Cyber Security Consulting

AlphaNova helps organizations manage cybersecurity risks at any stage: identifying vulnerabilities through gap analysis and risk assessment; implementing best practices to avoid compromise; and recovering from cybersecurity attacks.

Cyber Security Advisory Services

Cyber Advisory Services

  • Security & Risk Assessments
  • Vulnerability Scanning
  • Penetration Testing
  • Log Configuration Review

Cyber Security Incident Response Plan

  • CSIRP Creation & Testing
  • Gap Analysis Services
  • Capability Analysis

Information Security Policy Creation

Security Awareness Training

Application Code Review

Remediation Implementation

Project Overview

Cyber Security Audit and Recovery for Compromised Large Public Sector Organization

Scope of Work

  • Investigate the affected systems to determine the level of compromise, affected areas and attack vectors
  • Decide if the investigated system is safe to use
  • Prioritise subsequent activities
  • Data Collection
  • Identify Data Sources
  • Acquiring the Data
  • Examination
  • Analysis
  • File Data Analysis
  • OS Data Analysis
  • Network Data Analysis
  • Application Data Analysis
  • Detection and Analysis
  • Attack vectors
  • Incident symptoms
  • Reporting
  • Recommendations

Project

Environment

  • Microsoft
  • RedHat
  • Ubuntu
  • Oracle Linux
  • Cloud Infrastructure with 60 virtual machines

Tools

  • Kali Linux
  • Lynus
  • OpenVAS
  • RKHunter
  • Proprietary Scripts

Project Duration

  • 3 months

Project Team

  • 3 Senior Linux Cyber Security Consultants
  • 5 Senior Windows/ Microsoft Cyber Security Consultants

Next Steps

  • Implement the Linux remediation plan as per the recovery plan
  • Support the rebuild or implant removal as defined by the recovery plan
  • Documentation

Project Overview

Cyber Security Audit and Recovery for Compromised Large Education Institution

Scope of Work

  • Investigate the affected systems to determine the level of compromise, affected areas and attack vectors
  • Decide if the investigated system is safe to use
  • Prioritise subsequent activities
  • Data Collection
  • Identify Data Sources
  • Acquiring the Data
  • Examination
  • Analysis
  • File Data Analysis
  • OS Data Analysis
  • Network Data Analysis
  • Application Data Analysis
  • Detection and Analysis
  • Attack vectors
  • Incident symptoms
  • Reporting
  • Recommendations

Project

Environment

  • Microsoft
  • RedHat
  • Ubuntu
  • Oracle
  • Cloud Infrastructure with 1,300 virtual machines

Tools

  • Kali Linux
  • Lynus
  • OpenVAS
  • RKHunter
  • Proprietary Scripts
  • Puppet
  • Satellite

Project Duration

  • 6 months

Project Team

  •  5 Senior Cyber Security Linux Consultants
  • 7 Senior Cyber Security Windows Server Consultants

Next Steps

  • Implement the Linux remediation plan as per the recovery plan
  • Support the rebuild or implant removal as defined by the recovery plan
  • Documentation

Cloud & Mobile Apps

Enterprise Solutions

IT Professional Services

Cyber Security Consulting

Digital Transformation Consulting

Digital Intelligence

Drive innovation and accelerate your company’s growth through AI, Big Data and Robotic Process Automation.

Business Consulting

Alphanova works with you to understand your key strengths, your goals and objectives and define where your opportunities lies.

Seems like a right fit? Get in touch with our experienced Consultants