Security and Continuity

Vulnerability Analysis

Vulnerability Analysis addresses identifying and exposing failures and vulnerabilities present in an IT environment, mapping its origins, and reasoning to report them to the relevant section. The goal is to solidify the IT infrastructure and make it less susceptible to errors.

Vulnerability Analysis

Main actions of the vulnerability analysis:

  • Discovery and inventory of assets
  • Analysis of the ISO 27000 compliance checklist
  • Identification of risks and impacts
  • Vulnerability checklist application
  • Gap Analysis Report
  • Action Plans with immediate, short-, medium- and long-term initiatives
  • Prioritized roadmap of the plan actions

Information Security Assessment

With this type of implementation, Indyxa applies governance in its security management, bringing indicators and implementing policies and processes related to information security.

The main goal of the Information Security Management System is to prepare the company to protect its data, the most valuable assets of modern companies, threats and vulnerabilities.

The SGSI aims to seek the confidentiality, integrity and availability of the business, thus increasing the maturity of the company's information security.

Information Security Assessment

Benefits:

  • Meet the business requirements for information security.
  • Monitor events and conditions that may affect the business.
  • Respond promptly to adverse situations of Information Security incidents.
  • Meet internal and external audits and implement controls for Cyber ??Security.
  • Improved security maturity for IT processes and critical business support.
  • Control of assets and sensitive data.
  • Improved expectation for the practice of information security.
  • Real competitive differential in global information security attacks.

Implementation of Information Security Governance.

With this type of implementation, Indyxa applies governance in your security management, bringing indicators and implementing policies and processes related to information security.

The main goal of the Information Security Management System is to prepare the company to protect its data, the most valuable assets of modern companies, threats and vulnerabilities.

The SGSI aims to seek the confidentiality, integrity and availability of the business, thus increasing the maturity of the company's information security.

Implementation of Information Security Governance.

Benefits:

  • Meet the business requirements for information security
  • Monitor events and conditions that may affect the business.
  • Respond promptly to adverse situations of Information Security incidents.
  • Meet internal and external audits and implement controls for Cyber ??Security.
  • Improved security maturity for IT processes and critical business support.
  • Control of assets and sensitive data.
  • Improved expectation for the practice of information security.
  • Real competitive differential in global information security attacks.

Disaster Recovery Plan - DRP

The service includes asset management, physical and logical environments, access control, incident management and more.

The Disaster Recovery Plan is a series of procedures aimed at the continuity and integrity of the IT infrastructure in the event of a disaster, whether natural or man-made.

Disaster Recovery Plan - DRP

Indyxa is a company with proven ability to identify risks and impacts (RIA) and map them to critical business functions (BIA). Our expert team evaluates the effectiveness of current contingency plans, verifies the recovery time of the current RTO environment, the point in time of recovery (loss of data) RPO, and defines strategies for RTO and RPO to be effective at business. Our contingency specifications include architecture on premise and / or cloud (DRaaS).

Opportunities through strategic alliances