IT Security Services

Tackle Evolving Security Risks and Threats

With increased online usage within and beyond the organisation in an increasingly networked environment, IT security has become a top concern of business managers today. IT security extends beyond an organisation’s boundaries to include business partners, customers, and even the public-at-large. This is especially prevalent as electronic transactions become regular activities with transactional feature a common tool in e-commerce portals. It is essential to understand the risks, and ensure an organisation’s investments are assessed, protected, and managed. Common IT security concerns are:

  • Unsecured servers that have caused companies to lose millions of dollars and affect productivity.
  • Corrupted networks, as well as external intrusions via Trojan horses or other new forms of blended virus attacks, have caused countless business disruptions.
  • Web defacements, thefts, and manipulations of data have resulted in severe negative publicity for corporations.

Nicon Networks offers a wide range of security consultancy and training services to help our customers deal with new challenges in the IT security arena. Our strategic services include risk assessment, security review, policy development, standards and planning, recommendation and implementation of security solutions, as well as security awareness training for all levels of staff.

Consult & TrainProtectManage
Risk Assessment
Smart card-based access control system
Firewall and Web Security Review
Penetration Testing
Policies, Standards, and Methodologies
Training
Integrated Architecture
Firewalls and Other Network Perimeter Security
Virtual Private Network Infrastructure
Public Key Infrastructure

Content
Intrusion Detection
Anti-Virus and Content Security
Authentication
Identity Management
Encryption & Smart Cards

Access
Authentication
Identity Management
Encryption & Smart Cards

Desktop
Access Control
Encryption
Patch Management
Personal Firewall

Application
Overall Integration of Security Components at Application Layer
24×7 Remote and Onsite Management Services
Incident Response
Firewall and Perimeter Security
Virtual Private Network Infrastructure
Intrusion Detection
Anti-Virus and Content Security
Authentication