ADHOC SERVICE

A. VULNERABILITY ASSESSMENT & PENETRATION TESTING (VAPT)

A vulnerability assessment is the process of identifying and quantifying known security vulnerabilities in an environment. It is a surface-level evaluation of your information security posture, indicating weaknesses as well as providing the appropriate mitigation procedures required to either eliminate those weaknesses or reduce them to an acceptable level of risk.

A penetration test simulates the actions of an external and/or internal cyber attacker that aims to breach the information security of the organization. Using many tools and techniques, the penetration tester attempts to exploit critical systems and gain access to sensitive data.

B. AUDIT & COMPLIANCE SERVICE

A comprehensive review of an organization's adherence to regulatory guidelines. Audit reports evaluate the strength and thoroughness of compliance preparations, security policies, user access controls and risk management procedures over the course of a compliance audi

C. RED TEAMING

A red team assessment is a goal-based adversarial activity that requires a big-picture, holistic view of the organization from the perspective of an adversary. This assessment process is designed to meet the needs of complex organizations handling a variety of sensitive assets through technical, physical, or process-based means.

The purpose of conducting a red teaming assessment is to demonstrate how real world attackers can combine seemingly unrelated exploits to achieve their goal.

D INCIDENT HANDLING & RESPONSE

Incident response. It is a set of technical activities done in order to analyze, detect, defend against, and respond to an incident. It is a part of the incident handling and incident management process. It is often used in synchrony with the term incident handling

E. SOURCE CODE REVIEW

Secure code review is a manual or automated process that examines an applicationʼs source code. The goal of this examination is to identify any existing security flaws or vulnerabilities.

F. ROBOTIC PROCESS AUTOMATIONS

Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software.

G. BUG BOUNTY SERVICES

A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.

H. SECURITY H MONITORING TEAM

Tjakrabirawa will provides Layer 1 2 or 3 Analyst to manned the existing client Security Operation Centre.

I. SECURITY CHAMPION DEVELOPMENT

Tjakrabirawa will train pool of security champion to help with the development and implementations of DevSecOps Culture in the client premises

J. TRAINING & SECURITY AWARENESS PROGRAM

Consult, Design, and Implementing Database Security to adhere with GDPR and future PDP regulations to provides a centralized location for documenting and managing the relevant aspects of the meta information pertaining to the personal information your organization collects both internally (e.g., from employees) and externally (e.g., from customers).

L. PASSWORDLESS AUTHENTICATIONS

Tjakrabirawa will provides you with Consultation, Design and Implementation of a multi-factor authentication that's passwordless, meaning you will be able to verify a userʼs identity without usernames, OTPs, SMS or typing of any kind.

M. ZERO TRUST

Tjakrabirawa will provides you with Consultation, Design and Implementation of a security framework requiring all users, whether in or outside the organizationʼs network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

FEELING INSECURE?
CONTACT US

Address

PT. Tjakrabirawa Teknologi Indonesia Manhattan Square
Jalan TB Simatupang Kav 15 125489 Jakarta Selatan

 

Telephone

021 – 80641090

 

1StopCyberSolution

0821 – 1247 – 6992

 

Email

info @tjakrabirawa.id

 

Web

www.tjakrabirawa.id