www.niiconsulting.com Open in urlscan Pro
2a06:98c1:3120::a  Public Scan

Submitted URL: https://d2-jd004.eu1.hubspotlinks.com/Ctc/5F+113/d2-jd004/VW8tBb2zWC7_W10CZp21KrYrPVQq1454JTsWFN69sMVZ3q905V1-WJV7CgCvgW5BGfqQ7LtnJqVd...
Effective URL: https://www.niiconsulting.com/?utm_campaign=Network%20Intelligence%20Weekly&utm_medium=email&_hsmi=60443235&_hsenc=p2ANqtz-8PS...
Submission: On May 11 via api from SG — Scanned from DE

Form analysis 1 forms found in the DOM

POST /services/business-continuity-management-thank-you.php

<form id="bcmForm" class="" action="/services/business-continuity-management-thank-you.php" role="form" method="post" novalidate="novalidate">
  <div class="row">
    <div class="form-group col-sm-4">
      <label for="name">Name</label>
      <input type="text" aria-required="true" id="name" name="name" class="form-control required" placeholder="Enter your Name">
      <div style="color: red;font-weight: bold;padding: 7px 0px;">
      </div>
    </div>
    <div class="form-group col-sm-4">
      <label for="phone">Phone</label>
      <input type="text" aria-required="true" id="phone" name="phone" class="form-control  required" placeholder="Enter your Phone Number" maxlength="10">
      <div style="color: red;font-weight: bold;padding: 7px 0px;">
      </div>
    </div>
    <div class="form-group col-sm-4">
      <label for="email">Email</label>
      <input type="email" aria-required="true" id="email" name="email" class="form-control required" placeholder="Enter your Email">
      <div style="color: red;font-weight: bold;padding: 7px 0px;">
      </div>
    </div>
  </div>
  <div class="row">
    <div class="form-group col-sm-6">
      <label for="organization">Organization</label>
      <input type="text" aria-required="true" id="organization" name="organization" class="form-control required" placeholder="Enter Organization Name">
      <div style="color: red;font-weight: bold;padding: 7px 0px;">
      </div>
    </div>
    <div class="form-group col-sm-6">
      <label for="name">Country</label>
      <input type="text" aria-required="true" id="country" name="country" class="form-control required" placeholder="Enter your Name">
      <div style="color: red;font-weight: bold;padding: 7px 0px;">
      </div>
    </div>
  </div>
  <div class="form-group">
    <label for="message">Message</label>
    <textarea type="text" name="message" id="message" rows="5" class="form-control required" placeholder="Enter your Message"></textarea>
    <div style="color: red;font-weight: bold;padding: 7px 0px;">
    </div>
  </div>
  <div class="form-group">
    <input type="checkbox" name="agree" id="agree" class="">&nbsp;I agree to receive newsletters and other information related to company and it's services <div style="color: red;font-weight: bold;padding: 7px 0px;" id="agreeDiv">
    </div>
  </div>
  <div class="form-group">
    <div class="g-recaptcha" data-sitekey="6LeixoIUAAAAAGU0Q432tu2GbZkInW3BNqEI6JJs"></div>
  </div>
  <div style="color: red;font-weight: bold;padding: 7px 0px;" id="errorDiv">
  </div>
  <!--<input  value="Submit" type="button" id="sos_login"/> -->
  <button class="btn btn-default" type="submit" id="">Send message</button>
</form>

Text Content

 * Home
 * Products
   * Firesec
   * BlueScope
 * Services
     
   * Managed Security Services
     * Managed Security Services
     * SOC Design
     * Anti-Phishing
     * Managed Detection as a Service
     * Threat Hunting
     * Cybersecurity for SMEs
     * Ransomware Readiness Assessment Services
   * ICS Security
   * Cloud Security
   * Payment Security
     * PCI DSS QSA
     * PA DSS
   * BCMS
   * Assessment
     * Red Team Assessment
     * Application Security
     * Mobile Security Testing
     * SCADA and ICS
     * Telecom Security
     * Sharepoint Security
     * Source Code Review
     * Network Audit
     * Wireless Auditing
     * Security Audit
     * Penetration Testing
     * DDoS Simulation
     * Spear Phishing
     * War-Game Assessment
   * Security Compliances
     * ISO 27001
     * Risk Assessment
     * Security Awareness
     * ISO 20000/ITIL
     * Security Metrics
     * COBIT Framework
     * HIPAA
   * Remediation
     * Server Hardening
     * Network Redesign
     * Endpoint Security
     * Application Redevelopment
     * Active Directory and Group Policy Implementation
   * Breach Response
     * Compromise Assessment
     * Digital Forensics
     * Financial Fraud Risk Management
   * Trainings
     
 * Training
   * Certified Web Application Security Professional (CWASP)
   * Certified Payment Security Practitioner (CPSP)
   * Certified Professional Forensics Analyst (CPFA)
   * Certified Data Privacy Practitioner (CDPP)
   * Certified Information Systems Security Professional (CISSP)
   * Certified DevOps Security Practitioner (CDSP)
   * Secured Cloud Computing Practitioner (SCCP)
   * Certified Threat & Malware Analyst (CTMA)
   * Certified Security Operations Center Practitioner (CSOCP)
 * Resources
   * Blog
   * Security Advisories
     
