View
Sorting
Products found: 14
achelos IoT
AppSec Labs Internet of Things (IoT) Security
- Local device (sensors and/or controllers)
- Mobile apps (iOS and Android)
- Cloud APIs
- Management website
- Multiple entities and identities
- Multiple authentications in one product
- Non-common protocols
- Device initialization (network connection and pairing)
- Mobile ⇔ device communication
- Protecting client-side code (mobile apps and device)
BDO Audit Services
- Audit of financial statements prepared in accordance with IFRS, GAAP USA and NAS of Ukraine. Additional value of our services lies in the fact that we make recommendations regarding confirmation of accuracy and reliability of financial and management information concerning the company’s management activity; financial control for business improvement
- Audit of financial statements and maintenance of a company when going public (London Stock Exchange, German Stock Exchange, Warsaw Stock Exchange, Swiss Stock Exchange and others).
- Preparation of an integrated report
- Estimation of state and optimization of the internal control system.
- Organization of the Internal audit system.
- Organization of the managerial control system.
- Evaluation of change in the law effect on financial position and operating results of the company
- Analysis of forming and change of statutory capital compliance with legislation requirements and local acts of the company
- Bond issue consulting
- Consulting on application of regulatory legal and other acts of public authorities (including the National Bank of Ukraine, Ukrainian Stock Exchange, and Ministry of Finance of Ukraine)
- Consultations on the development and implementation of reporting methodology in accordance with IFRS
- International audit
- Reliability of accounts receivable and payable recognized in the accounting and reporting
- Confirmation of the accuracy and reliability of financial and managerial information
- Unification of the financial control system according to national and international financial reporting standards
- Assistance in preparation of public joint stock companies financial statements, drawn up in accordance with International Financial Reporting Standards for the provision of the State Commission on Securities and Stock Market.
- Audit of financial statements of public corporations, prepared in accordance with National Regulations (Standards) of Accounting and IFRS for the provision to the State Commission on Securities and Stock Market.
CIOneer BUSINESS SOLUTIONS
- Business audit
- Finance assessments & modeling
- Supply Chain & modeling KPI
Our customers get a number of measurable and non-measurable benefits:
- Reducing IT TCO (total cost of ownership)
- Maximizing the value of IT investments
- Providing a holistic IT approach
- Increasing the level of IT processes maturity
- Making IT transparent and measurable
- Managing IT risks
- Building long-term business solutions based on the right technology
You need our services if:
- Your investments in IT are not linked to company profit, savings or costs avoidance
- Your IT does not speak business language
- You do not have an answer to 2 or more questions below:
- What value in $ has IT delivered over the last 12 months?
- What was the TCO of your company during the last 3 years?
- When was the last IT customer survey conducted?
- How many IT tickets / incidents were reported last month?
- What is the ROI for the key IT projects?
CIOneer BUSINESS TRANSFORMATION
- Profit opportunities for the business
- Correspondence between business and IT processes
- Growth and optimization opportunities
- IT innovations
- Reducing IT TCO (total cost of ownership)
- Maximizing the value of IT investments
- Providing a holistic IT approach
- Increasing the level of IT processes maturity
- Making IT transparent and measurable
- Managing IT risks
- Building long-term business solutions based on the right technology
- Your investments in IT are not linked to company profit, savings or costs avoidance
- Your IT does not speak business language
- You do not have an answer to 2 or more questions below:
- What value in $ has IT delivered over the last 12 months?
- What was the TCO of your company during the last 3 years?
- When was the last IT customer survey conducted?
- How many IT tickets / incidents were reported last month?
- What is the ROI for the key IT projects?
CIOneer CIO as a service
- Building IT model
- Management of IT
- IT catalogue
- IT structure
- IT costs optimization
- Development of customers head of IT
Our customers get a number of measurable and non-measurable benefits:
- Reducing IT TCO (total cost of ownership)
- Maximizing the value of IT investments
- Providing a holistic IT approach
- Increasing the level of IT processes maturity
- Making IT transparent and measurable
- Managing IT risks
- Building long-term business solutions based on the right technology
You need our services if:
- Your investments in IT are not linked to company profit, savings or costs avoidance
- Your IT does not speak business language
- You do not have an answer to 2 or more questions below:
- What value in $ has IT delivered over the last 12 months?
- What was the TCO of your company during the last 3 years?
- When was the last IT customer survey conducted?
- How many IT tickets / incidents were reported last month?
- What is the ROI for the key IT projects?
