IT Consulting Services

We help Corporates identify key IT risks facing their businesses and develop strategies and services to manage these risks. The IT consulting services can be strategic as well as operational.

IT consulting services provided by us include:

  1. IT Policy Design and Implementation support
  2. IT Risk Assessment
    • ISO 27001 implementation support and readiness assessment.
  3. SAP Implementation support
  4. Testing support during ERP implementation
  5. SAP post Implementation Reviews
  6. Selection of ERP Systems
  7. IT Training and Awareness Programs

IT Controls Reviews

We help businesses review existing controls and introduce “best practices”, help IT team become more risk free and improve compliance.

Our service offerings include:

  1. IT General Controls
    • Security and Access Controls
    • Segregation of Duties
    • Program Change Controls
    • Database Controls
    • Back Up and Restoration Procedures
    • Disaster Recovery Management
    • Server Room Management and Controls
  2. ERP Post Implementation Review (SAP, Oracle ERP)
    • Control Automation
    • Configuration Controls
    • Report Review
    • SAP Role design review
  3. SAP GRC Review
  4. Data Warehouse Review

Cyber Security and Data Privacy

Cybersecurity is increasingly becoming an important concern for every organization. Risks posed by cyber attackers aiming at systematically stealing intellectual property and disrupting businesses cannot be overlooked anymore. We have a long history of helping our clients detect and respond to cyber incidents, understand the threats to their business and their vulnerabilities and risks.

Our risk-based approach is comprehensive and focuses on creating a secure environment. Our services include:

  1. Data Privacy and Protection
    • GDPR Gap Assessment
    • Indian Personal Data Protection Act
  2. Cyber Security Assessment
    • Security Governance
    • Risk Management
    • Firewall Security Configurations
    • Controls Over Internet and Emails
    • Remote Access
    • Vulnerability Assessment and Penetration Testing
    • Security Incident Management
    • Data Centre Security Controls