Infrastructure Application Services

Services

Overview

NIHON TECHNOLOGY LEVERAGES ON ITS EXTENSIVE KNOWLEDGE OF

  • SOC
  • IT Infrastructure Support

Our valuable consulting experience and a processes-centric delivery methodology aid in achieving tangible business benefits for our customers.Majority of the staff in Nihon technology are bilingual, with experience of having worked in Japan or with native Japanese.

Portfolio

Soc Portfolio

Nihon Technology offers a wide range of SOC services for small, medium and large enterprises. Our SOC division is headed by certified experts for niche consulting and end-to-end implementation of SOC services across various technologies and domains. Our team has more than 15 years of experience and well connected on SOC`s new technology.

IMPLEMENTATION AND AMS SERVICES

  • Security Incident and Event Management (SIEM)
  • Roll-outs
  • End-to-end implementation
  • Technical development and enhancements
  • Upgrades and migrations
  • Forms, reports and interface development
  • Country-specific implementation - CIN (Country India)
  • SOC workshops for practical and customized offerings at-site
  • Japanese processes/templates
  • Implementing and training in latest technology
  • System migration services
  • Technical upgrade support at-site/from remote
  • SOC upgrade workshop
  • Testing services - maintenance support
  • SOC maintenance support
  • Threat Intelligence
  • Incident response
  • Corporate training
  • Customized courses for individual needs
  • Special focus on SOC related areas

INFRASTRUCTURE SUPPORT

Nihon Technology offers a wide range of IT infra services for small, medium and large enterprises. Our IT Infra division is headed by certified experts for niche consulting and end-to-end implementation of infra services across various technologies and domains. Our team has more than 15 years of experience and well connected on IT infra new technology

IMPLEMENTATION AND AMS SERVICES

  • Roll-outs
  • End-to-end implementation
  • Technical development and enhancements
  • Upgrades and migrations
  • Implementing and training in latest technology
  • System migration services
  • Technical upgrade support at-site/from remote
  • Testing services - maintenance support
  • IT Infra maintenance support

Technology

SOC - SIEM

TECHNICAL EXPERTISE

  • Architecture
  • Smart Connectors
  • Flex Connectors
  • Logger
  • Normalization
  • Log Data Management
  • Health checks

SIEM SPECIFIC EXPERTISE

  • Maintaining ESM correlation rule-set
  • Reviewing suspicious threats/incidents
  • Providing 24x7 escalation of critical-risk incidents
  • Dash Board Management
  • Trend implementation and configuration
  • Project solutions
  • Quality management through QMALL
Soc Technology

Why NTPL ?

OUR COMPETITIVE ADVANTAGES

  • Senior members in SOC area with in-depth know how on SOC and Cyber Security implementation
  • Bilingual SOC functional/technical consultants, ArcSight, McaFee, RSA, Splunk and project managers
  • Experience in executing Japanese projects in and outside of Japan
  • Working as partners with reputed Japanese companies
  • Flexible staffing model (ramp-up or ramp-down team size)
  • 24x365 working experience

Our valuable consulting experience and a processes-centric delivery methodology aid in achieving tangible business benefits for our customers.

Track Record

Project Customer Industry Environment
SOC 24x365 monitoring Leading Service Provider, Japan Cyber Security ArcSight
IT Infra Support Leading e-learning company, India E-learning Network equipments, Servers, Printers, PCs, WiFis, Biometric devices, UPS, etc
VAPT Leading e-learning company,India E-learning Webserver

Overview

While vulnerability assessment and remediation is used to strengthen the computer system, it is also important to perform suitable penetration tests periodically to identify the possibilities of system compromise. The primary purpose of penetration tests is to identify the exploitation possibilities of an identified vulnerability.

Together, penetration testing and vulnerability assessment tools provide a detailed picture of the flaws that exist in an application and the risks associated with those flaws.

Vulnerability assessment and the penetration testing process

Vapt

VULNERABILITY ASSESSMENT AND PENETRATION TESTING CONTAINS THE FOLLOWING PROCESSES:

  • Method (Black box / White box / Gray box testing).
  • Information gathering.
  • Vulnerability detection.
  • Vulnerability Scanning Recap.
  • Information analysis and planning.
  • Penetration testing.
  • Privilege escalation.
  • Result analysis.
  • Reporting.
  • Cleanup.

Technology

Hardware, software, or networking systems need to be secure, for which adherence to security best practices during design, development, and integration is essential. Security standards and models provide a baseline for developing and maintaining secure systems. During various stages of the information system life cycle, vulnerabilities may creep in. Hence, it is necessary to identify and assess vulnerabilities and mitigate them during development as well as during operations. NTPL is experienced in the Tool based as well as Manual VAPT.

Overview

IT Service Desk is a single point of contact for all your service requests and other technology issues. NTPL provides helpdesk, asset management along with a focused approach for integrating business processes into the IT service management infrastructure. Governed by ITIL standards, our processes are automated through various workflows. We provide an interface for other functions in IT services continuity management like maintenance contracts, software licenses, service level management, availability management and financial management. Through this we manage your resources to drive the business towards growth.

Service And Support Procedures

  • Set up a help desk (single Point of Contact) for IT users.
  • Implement leading help desk technologies (Any ticketing Tools).
  • Run onsite and remote help desk to support desktop and server issues.
  • Create and maintain a knowledge base for help desk users.
  • Support users on desktop applications and office productivity tools.
  • End user telephone support.
  • Electronic support – (email support).
  • Effective problem diagnosis and resolution.
  • Help desk assessment consulting.
  • End user satisfaction monitoring and web-accessible reports.