We offer
- Awara IT provides information security for businesses of all sizes. We carry out information security audits, penetration testing, information security system maintenance, black box, grey box, white box testing. We provide PCI DSS, ISO 27001, NIST, GDPR, ITIL compliance services based on Microsoft and other vendor solutions.
- Information security services are particularly relevant to manufacturing and mining companies, e-commerce and the IT industry.
- We place particular emphasis on the training of system administrators, DPOs, CISOs, SOs, SCs and COs: we have developed individual practical training courses for them.
Tech stack
Security solutions from Microsoft :
- Defender For Endpoint
- Defender For Identity
- Defender For Cloud
- Defender For Microsoft 365
- Azure Sentinel (SIEM+SOAR)
- JIT/JEA/PIM/IAM/CASB
Awara IT's expertise
- Design, building, assessing and auditing of information security systems. Analysis of information systems structure, development and implementation of security policies, selection of information security measures
- Maintenance of information security systems (cybersecurity). Security compliance control, information security system monitoring, threat detection, backup control, information system user training
- Audit of information security for compliance with legal and regulatory requirements of the Republic of Kazakhstan/EU
- IT infrastructure scanning for vulnerabilities, pentest
- Penetration testing of information systems, red teaming
- Information security measures implementation, DLP design. Selection of solution providers, drafting of technical requirements for security measures, participation in procurement.
- Development of regulations, rules and instructions on information security.
- Practical training in the formats of Cyber Wars, Battle for the Domain, workshops, etc.
- The Awara IT team includes Microsoft certified trainers. Certified Ethical Hacker, CISO, OCSP, Microsoft MVP on Azure.
Results
- You will receive an objective and independent assessment of your IT infrastructure and information security systems
- You will determine how well the IT infrastructure, servers, corporate CRM, ERP, BPM systems, website, databases, storage and data network stack comply with corporate and legal information security requirements
- You will receive a report on possible non-conformities and prioritisation of risks, CVE rating.