Be Security Smart - Care to be aware!

Because we care, we're security aware.

Information Security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent. detect document and counter threats to digital and non-digital information. infosec responsibilities include establishing a set of business process that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Many large enterprises employ a dedicated security group to implement and maintain the organization’s infosec program. Typically, this group is led by a chief information security officer. The security group is generally responsible for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied. The value of an organization lies in its information — its security is critical for business operations, as well as retaining credibility and earning the trust of clients.

Threats to sensitive and private information come in many different forms, such as malware and phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups should have an incident response plan (IRP) in place. This should allow them to contain and limit the damage, remove the cause and apply updated defense controls.

Palo Alto Network


Comstar - Offering Services

Infosec Consultancy

IT Risk Identification & Assessment

Current State Assessment

vulnerability Assessment, attack & Penetration Testing

Formulation & Implementation

Information Security Policies and Procedure

IT Security Architecture

Computer Forensics

Application Security Review

Infosec Solution

Anti-virus & Intrusion detection/prevention systems

Firewall, E-Mail & Syslog analyzers

Securing Desktops/ Laptops

Implementation of Firewalls, IDD's, Content filtering solutions

Firewalls / VPN / Access control systems

Email & Web content filtering, spam management

Token, smart card security systems

Single Sign-On RSA Authentication

Managed Security Services