     
   * Annual Report
     * Annual Report 2019
     * Annual Report 2021
     
     
     
     
   * Books
   * Whitepapers
     * Indian Personal Data Protection Bill
     * DevSecOps - A Concept note
     * Evolving Role Of CISO
     * NCA ECC Framework
     * Comparing Certain Privacy Laws
     * Compromise Assessment
     * Digital Forensics and Incident Response
     * ISO 27001 [ISMS]
     * SAMA Framework
     * GDPR_Compliance_Australia
   * SOC Maturity Assessment
   
 * Blog
 * Company
     
   * Management Team
   * Clients
   * Careers
   * Hall Of Fame
 * Contact Us

   
 * We help you achieve TRANSILIENCE
   through ADVISE
   
   
   
   
   
   Explore More
   
 * Cloud Security
   Gain superior visibility, protection & control access across the expanded
   cloud attack surface.
   GET STARTED
   
   
 * BlueScope
   Manage . Detect . Respond
   Our Proprietary solution built for Security Analytics.
   DIVE RIGHT IN
   
 * Critical
   Infrastructure Security
   
   Be prepared and respond to serious incidents that involve the critical
   infrastructure of a region or nation.
   Explore More!
   
 * Trainer-led hands-on online courses
   May 2022
   Learn More
   







ABOUT NETWORK INTELLIGENCE

We are a global cybersecurity provider founded in 2001 with more than 500 team
members working out of our New York, Amsterdam, Sydney, Riyadh, Dubai, Mumbai,
and Singapore offices. We offer services across 6 broad spectrums - Assessment,
BCMS, GRC, Professional Services, MSSP & Trainings. We serve customers across
industry verticals such as Banks and Financial Services, Technology and Media,
Oil & Power, Airlines, E-commerce, Retail, Healthcare etc.

We believe that cybersecurity is not a destination, it is a journey and we
partner with our clients to address the dynamic cybersecurity threat landscape.

Explore More


WHAT WE DO

PCI DSS

We are a PCI Qualified Security Assessor (QSA) and provide consulting and
assessment services to clients globally. Our consultants also assist with
compliance to PA-DSS, PTS and other security requirements for payment companies.

ISO 27001

We offer a comprehensive methodology for implementing and maintaining an ISO
27001-based information security management system within your organization.

CLOUD SECURITY

The adoption of cloud computing is an inevitable part of every company's digital
transformation journey. Our experts help organizations move to the cloud while
still ensuring risk is addressed and legal and regulatory requirements are
complied with.

CRITICAL INFRASTRUCTURE

Attacks on Industrial Control Systems (ICS) have been on the rise and the
convergence of IT and OT with the advent of Industrial Internet of Things (IIoT)
is increasing the attack surface. Our ICS Security practice helps identify
vulnerabilities and build a structured cybersecurity framework for your OT
environment.

DIGITAL FORENSICS

Our Digital Forensics and Incident Response team has been involved in
investigating some of the most high-profile breaches in recent years. Be it
attacks on SWIFT, ATMs, Internet Banking, Email Fraud, Mobile Forensics, we have
investigated many different types of systems and technologies.

RED TEAM ASSESSMENTS

The best way to test the security posture of your organization is to conduct an
adversary simulation exercise. Our red team assessments cover various scenarios
leveraging social engineering, creation of fully undetectable malware, setting
up customized C&C servers, and reaching targets while trying to be undetected by
the blue teams.

MANAGED SERVICES

From our Global Security Operations Center in Mumbai, Delhi & Dubai, we offer
managed security services covering 24/7 security monitoring, incident response,
brand monitoring and site takedown, vulnerability management, and threat
intelligence. Our partnerships with security technology leaders such as IBM,
Qualys, and Tenable ensure clients get state-of-the-art security without
prohibitive capex investments.

BUSINESS CONTINUITY MANAGEMENT

Our Business Continuity Management and Disaster Recovery services are based on
industry-leading standards such as ISO 22301. We provide the entire gamut of
services, right from gap assessments, policy and procedure documentation, risk
assessments, business impact analyses, and development of disaster recovery
procedures as well as inputs to select the right DR technologies for your data
centre.

APPLICATION SECURITY

Be it DevSecOps, Threat Modeling, or Secure Code Reviews, we have one of the
most comprehensive Application Security programs to address all aspects of a
secure SDLC. This is one of our largest teams and the technology landscape
covered by our assessment team members includes web, client-server, kiosk-based,
embedded code, APIs, containerized microservices, etc.


2022 BY THE NUMBERS

--------------------------------------------------------------------------------


48%%


Y-O-Y Growth in Revenue

38%%


Increase in Employee Headcount

12


GDPR Projects

150%%


Increase in Cloud Security Projects

62%%


Increase in MSSP Business


OUR CLIENTS

Our awesome clients we've had the pleasure to work with!