CTP Digital Innovation Solutions
Delve Risk Cybersecurity and Management Consulting
- Security Product & Strategic GTM Approach
- Board of Advisor Empowerment
- Executive Level Business Development
- Executive Advantage
- Strategic Security Roadmap & Assessment
- Security Product Rationalization
- Technology Product & Solution Interface
Kays Harbor Software Development
Pondurance Enterprise Security Testing
Enterprise Security Testing Service Offerings:
Vulnerability Testing & Assessment – Vulnerability testing and assessments examine the underlying systems and resources that make up the infrastructure. Team searches for vulnerabilities and weaknesses that may put the enterprise environment at risk. The vulnerability assessment will provide an organization with the discovery, analysis, and controlled exploitation of security vulnerabilities that are accessible from external and internal sources. Identified vulnerabilities are validated through both manual and automated processes to eliminate false positive findings. Penetration Testing: Penetration tests help to truly quantify the impact of a real-world security incident or an attack against your environment. Leveraging the same tools and techniques as an attacker, penetration testing activities are performed to fully assess the effectiveness of the organization’s controls. Pondurance approaches penetration testing in a controlled manner by first coordinating with client personnel to identify the goals and objectives of the test, establishing rules of engagement, and expected end results. From an availability perspective denial-of-service (DoS) conditions are never intentionally pursued in penetration testing engagements. Finally, Pondurance consultants maintain constant communication via our secure portal so that everyone is aware of the activities as they unfold and are completed. Secure Configuration Review: Pondurance reviews operating systems and network devices for configuration settings that align with industry best practices and vendor-recommended guidelines. Security Architecture Review: This activity reviews a comprehensive list of the organization’s technical and strategic information security requirements, such as network design, access controls, environment assets, remote access, and monitoring, alerts, and reports of the underlying infrastructure. The architecture is then compared against best practices or requirements and any improvements or gaps are documented with recommendations to assist with alleviating the current risk. Physical Security Testing: This service penetrates the physical security of a targeted facility through the identification of gaps and/or weaknesses in the facility’s physical security controls. This service includes the manipulation of locks, identification systems, and entryways. Social Engineering: Social Engineering identifies gaps in your employee information security awareness training and pinpoints what changes to your business’s culture will need to be made to continue to conduct business in the modern world. Based on these needs, the following social engineering tests are available:- User Based: This uses various electronic communication mediums (email, telephone, social networking, etc.) to take advantage of the environment’s users in order to gain access to sensitive information or targeted data. Common scenarios include coordinated pre-texted calling scenarios and targeted email phishing campaigns.
- Physical Based: A physical based social engineering test takes advantage of weaknesses in the physical security and your user’s security awareness training to attempt to gain unauthorized access to the facility and sensitive data assets.
Securicon Technical Consulting Services
Consulting services at Securicon are supported by a large group of skilled, highly-accomplished security professionals. These team members are driven to excel, constantly looking for new methodologies and techniques to help our customers prevail in the technical security arena. With decades of combined experience, the Securicon team has valuable insight into real-world strategies – which in turn ensures real-world success.
Comprehensive Security Services
The Securicon team includes both IT and Operational Technology (OT) engineers. These experts practice across a wide spectrum of professional security services, allowing experiences gained in one discipline to assist in solving problems in another.
Technical Consulting Services include:
- Vulnerability Assessments – Identifying and prioritizing weak spots to protect mission-critical processes
- Penetration Assessments – Figuring out where unauthorized access can occur and how it can happen
- Security Architecture Review & Design – Establishing strategies with strong, effective security controls
- Social Engineering Assessments – Highlighting weaknesses in internal training and procedures
- Staff Augmentation – Enhancing our clients’ teams with Securicon expertise
Teamvoy Software Development
ИТ-аудит by IT Solutions
- Эффективность – актуальность информации, соответствующего бизнес-процесса, гарантия своевременного и регулярного получения правильной информации.
- Продуктивность – обеспечение доступности информации с помощью оптимального (наиболее продуктивного и экономичного) использования ресурсов.
- Конфиденциальность – обеспечение защиты информации от неавторизованного ознакомления.
- Целостность – точность, полнота и достоверность информации в соответствии с требованиями бизнеса.
- Пригодность – предоставление информации по требованию бизнес-процессов.
- Согласованность – соответствие законам, правилам и договорным обязательствам.
- Надежность – доступ руководства организации к соответствующей информации для текущей деятельности, для создания финансовых отчетов и оценки степени соответствия.
- Оценить соответствие ИС требованиям бизнеса, выявить недостатки и упущения
- Эффективно планировать развитие ИС организации;
- Обоснованно решать проблемы безопасности и контроля;
- Обоснованно приобретать или модернизировать аппаратно-программные средства;
- Планировать повышение квалификации сотрудников ИТ-подразделений.
УПРАВЛЯЕМАЯ БЕЗОПАСНОСТЬ
Мы занимаемся аудитами, оценкой, внедрением, сертификацией, обучением, мониторингом, расследованиями и восстановлением информационной безопасности организаций, сетей, приложений и веб-сайтов
УПРАВЛЯЕМАЯ БЕЗОПАСНОСТЬ
Внедрение ISO 27001, КСЗИ
Внедрение PCI DSS, GDPR
Внедрение VDA, TISAX
Удалённый менеджер безопасности
Тренинги и обучение
Тренинг для пентестеров
Управление рисками
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.