Clients

Clients of Indian Cyber Security Solutions

 

Clients of Indian Cyber Security Solutions

 

 

 

 

Odisha State Pollution Control Board

Odisha State Pollution Control Board

 

 

About the Client

Our Client is Odisha State Pollution Control Board

 

The Challenge

Web Application Penetration Testing.

Odisha State Pollution Control Board uses a software – web based application. This measures the emitting level of pollution from the factories. Govt cancels the licence of the factories with a high level of emission by the industrial norms. The real time data reach to the server by the devices that are installed in the industry and Govt can check the data from the software. Our information security professional (Penetration Tester ISO 27001) were asked to undergo a thorough manual and tool based vulnerability assessment of the application.

 

The Solution

The Indian Cyber Security Solutions was ready to perform web based penetration testing of the software. Non-Disclosure-Agreement (NDA) was processed between both the parties. As per the work agreement Indian Cyber Security Solutions was ready to take the challenge and complete the work within 14 working days.

The security assessment which were processed are as follows:

 

1)The Entire website was scanned to test the vulnerability alongwith the Manual testing in the first phase. It was performed within 3 days.

2)During the VAPT some critical level of vulnerabilities were identified such as ‘sqlinjection’, ‘crosssite scripting’ etc. by using various penetration testing tools.

3)The Developers of the company were informed to patch that vulnerabilities.

4)Retesting has been done for the software and further no vulnerability were found.

Indian Cyber Security Solutions technical team was ready with the final report alongwith the security certificate which they handed over the client within the deadline.

 

The Deliverables

The customized reports was provided to the Client as per their requirements the details are mentioned below:

  • Executive Presentation: Overview of the entire application, the vulnerabilities found and the recommendations were made to mitigate the threats identified on the software.
  • Detailed Technical Report: Detailed Technical Report has been generated on the basis of Proof-of-Concept, detailed exploitation of all the identified vulnerabilities.
  • Excel Tracker: Vulnerability tracker aimed at helping the IT assets owner keep track of the vulnerabilities, remediation status, action items, etc.

 

The Benefits

The benefits are discussed below by conducting thorough security tests and identifying the vulnerabilities:

  • Risk Benefits: Risk management of the issue by finding the vulnerabilities and recommended solutions with proven methods to enhance security.
  • Cost Savings: Indian Cyber Security Solutions suggested Risk mitigation measures are cost effective based on client’s requirements.
  • Client Satisfaction: Web-Application Security Assessment was conducted with minimum interruption to identify security vulnerabilities, impacts and potential risks.

 

Testimonial

We are Very much satisfied with the service provided by Indian Cyber Security Solutions team. They are very dedicated team. We had a great experience with them. Meeting up the deadline is a rare talent which they have successfully achieved. We are looking forward to work more in future with them  

– Sabyasachi Satpathy

 

IRCTC

 

About the Client

IRCTC (Indian Railway Catering and Tourism Corporation) is a subsidiary of the Indian Railways that handles tourism and online ticketing operations of the Indian Railways.

The Challenge & Solutions

As being Ethical Hacker Indian Cyber Security Solutions Team had checked the Web Based Application of IRCTC and found some critical level of vulnerabilities like sql injection where anybody could access the database of IRCTC. ICSS Team reported to IRCTC to fix the vulnerabilities after identified the critical level vulnerabilities. IRCTC had acknowledged us to fix the vulnerabilities and the vulnerabilities are fixed now. You can refer to the Proof of Concept in the video given below:

 

 

 

 

 

C-Quel

C-Quel

 

About the Client

C-Quel has been providing shared services in India like as payroll solutions, including online tax calculator, multiple online utilities, online payslip, YTD payroll, online increment letter, employee help-desk & a host of customized and customer friendly solutions.

 

The Challenge

Web Application Penetration Testing

C-Quel a Pvt Ltd company established in kolkata Sec V was facing Web based application Security Challenge. They had to undergo a Web Application penetration testing to secure their Website. Our Web Application Penetration tester were asked to take up the challenge and secure the website by undergoing Web Application penetration testing. C-Quel Pvt Ltd was also applying for ISO 27001 certification during which they had to show internal audit report (VAPT) to the auditor to get the ISO 27001 certification for the company.

 

The Solution

Indian Cyber Security Solutions was ready to perform the Web based application penetration testing on their website. ISO 27001 lead auditor and Web Application Penetration tester were assigned to take up this challenge. The project was to be done in 3 stages and to be delivered within 20 working days.