--------------------------------------------------------------------------------



Amongst the daily humdrum of various roles, responsibilities and activities;
would like to take a pause and place on record a word of appreciation for the
unstinted support provided by your team deployed for the security assessment
engagement. They have adapted to the working environment and contributed towards
sustaining the work process including active support in non-working hours (when
called for).

HDFC Bank

Their Mumbai team has significantly contributed to complete all the light
reviews for Grandfather project. One of the milestones in the GF program. We
thank you for all your efforts to meet secArch commitments.

Morgan Stanley

On behalf of the ICT department in NCEMA, we would like to extend our
appreciation and gratitude for your services and support in achieving the
Information security CSA & Risk Management project. You have done a splendid job
and been very professional. Your work ethics are a real treat.

NCEMA, UAE

You have been very helpful and professional in designing the entire audit,
thoroughly finding the gaps, helping us in closure of each and every gap and
then conducting the post gap assessment audit. It was an extremely well done
exercise. Every feedback that you gave for our various processes were very
useful to us in maintaining the compliance and security of the project. Your
deep understanding of PCI in particular and Information Security in general is
commendable.

Birlasoft, India

We would like to thank you for your support in Gap analysis and completion of
audit smoothly. During the complete audit we found Network Intelligence team to
be very supportive and cooperative which lead the audit completion in time .
Once again thanks for getting successful Audit.

Jumio

We are extremely happy with the way Network Intelligence team has performed
exceptionally well in Red Team Assessment by showing great sense of dedication
towards identification, follow-up and closure of vulnerabilities. It's a
pleasure to have these guys in ICICI. Their professionalism and great work
ethics are a matter of appreciation.

ICICI Bank



OUR JOURNEY

--------------------------------------------------------------------------------

   
 * 2003 - 2004
 * 2005 - 2006
 * 2007 - 2008
 * 2009 - 2010
 * 2011 - 2012
 * 2013 - 2014
 * 2015 - 2016
 * 2017 - 2018
 * 2020 - 2021

2003

Successfully developed first set of automation tools to differentiate service
offerings.
Acquired first US based customer.

2005

Executed first international project for Dubai Stock Exchange.

2007

Presented on Detection & Evasion of Web Application Attacks at Blackhat
conference
Awarded ISO 27001

2008

Training operations started

2009

Middle East operations commenced

2011

GRC practice started.

2014

SOC operations commenced

2015

Network Intelligence became PCI DSS QSA
Tied up with IBM & Microsoft as security partner

2016

Launched Insights, a Security Analytics Platform.

2017

Merged the consulting practices Torrid Networks with NII
Singapore operations started

2018

Raised $5mn from Helix Investments
MSSP business trebles Y-o-Y.
Flagship product Firesec launched.

2020

SOC setup in KSA
Launched cybersecurity services for Remote Workforce

2021

Received PCI Forensic Investigator License for USA & Canada


OUR BLOGS

Technology
February 16, 2022 0 Comments


ATTACKERS ARE ACTIVELY EXPLOITING A CRITICAL ZERO-DAY VULNERABILITY IN ADOBE
COMMERCE AND MAGENTO OPEN SOURCE PRODUCTS

Adobe has addressed critical Magento Zero-Day Vulnerability (CVE-2022-24086)
that is under active exploitation by threat actors.

Read More
Technology
February 28, 2022 0 Comments


THE SUPPLY CHAIN CYBERSECURITY SAGA: CHALLENGES AND SOLUTIONS

According to a study by Argon Security, software supply chain attacks grew by
more than 300% in 2021 compared to 2020.
The study also indicated that attackers focus most heavily on open-source
vulnerabilities

Read More
Technology
April 13, 2022 0 Comments


CONSUMER PROTECTION REGULATION

A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by
the Central Bank of UAE (CBUAE)
With the ever-evolving digital landscape and advancements in technologies that
process

Read More


CONNECT WITH US

Name

Phone

Email

Organization

Country

Message

 I agree to receive newsletters and other information related to company and
it's services



Send message


COMPANY DETAILS

 * New York | Amsterdam | Sydney | Dubai | Riyadh | Mumbai | Singapore
   
 * info@niiconsulting.com

 * 
 * 
 * 
 * 
 * 
 * 

QUICK LINKS

 * Tune into our Podcasts
 * About
 * Contact
 * Home
 * Blog
 * Services
 * Security Advisories

LATEST FROM OUR BLOG

Attackers are actively exploiting a critical zero-day vulnerability in Adobe
Commerce and Magento Open Source products Feburary 16, 2022 Technology
The Supply Chain Cybersecurity Saga: Challenges and Solutions Feburary 28, 2022
Technology
Consumer Protection Regulation April 13, 2022 Technology

FOLLOW US ON TWITTER

Copyright © 2022. All Rights Reserved by Network Intelligence
1
Are you looking for help with Cybersecurity solutions?
×
Loading...