i-Raksha offers a comprehensive range of services to help businesses protect their valuable digital assets and if so desired to achieve ISO 27001:2008 Certification and also AAS 29 /SA 401 Indian Financial Auditing Standards. We provide detailed assessments of our valuable clients’ entire security infrastructures in all 10 Domains to identify and eliminate any vulnerability. We work closely with our clients to address each client’s security concerns without disrupting their ability to do business. We undertake Information Security Risk Assesment, penetration testing using the best tools and people, vulnerability analysis and guide the organizations for evolving most suitable, implementable and sustainable Information Security Policy. We train people in a tailor made fashion and also hold awareness campaign for Information Security and Cloud Security. We can provide on-site/off site managed information security services including ISMS audits, Second Party Audit for Cloud customers, logs analysis, manning Security Operation Centre etc. We do not fool ourselves that any security system can be 100% foolproof, hence we also provide services for surprise checks, emergency response, digital investigation and cyber forensics in accordance with Indian legal Standards/ International standards enumerated in Convention of Cybercrime, in case an incident still happens. Thus we hold hands our customer under all circumstances.
i-Raksha implies defence in internetworked environment which will be the primary object of the new company. The company will provide one stop solutions to all issues related to the Information Security including all facets training & awareness, Certification programs, online/offline examinations, consultancy, risk assessment, vulnerability analysis (including penetration testing), manning on-site/off-site Security Operation Centers for clients, logs Analysis, surprise checks, auditing and compliance against national and international standards, fraud detection, product implementation, management and maintenance, post – incident cyber investigation (including cyber forensics) and para-legal advice for digital evidences and crime committed using computers, Research & Development, production of Hardware, Software and Firmware, import-export of hardware, software and firmware.