The security assessment steps are as follows:

 

Stage 1:

The scope of work was defined by the client (C-Quel). The layout of the web application was share with Indian Cyber Security Solutions. NDA documents (Non-Disclosure-Agreement) signed between both the parties.

 

Stage 2: Risk Management & Mitigation

The 2nd Stage of risk management and mitigation has started, evaluating the key assets involve in the web application such as firewalls, IDS, IPS, routers and others. Few medium level vulnerabilities were found by Indian Cyber Security Solutions such as ‘CSRF (Cross-Site Request Forgery), ‘Cryptojacking etc.

 

Stage 3: Rectification as per suggestion

The 3rd stage which is the most important stage of the project as the client was suggested the rectification from Indian Cyber Security Solutions and the client had to patch up vulnerabilities as per the suggestion. The C-Quel web Developers were able to find out solutions as per the suggestion mentioned by the Indian Cyber Security Solutions team.

 

Stage 4: Final Assessment and VAPT project submission 

At the end of 12th working day C-Quel Web Developers had already patched the medium level vulnerabilities found by Indian Cyber Security Solutions team. The final stage of vulnerabilities assessment had begun as the  Indian Cyber Security Solutions team members had started retesting the web application as mentioned in the scope of work to find out all the medium level vulnerabilities which were found previously, and were patched and no high or medium level vulnerabilities prevail. Indian Cyber Security Solutions team was able to generate the VAPT report and handed over the document to the client alongwith the certificate. Indian Cyber Security Solutions team had again achieved and completed the assigned task within the stipulated time. Indian Cyber Security Solutions team had again showed high quality professionalism by meeting up the deadlines and living upto customer’s expectations.

 

The Deliverables

The customized reports was provided to the Client as per their requirements the details are mentioned below:

  • Executive Presentation: Overview of the entire application, the vulnerabilities found and the recommendations were made to mitigate the threats identified on the software.
  • Detailed Technical Report: Detailed Technical Report has been generated on the basis of Proof-of-Concept, detailed exploitation of all the identified vulnerabilities.
  • Excel Tracker: Vulnerability tracker aimed at helping the IT assets owner keep track of the vulnerabilities, remediation status, action items, etc.

 

The Benefits

The benefits are discussed below by conducting thorough security tests and identifying the vulnerabilities:

  • Risk Benefits: Risk management of the issue by finding the vulnerabilities and recommended solutions with proven methods to enhance security.
  • Cost Savings: Indian Cyber Security Solutions suggested Risk mitigation measures are cost effective based on client’s requirements.
  • Client Satisfaction: Web-Application Security Assessment was conducted with minimum interruption to identify security vulnerabilities, impacts and potential risks.

 

 

 

MSH Group

MSH Group

 

 

About the Client

MSH Group is a Global talent solution firm. They provide consultative recruiting and talent acquisition to help clients align their people, process and technology with their business.

 

The Challenge

 

Network Penetration Testing

MSH Group is a established Pvt Ltd. company located in Sec V, Kolkata which was facing some Network challanges. They were also applying for ISO 27001 Certification which was necessary for the business as they are dealing with foreign clients based on US & UK. As per the process of ISO 27001 certificate they had to undergo the network security audit from a cyber security company. Indian Cyber Security Solutions was asked to perform a white box network security audit on their internal office network. The challenge to network security audit team of Indian Cyber Security Solutions was to perform the entire audit process within 7 working days.

 

The Solution

 

Indian Cyber Security Solutions was ready to perform the network based penetration testing on their internal office network security, ISO 27001 lead auditor and network engineers were assigned to take up this challenge.

The project was done in following steps:

 

Stage 1:

The Scope of work was defined by the client (MSH Group). The internal office network architecture and the layout of the network was share with Indian Cyber Security Solutions. NDA (Non-Disclosure-Agreement) were signed between both the parties.

 

Stage 2:

Their windows 7 operating system was not up to date. Some Zero day vulnerabilities were founded by Indian Cyber Security Solutions in which MS17-010 was the major and high priority vulnerability by which the attacker can control their system through remote code execution. Some other medium vulnerability was also found.

 

Stage 3:

 

The 3rd Stage which is the most important stage of the project as the client was suggested the rectification from Indian Cyber Security Solutions. MSH Group were asked to update their windows 7 operating system into the latest version. As per the suggestion after the network security audit conducted by Indian Cyber Security Solutions. The MSH Group were able to update their system as per the suggestion mentioned by Indian Cyber Security Solutions team.

