www.niiconsulting.com
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
URL:
https://www.niiconsulting.com/
Submission: On September 06 via api from AE — Scanned from NL
Submission: On September 06 via api from AE — Scanned from NL
Form analysis
0 forms found in the DOMText Content
* Home * Solutions * Firesec * Application Whitelisting * Two Factor Authentication (2FA) * Database Activity Monitoring * Data Leakage Prevention * Privileged Identity Management * Information Rights Management * Mobile Device Management * Next Generation Firewalls * Server Hardening * Web Application Firewalls * Web Application Security * Wireless Security * Security Incident & Event Management * Source Code Analysis * Services * Managed Security Services * MDR Services * SOC Design * Anti-Phishing * Managed Detection as a Service * Threat Hunting * Cybersecurity for SMEs * Ransomware Readiness Assessment Services * Data Privacy Services * IAM Services * ICS Security * Cloud Security * Payment Security * PCI DSS QSA * PA DSS * BCMS * Assessment * Red Team Assessment * Application Security * Mobile Security Testing * SCADA and ICS * Telecom Security * Sharepoint Security * Source Code Review * Network Audit * Wireless Auditing * Security Audit * Penetration Testing * DDoS Simulation * Spear Phishing * War-Game Assessment * Security Compliances * ISO 27001 * Risk Assessment * Security Awareness * ISO 20000/ITIL * Security Metrics * COBIT Framework * HIPAA * Remediation * Server Hardening * Network Redesign * Endpoint Security * Application Redevelopment * Active Directory and Group Policy Implementation * Breach Response * Compromise Assessment * Digital Forensics * Financial Fraud Risk Management * Trainings * Training * Certified Web Application Security Professional (CWASP) * Certified Payment Security Practitioner (CPSP) * Certified Professional Forensics Analyst (CPFA) * Certified Data Privacy Practitioner (CDPP) * Certified Information Systems Security Professional (CISSP) * Certified DevOps Security Practitioner (CDSP) * Secured Cloud Computing Practitioner (SCCP) * Certified Threat & Malware Analyst (CTMA) * Certified Security Operations Center Practitioner (CSOCP) * Certified Mobile Application Security Professional(CMASP) * Resources * Webinars * Blog * Security Advisories * Annual Report * Annual Report 2019 * Annual Report 2021 * Books * Whitepapers * Indian Personal Data Protection Bill * DevSecOps - A Concept note * Evolving Role Of CISO * NCA ECC Framework * The great Aussie PII: The latest Attacks on Aussie Businesses * Comparing Certain Privacy Laws * Compromise Assessment * Digital Forensics and Incident Response * ISO 27001 [ISMS] * SAMA Framework * GDPR_Compliance_Australia * NSA Cloud Defence * SOC Maturity Assessment * Blog * Company * Management Team * Press Centre * Clients * Careers * Hall Of Fame * CSR Policy * Contact Us * Network Intelligence Acquires Services Business of Ilantus Technologies Learn More * We help you achieve TRANSILIENCE through ADVISE Explore More * Cloud Security Gain superior visibility, protection & control access across the expanded cloud attack surface. GET STARTED * Critical Infrastructure Security Be prepared and respond to serious incidents that involve the critical infrastructure of a region or nation. Explore More! * Trainer-led hands-on online courses August 2023 Learn More ABOUT NETWORK INTELLIGENCE We are a global cybersecurity provider founded in 2001 with more than 550 team members working out of our New York, Amsterdam, Sydney, Riyadh, Dubai, Mumbai, and Singapore offices. We offer cybersecurity services using a comprehensive framework – ADVISE. The ADVISE framework empowers us to Assess, Design, Visualize, Implement, Sustain, and Evolve your cybersecurity posture as a long-term partner to your organization. We serve customers across industry verticals such as Banks and Financial Services, Technology and Media, Oil & Power, Airlines, E-commerce, Retail, Healthcare etc. We believe that cybersecurity is not a destination, it is a journey and we partner with our clients to address the dynamic cybersecurity threat landscape. Explore More OUR CLIENTS Our awesome clients we've had the pleasure to work with! -------------------------------------------------------------------------------- WHAT WE DO PCI DSS We are a PCI Qualified Security Assessor (QSA) and provide consulting and assessment services to clients globally. Our consultants also assist with compliance to PA-DSS, PTS and other security requirements for payment companies. ISO 27001 We offer a comprehensive methodology for implementing and maintaining an ISO 27001-based information security management system within your organization. CLOUD SECURITY The adoption of cloud computing is an inevitable part of every company's digital transformation journey. Our experts help organizations move to the cloud while still ensuring risk is addressed and legal and regulatory requirements are complied with. CRITICAL INFRASTRUCTURE Attacks on Industrial Control Systems (ICS) have been on the rise and the convergence of IT and OT with the advent of Industrial Internet of Things (IIoT) is increasing the attack surface. Our ICS Security practice helps identify vulnerabilities and build a structured cybersecurity framework for your OT environment. DIGITAL FORENSICS Our Digital Forensics and Incident Response team has been involved in investigating some of the most high-profile breaches in recent years. Be it attacks on SWIFT, ATMs, Internet Banking, Email Fraud, Mobile Forensics, we have investigated many different types of systems and technologies. RED TEAM ASSESSMENTS The best way to test the security posture of your organization is to conduct an adversary simulation exercise. Our red team assessments cover various scenarios leveraging social engineering, creation of fully undetectable malware, setting up customized C&C servers, and reaching targets while trying to be undetected by the blue teams. MANAGED SERVICES From our Global Security Operations Center in Mumbai, Delhi & Dubai, we offer managed security services covering 24/7 security