Information Security
In today's competitive business environment,
information security plays an important role in protecting vital
organizational assets. IDC observes that leading enterprises are
keenly exploring initiatives in security systems and looking at
solution providers to help them comprehend the risks inherent
in information security and subsequently get them to develop strategies
to address those risks. IDC forecasts that by the year 2007, the
demand for information security services will increase by more
than US$ 23.5 billion.
Tata Infotech's portfolio of security solutions
includes encryption and Public Key Infrastructure (PKI) security
products. We provide customers with consulting services and security
solutions. In addition, we have also collaborated with partners
in different areas of security. Domain experts with extensive
industry background make it easier to understand and translate
security requirements into solutions that best fit an organization's
business requirements.
Tata Infotech's solutions:
Tata Infotech also provides a time-cost-risk optimal security solution
taking into consideration the risks and security postures of individual
organizations.
Offerings
Consulting Services
- Information Security Strategy Consulting
- Compliance to appropriate regulatory framework. For example,
the security requirements as stated in RBI regulations
- Risk Assessment
- Information Security Policy
- Business Continuity/Disaster Recovery Plan
- Assessment and Certification through partners for
- BS 7799 (ISO 17799)
- HIPAA
- Systems Audit
- Physical Security Audit
- Application Software, Database and Operating System Security
Audits
- Telecommunications and Network Security Audit
- Business Process Re-engineering
- Management Systems Security Architecture
Technology Solutions
- Security design, development, implementation, review, training
and support for application software
- Information Security Assurance
- Software Security Architecture
- Network Security Architecture
- Software and Network Security Monitoring and Management Outsourcing
- Security and Network product implementation and customization
support
- Authentication Solutions
Products
- FORTIORA™ CSAR™ (Certificate Server, Access Repository)
- FORTIORA™ SCOUT™ (Security Components and Utilities
Toolkit)
- FORTIORA™ DEFT™ (Data Encryption for Transmission)
- FORTIORA™ DEFT™ Personal (Desktop application supporting
file, folder and disk level encryption and shredding)
Partners
|