis and possible exploits report
  • Procedural security effectiveness report
  • Physical security effectiveness report
  • Gap analysis report