monitoring, incident response, brand monitoring and site takedown, vulnerability management, and threat intelligence. Our partnerships with security technology leaders such as IBM, Qualys, and Tenable ensure clients get state-of-the-art security without prohibitive capex investments. BUSINESS CONTINUITY MANAGEMENT Our Business Continuity Management and Disaster Recovery services are based on industry-leading standards such as ISO 22301. We provide the entire gamut of services, right from gap assessments, policy and procedure documentation, risk assessments, business impact analyses, and development of disaster recovery procedures as well as inputs to select the right DR technologies for your data centre. APPLICATION SECURITY Be it DevSecOps, Threat Modeling, or Secure Code Reviews, we have one of the most comprehensive Application Security programs to address all aspects of a secure SDLC. This is one of our largest teams and the technology landscape covered by our assessment team members includes web, client-server, kiosk-based, embedded code, APIs, containerized microservices, etc. 2022 BY THE NUMBERS -------------------------------------------------------------------------------- 48%% Y-O-Y Growth in Revenue 38%% Increase in Employee Headcount 12 GDPR Projects 150%% Increase in Cloud Security Projects 62%% Increase in MSSP Business Amongst the daily humdrum of various roles, responsibilities and activities; would like to take a pause and place on record a word of appreciation for the unstinted support provided by your team deployed for the security assessment engagement. They have adapted to the working environment and contributed towards sustaining the work process including active support in non-working hours (when called for). HDFC Bank Their Mumbai team has significantly contributed to complete all the light reviews for Grandfather project. One of the milestones in the GF program. We thank you for all your efforts to meet secArch commitments. Morgan Stanley On behalf of the ICT department in NCEMA, we would like to extend our appreciation and gratitude for your services and support in achieving the Information security CSA & Risk Management project. You have done a splendid job and been very professional. Your work ethics are a real treat. NCEMA, UAE You have been very helpful and professional in designing the entire audit, thoroughly finding the gaps, helping us in closure of each and every gap and then conducting the post gap assessment audit. It was an extremely well done exercise. Every feedback that you gave for our various processes were very useful to us in maintaining the compliance and security of the project. Your deep understanding of PCI in particular and Information Security in general is commendable. Birlasoft, India We would like to thank you for your support in Gap analysis and completion of audit smoothly. During the complete audit we found Network Intelligence team to be very supportive and cooperative which lead the audit completion in time . Once again thanks for getting successful Audit. Jumio We are extremely happy with the way Network Intelligence team has performed exceptionally well in Red Team Assessment by showing great sense of dedication towards identification, follow-up and closure of vulnerabilities. It's a pleasure to have these guys in ICICI. Their professionalism and great work ethics are a matter of appreciation. ICICI Bank OUR JOURNEY -------------------------------------------------------------------------------- * 2005 - 2006 * 2007 - 2008 * 2009 - 2010 * 2011 - 2012 * 2013 - 2014 * 2015 - 2016 * 2017 - 2018 * 2020 - 2021 * 2022 - 2023 2003 Successfully developed first set of automation tools to differentiate service offerings. Acquired first US based customer. 2005 Executed first international project for Dubai Stock Exchange. 2007 Presented on Detection & Evasion of Web Application Attacks at Blackhat conference Awarded ISO 27001 2008 Training operations started 2009 Middle East operations commenced 2011 GRC practice started. 2014 SOC operations commenced 2015 Network Intelligence became PCI DSS QSA Tied up with IBM & Microsoft as security partner 2016 Launched Insights, a Security Analytics Platform. 2017 Merged the consulting practices Torrid Networks with NII Singapore operations started 2018 Raised $5mn from Helix Investments MSSP business trebles Y-o-Y. Flagship product Firesec launched. 2020 SOC setup in KSA Launched cybersecurity services for Remote Workforce 2021 Received PCI Forensic Investigator License for USA & Canada 2022 Setup dedicated Rail SOC 2023 Entered IAM space by the acquisition of Ilantus Business Services Setup Entity in Qatar OUR BLOGS Data Privacy Augest 18, 2023 0 Comments THE DIGITAL PERSONAL DATA PROTECTION ACT, 2023 Ministry of Electronics and Information Technology (MeitY) introduced the Digital Personal Data Protection (DPDP) Bill, 2023, marking it the fifth iteration.. Read More Cyber Finance July 04, 2023 0 Comments BUILD CYBER RESILIENCE WITH THE RIGHT INSURANCE COVER In today’s interconnected world, where digital threats are on the rise, protecting your organization’s sensitive data and online assets is more critical than ever.. Read More Data Privacy January 09, 2023 0 Comments DIGITAL PERSONAL DATA PROTECTION BILL 2022 The group consisted of several individuals from different industrial sectors like Fintech, Cybersecurity Consulting, Auditing, Marketing etc... Read More COMPANY DETAILS * New York | Amsterdam | Sydney | Dubai | Riyadh | Mumbai | Bengaluru | Singapore * info@niiconsulting.com * * * * * * QUICK LINKS * Tune into our Podcasts * About * Contact * Home * Blog * Services * Security Advisories LATEST FROM OUR BLOG Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products Feburary 16, 2022 Technology The Supply Chain Cybersecurity Saga: Challenges and Solutions Feburary 28, 2022 Technology 5 Cybersecurity lessons to learn from Stranger Things May 27, 2022 Technology FOLLOW US ON TWITTER Copyright © 2023. All Rights Reserved by Network Intelligence 1 We are an end-to-end Cybersecurity Solution Provider. Are you looking for one? × Loading...