about
 
 
   
 
 

SECURITY

Quick Links - Offerings - Products

Securing information is of paramount importance for protecting information assets crucial in today's competitive business.

Tata Infotech has encryption and Public Key Infrastructure (PKI) security products. It also provides customers with consulting services and security solutions. In addition, the company has collaborated with partners in areas of security. The company also has industry experts to provide security solutions that best fit an organisation's business requirements.

Tata Infotech provides:

  • End-to-End coverage from assessment, implementation to managed services including certification
     
  • Technology expertise with domain knowledge
     
  • Certified Security and Network professionals
     
  • World class products through partnerships and skills built around the products
     
  • Proven Assessment and Implementation methodologies
     
  • Expertise from execution of variety of projects across industries

Tata Infotech also provides a time-cost-risk optimal security solution considering the Risks and Security Postures of individual organization.

Consulting Services

  • Information Security Strategy Consulting
    - Compliance to appropriate Regulatory Framework e.g. the Security requirements as stated in RBI regulations
    - Risk Assessment
    - Information Security Policy
    - Business Continuity / Disaster Recovery Plan
     
  • Assessment and Certification through partners for
    - BS 7799 (ISO 17799)
    - HIPAA
     
  • Systems Audit
    - Physical Security Audit
    - Application Software, Database and Operating System Security Audits
    - Telecommunication and Network Security Audit
     
  • Business Process Reengineering
    Management Systems Security Architecture

 

Technology Solutions

  • Security design, development, implementation, review, training and support for application software
    - Information Security Assurance
     
  • Software Security Architecture
     
  • Network Security Architecture
     
  • Software & Network Security Monitoring & Management Outsourcing
     
  • Security & Network Product implementation and customization support
     
  • Authentication Solutions


Products

  • Fortiora™ CSAR™ (Certificate Server, Access Repository)
     
  • Fortiora™ SCOUT™ (Security Components and Utilities Toolkit)
     
  • Fortiora™ DEFT™ (Data Encryption for Transmission)
     
  • Fortiora™ Deft Personal™ (Desktop application supporting File, Folder and Disk level encryption and shredding)


Partners

  • Cisco
     
  • Trend Microsystems

Top