Information Security Assessments
Our Information Security assessment services undertake a comprehensive security review of our clients' organizations.

Internal and External Vulnerability Testing
Our vulnerability assessment services provide customers with an assessment of the overall security of an organization's systems and provides a valuable baseline for determining appropriate security measures. We perform periodic assessments, which enable us to track changes within the system and verify that new system implementations and changes to existing systems have not introduced new, unmitigated vulnerabilities to the organization.

Penetration Testing
Penetration Testing encompasses scanning the network systems to discover Internet-exposed vulnerabilities, scanning web application servers for Internet and Intranet based vulnerabilities, and performance of modified Penetration Testing to determine full scope of vulnerabilities.
Penetration testing of the network perimeter is performed in accordance with an agreed upon Rules of Engagement (ROE) document.
We put special attention to safeguard the normal operation of the systems and networks during the performance of penetration testing.

Security Intelligence - Early Alert Systems
Our Security Intelligence Early Alert System provides our clients with just-in-time, continuous and effective monitoring of the complete ICT infrastructure. The intent is to prevent possible security incidents by detecting vulnerabilities (including "zero day" exploits) early enough to prevent their exploitation.

Incident Response and Investigation
Forensics
We perform analysis of security incidents ranging from desktop compromises to system-wide issues, provide coordination and consultation, and assist in preservation of data.
Our certified experts coordinate and perform complex computer forensic services, and track the flow state of incidents. We are experienced in managing the consequences of a security breach or attack.

Information Security Consulting
We provide supporting analysis to help our clients implement information security measures, resolve information technology risks, threats, and vulnerabilities and to implement adequate risk mitigation measures.
We provide consultation to help to respond to audit and/or security assessment findings.

Compliance and Audit Support for ISO27001
Our certified experts provide guidance on implementing process controls on IT related activities to meet pertinent compliance requirements for ISO27001.

Development and Implementation of Security Policies
We conduct the review of client's pertinent policies, standards, and procedures.
Also, our team of consultants provides assistance with understanding and interpreting laws, regulations, security policies and standards, as well as the assistance in development of specific policies, standards, and guidelines to meet pertinent policy requirements

Security Services Bundle
Security Outsourcing focuses on enterprise-wide visibility and management of an organization's infrastructure security in order to maintain controls, identify weaknesses and help ensure proper compliance and reporting. By integrating security into network services, data center services and workplace services, Diverto maximizes clients' global IT security posture, while minimizing clients' costs and risks.
We offer a full scope of Security Services, including Security Risk Management, Identity and Access Management, Application Security, and Infrastructure/Physical Security

Training and Education
We offer various education courses and seminars in Information Security.
Copyright © Diverto 2013