 

Stage 4:

 

At the end of 6th working day MSH Group network system administrator had already updated the operating system suggested by Indian Cyber Security Solutions team. The final stage of vulnerabilities assessment  had begun as the Indian Cyber Security Solutions team members had started retesting the network architecture as mentioned in the scope of work to find out all the vulnerabilities which were found previously and the network system administrators were able to updated their operating system. Indian Cyber Security Solutions team was able to generate the VAPT report and had handed over the document to the client (MSH Group) alongwith the certificate.

 

The Deliverables

The customized reports was provided to the Client as per their requirements the details are mentioned below:

  • Executive Presentation: Overview of the entire application, the vulnerabilities found and the recommendations were made to mitigate the threats identified on the software.
  • Detailed Technical Report: Detailed Technical Report has been generated on the basis of Proof-of-Concept of all the identified vulnerabilities.
  • Excel Tracker: Vulnerability tracker aimed at helping the IT assets owner keep track of the vulnerabilities, remediation status, action items, etc.

 

The Benefits

The benefits are discussed below by conducting thorough security tests and identifying the vulnerabilities:

  • Risk Benefits: Risk management of the issue by finding the vulnerabilities and recommended solutions with proven methods to enhance security.
  • Cost Savings: Indian Cyber Security Solutions suggested Risk mitigation measures are cost effective based on client’s requirements.
  • Client Satisfaction: Network Security Assessment was conducted with minimum interruption to identify security vulnerabilities, impacts and potential risks.

 

 

 

 

MB Control

 

MB Control & Systems Pvt. Ltd.

 

About the Client

MB Control & Systems Pvt. Ltd. is an electrical automation company that offers expertise in designing, manufacturing and developing of solutions in Industrial automation and communication systems.

 

The Challenge

MB Control & Systems Pvt. Ltd. located in Ballyguange, Kolkata. They needed to undergo a network penetration testing of the firewalls that were to be established in the power grid of Patiala. Our network penetration testers were asked to take up the challenge of securing the firewalls.

 

The Solutions

Indian Cyber Security Solutions were ready to perform the network based application penetration testing on the firewalls. Indian Cyber Security Solutions team comprising of network penetration testers and CISSP professional were asked to take up the challenge. The project was to be delivered in 15 days.

The project was done in following steps:

 

Stage 1:

The scope of work was defined by the client (MB Control & Systems Pvt. Ltd.). The details of the firewalls were shared with Indian Cyber Security Solutions network penetration tester. NDA (Non-Disclosure-Agreement) signed between both the parties.

 

Stage 2:

As their firewalls had a default ID and Password so we could had got into the firewalls and found there were  a misconfiguration into the firewalls. The firewalls were not set up properly which gave the penetration tester a privileges to get into other network based devices. These privilege escalation can cause real threat to the critical infrastructure of the company.

 

Stage 3:

The 3rd stage which is the most important stage of the project as the client was suggested the rectification from Indian Cyber Security Solutions. Network System Administrator of MB Control & System Pvt. Ltd. had rectified as per the suggestion after Network Security audit conducted by Indian Cyber Security Solutions team. They carried the firewalls device to the Patiala Power Grid to install into their main system. Indian Cyber Security Solutions network penetration tester were asked to retest the device after installation.

 

Stage 4:

There was a delay in delivering the project within the given rime frame as the Indian Cyber Security Solutions team had to undergo the process of network security audit at two different locations, Kolkata and Patiala. Indian Cyber Security Solutions team took time to make sure to deliver the quality output to the client. The hard work paid off and we successfully managed to gratify our client with the project.

Indian Cyber Security Solutions team able to generate the VAPT report and handed over the document to the client alongwith the certificate.

 

The Deliverables

The customized reports was provided to the Client as per their requirements the details are mentioned below:

  • Executive Presentation: Overview of the entire application, the vulnerabilities found and the recommendations were made to mitigate the threats identified on the software.
  • Detailed Technical Report: Detailed Technical Report has been generated on the basis of Proof-of-Concept of all the identified vulnerabilities.
  • Excel Tracker: Vulnerability tracker aimed at helping the IT assets owner keep track of the vulnerabilities, remediation status, action items, etc.

 

The Benefits

The benefits are discussed below by conducting thorough security tests and identifying the vulnerabilities:

  • Risk Benefits: Risk management of the issue by finding the vulnerabilities and recommended solutions with proven methods to enhance security.
  • Cost Savings: Indian Cyber Security Solutions suggested Risk mitigation measures are cost effective based on client’s requirements.
  • Client Satisfaction: Network Security Assessment was conducted with minimum interruption to identify security vulnerabilities, impacts and potential risks.

