Our Service Team
To be specialized on the Information Security field, most of our technical staffs have obtained the industry recognized information security certification such as CISA, CISM, CISSP and Project Management Professional. Our committed service level and strong technical knowledge and experiences make us an ideal service provider to enable your success project implementation.Consulting
We understand IT security is a key to your business success. Our IT security consulting service is design to help you to minimize and mitigate the potential risk and vulnerability to your business and ensure your business operation is in a protected environment. Our security consulting services include:
- IT security requirement survey
- architect the enterprise IT security infrastructure
- Feasibility study of IT security implementation
- Renew and update the security policy and guideline
- Provide security awareness education and training
Implementation
Our system design and implementation services provide proven methodologies and best practices that accelerate the time to value of your project investment. Our project implementation services deliver on schedule, outstanding design, implementation, and integration services—in every engagement, in every location.
In addition to system implementation, we also provide profession training service to help customer to adopt the new technology and system rapidly.
A key benefit of working with UDS
implementation team is the proven
project management skill that is used
along with skilled consultants to
reduce risk and manage projects to
on-time delivery within budget.
We provide 8x5, 7x24 onsite or remote support.
Security Audit/Assessment
We offer security audit and assessment service to enable your business constantly meet the industry security best practice and your IT asset are well protected. Our aduit and assessment services include:
- IT system infrastructure review
- Internal security assessment test
- External security assessment test
- Renew security guides
- Renew the security policy setting in various device and system such as windows server, Unix server, firewall, VPN, Anti-Virus systems etc.
- Penetration Test, Vulnerability scanning, Security Policy Review, Source code scanning, Security awareness training
- Security Assessment is generally referring to a Vulnerability Assessment which scans an organization’s infrastructure and identifies vulnerabilities (faulty firewall, lack of system updates, malware, etc.). With the assessment results, the technician can recommend steps to remedy the problems within the system.
- A penetration test,
or sometimes pentest, is a
software attack on a computer
system that looks for security
weaknesses, potentially gaining
access to the computer's features
and data
- vulnerability scanner
is a computer program designed to
assess computers, computer
systems, networks or applications
for weaknesses.
- Policies should be reviewed
at planned intervals to ensure
their continuing suitability,
adequacy, and effectiveness.
- Source code scanning
is to analyze source code
and/or compiled version of code in
order to help find security flaws.
Ideally, such tools would
automatically find security flaws
with such a high degree of
confidence that what's found is
indeed a flaw.
- Security Awareness Training
will educate employees about
corporate policies and procedures
for working with information
technology (IT). Employees
should receive information about
who to contact if they discover a
security threat and be taught that
data as a valuable corporate
asset.