Tata Infotech
Tata Infotech

Information Security

In today's competitive business environment, information security plays an important role in protecting vital organizational assets. IDC observes that leading enterprises are keenly exploring initiatives in security systems and looking at solution providers to help them comprehend the risks inherent in information security and subsequently get them to develop strategies to address those risks. IDC forecasts that by the year 2007, the demand for information security services will increase by more than US$ 23.5 billion.

Tata Infotech's portfolio of security solutions includes encryption and Public Key Infrastructure (PKI) security products. We provide customers with consulting services and security solutions. In addition, we have also collaborated with partners in different areas of security. Domain experts with extensive industry background make it easier to understand and translate security requirements into solutions that best fit an organization's business requirements.

  • End-to-end coverage ranging from assessment and implementation to managed services, including certification
  • Technology expertise with domain knowledge
  • Certified Security and Network professionals
  • World class products through partnerships and skills built around the products
  • Proven Assessment and Implementation methodologies
  • Expertise from executing a variety of projects across industries

Tata Infotech also provides a time-cost-risk optimal security solution taking into consideration the risks and security postures of individual organizations.


Consulting Services

  • Information Security Strategy Consulting
    • Compliance to appropriate regulatory framework. For example, the security requirements as stated in RBI regulations
    • Risk Assessment
    • Information Security Policy
    • Business Continuity/Disaster Recovery Plan
  • Assessment and Certification through partners for
    • BS 7799 (ISO 17799)
    • HIPAA
  • Systems Audit
    • Physical Security Audit
    • Application Software, Database and Operating System Security Audits
    • Telecommunications and Network Security Audit
  • Business Process Re-engineering
    • Management Systems Security Architecture

Technology Solutions

  • Security design, development, implementation, review, training and support for application software
    • Information Security Assurance
  • Software Security Architecture
  • Network Security Architecture
  • Software and Network Security Monitoring and Management Outsourcing
  • Security and Network product implementation and customization support
  • Authentication Solutions


  • FORTIORA™ CSAR™ (Certificate Server, Access Repository)
  • FORTIORA™ SCOUT™ (Security Components and Utilities Toolkit)
  • FORTIORA™ DEFT™ (Data Encryption for Transmission)
  • FORTIORA™ DEFT™ Personal (Desktop application supporting file, folder and disk level encryption and shredding)


  • Cisco
  • Trend Microsystems