 

 

 

 

Isle of Fortune

 

Isle of Fortune

 

About the Customer

Isle of Fortune is an app developing company which develops gaming apps on android and ios platform.

 

The Challenge

Isle of Fortune is a gaming app developing company located in Singapore. They needed to undergo an android and ios app penetration testing for the newly developed game which they plan to launch. Indian Cyber Security Solutions handed over the app penetration tester for performing black box penetration testing on android, ios respectively.

 

The Solution

Indian Cyber Security Solutions were ready to perfoem the android and ios based penetration testing on their gaming app. A team of 3 app penetration tester was assigned to take up this challenge.

The project was done in following Stages:

 

Stage 1:

The scope of work was defined by the client (Isle of Fortune). The gaming application details were shared to the app penetration tester. NDA (Non-Disclosure-Agreement) were signed between both the parties.

Stage 2:

During the application penetration testing our penetration tester were performed tool based and manual based testing method and find out critical level vulnerabilities. During the attack simulation y our penetration tester Indian Cyber Security Solutions team were able to find out critical vulnerabilities like CSRF (Cross-Site request forgery) and sql injection. Some medium level vulnerabilities also found by Indian Cyber Security Solutions team.

 

Stage 3:

The 3rd stage which is the most important stage of the project as the client was suggested the rectification from Indian Cyber Security Solutions. Isle of Fortune was able to rectified the vulnerabilities and were asked their android app developing team to patch up the vulnerabilities as per the suggestion of Indian Cyber Security Solutions.

 

Stage 4:

Indian Cyber Security Solutions team was able to generate the VAPT report and handed over the document to the client along with the  certificate. The client (Isle of Fortune) was satisfied with the services.

 

The Deliverables

The customized reports was provided to the Client as per their requirements the details are mentioned below:

  • Executive Presentation: Overview of the entire application, the vulnerabilities found and the recommendations were made to mitigate the threats identified on the software.
  • Detailed Technical Report: Detailed Technical Report has been generated on the basis of Proof-of-Concept of all the identified vulnerabilities.
  • Excel Tracker: Vulnerability tracker aimed at helping the IT assets owner keep track of the vulnerabilities, remediation status, action items, etc.

 

The Benefits

The benefits are discussed below by conducting thorough security tests and identifying the vulnerabilities:

  • Risk Benefits: Risk management of the issue by finding the vulnerabilities and recommended solutions with proven methods to enhance security.
  • Cost Savings: Indian Cyber Security Solutions suggested Risk mitigation measures are cost effective based on client’s requirements.
  • Client Satisfaction: Android App penetration testing was conducted with minimum interruption to identify security vulnerabilities, impacts and potential risks.

 

 

 

Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Ethical Hacking Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Certified Ethical Hacker Training in Hyderabad

Ethical Hacking Training in Hyderabad

Python Training in Bangalore

Python Training in Hyderabad

Python Training in Bhubaneswar

Microsoft Azure Training in Hyderabad

Microsoft Azure Training in Bangalore

Microsoft Azure Training in Bhubaneswar

Networking Training in Bangalore

Networking Training in Hyderabad

Networking Training in Bhubaneswar

Advance Python Training in Hyderabad

Advance Python Training in Bangalore

Advance Python Training in Bhubaneswar

Amazon Web Services Training in Hyderabad

Amazon Web Services Training in Bangalore

Amazon Web Services Training in Bhubaneswar

Certified Ethical Hacker Certification – C | EH v10

Computer Forensic Training in Kolkata

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Testing training

Ethical Hacking  training

Internet Of Things Training

Internet Of Things Training Hyderabad

Internet Of Things Training in Bhubaneswar

Internet Of Things Training in Bangalore

Embedded System Training

Digital Marketing Training

Machine Learning Training

Python Programming training

Android Training in Bangalore

Android Training in Hyderabad

Android Training in Bhubaneswar

Diploma in Network Security Training

Android Development  training

Secured Coding in Java

Certified Network Penetration Tester 

Diploma in Web Application Security 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 

 

Cybersecurity services that can protect your company:

Web Security | Web Penetration Testing

Network Penetration Testing – NPT

Android App Penetration Testing

Source Web Development

Source Code Review

Android App Development

Digital Marketing Consultancy

Data Recovery

 

Other Location for Online Courses:

Bhubaneswar

Bangalore

Hyderabad

 

 


Show Buttons
Hide Buttons