World Informatix Cyber Security

World Informatix Cyber Security (WICS) brings global talent and experienced staff to support your information security needs. The cyber security landscape is changing rapidly, increasing risks for governments and global corporations. World Informatix partners with cyber defense product companies to bring you comprehensive cyber security testing.

  • Provide Reliable and Cost Effective Cyber Services
  • Bring Advanced Technology to Solve Cyber Security Challenges Facing Financial Institutions
  • Global Partnership with Cyber Defense Companies
  • Innovative Cyber Defense Products

SWIFT Payment Systems Assurance Services

A WICS Flagship Service

Cyber attacks on SWIFT payment systems continues to pose a global threat. As a result of a number of targeted breaches in recent years, SWIFT has issued mandatory customer security controls  to establish a security baseline for the entire industry.

W​ICS has developed a proprietary 'SWIFT Payment System Assurance' framework to ensure your SWIFT systems are safe against Cyber Attacks.

 

W​ICS has developed a proprietary 'SWIFT Payment System Assurance' framework with 232-controls based on SWIFT Customer Security Framework guidelines. ​ Using lessons learned from the previous cyber-attack on SWIFT system around the world, WICS has created a comprehensive tool​ to strengthen our customer’s cyber security posture.

WICS engineers are SWIFT-certified and our services are uniquely positioned to help safeguard your financial institutions and payment systems.

 

We are proud to be a SWIFT certified Partner for Cyber Security services (Partner #2162549)

Find Us in the SWIFT Directory of cyber security providers

 

Cloud Security Technical Reviews

a.      Compliance and Risk Management: Organizations shifting part of their business to the cloud are still responsible for compliance, risk, and security management, as well as for adherence to industry regulations.

b.      Identity and Access Management: Identities may come from different providers, and providers must be able to federate from on-premises to the cloud as well as enable collaboration across organization and country borders.

c.       Service Integrity: Cloud-based services should be engineered and operated with security in mind; the operational processes should be integrated into the organization’s security management.

d.      Endpoint Integrity: As cloud-based services originate, and are then consumed on-premises, the security, compliance, and integrity of the endpoint must be part of any security consideration.

e.      Information Protection: Cloud services require reliable processes for protecting information before, during, and after the transaction.

Mobile Application Security Assessment

Mobile White Box Security Assessment for Android /iPhone/iPAD aims at identifying vulnerabilities at the source code level. The assessments attempts at finding vulnerabilities from the coding or design flaws and the exploitable vulnerabilities as a registered. This type of test has a high manual component at 80% and testers build custom threat profiles to discover contextual security vulnerabilities that are specific to the application.

Recommended Targets

  • Applications handling online transactions
  • Business critical applications

Platform Support

  • Applications developed in Objective C, runs on iOS (iPhone / iPAD applications)
  • Applications developed using Android SDK, runs on Andriod

General Cyber Security Services

Develop Cyber Security Strategy and Assessment

  • Assess cyber security posture against standards
  • Assess and develop information security policy
  • Develop a next generation security strategy
  • Implement data loss prevention solutions

Provision of Reliable Cost Effective Services

  • External Penetration Testing Services: Involves the use of automated testing tools to conduct penetration or vulnerability tests that probe weaknesses which may be exploited by hackers. 
  • Dynamic Application Cyber Scanning: Involves using automated testing tools and inspecting the running applications (including mobile apps) behavior & response to various inputs and value-added analysis
  • Static Cyber Scanning: Involves reviewing or auditing the application’s source code manually, or by using automated source code analyzer tools
  • Database Cyber Scanning: Identifies vulnerabilities in configuration, weak passwords, missing patches, access controls, and weakness that lead to cyber security attacks.
  • Production Cyber Scanning: Vulnerability assessments for production web-based and mobile applications to identify vulnerabilities in a non-invasive manner.
  • Mobile Application Cyber Scanning: Use of automated tools to conduct penetration or vulnerability tests and inspect application behaviors and responses to various inputs and value-added analysis of business risks
  • Infrastructure Vulnerability Scanning: Use of sophisticated tools to continuously monitor infrastructure vulnerabilities
  • PCI DSS Compliance: Our teams will assist you in identifying and fixing PCI DSS related compliance issues
  • Cloud Security Services Cloud Security Alliance Cloud Controls Matrix (CCM) is based on our fundamental security principles. It is used to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider

 

All Cyber Scan results are enhanced manually to weed out false positives, provide value-added analysis of business risks and recommend remedial actions. Cyber services are provided using an onsite-offshore model.

 

p1

Cost Effective

Our solutions are cost effective and flexible to allow you to meet your security objectives at an affordable cost

p2

Scalable

Our solutions are offered as a managed service and allow you to scale up/down on demand

p3

Contextual

We bring the appropriate tools based on the context of technologies being accessed. We provide specific and contextual remediation advice

p4

Risk Based

All our assessment techniques are risk based and are customized based on the understanding of your business and your environment

p5

Technical Depth

Detailed technical assessments through the use of automated tools and leveraging the experience and knowledge of professionals

Reseller

  • FireEye Mandiant Compromise Assessment Services: Determine whether your environment has been breached and find compromised assets
  • Cytegic Intelligence based,Decision Support System: Identifies high risk areas. DSS product combines threat analysis using internal assessment and external threat intelligence enabling risk managers to focus resources and investment in high risk areas
  • LightCyber’s Magna: Brings advanced technology to detect anomalous behaviors in network intrusion detection and is not based on standard signatures and pattern recognition

 

All Cyber Scan results are enhanced manually to weed out false positives and recommend risk based remedial actions. Cyber Services are provided using an onsite-offshore model.

Full privacy and confidentiality of data is maintained . Data never leaves the premises of client data centers or will be based in secure US-hosted Data Center facilities.

 

ISO9001:2008 Quality Systems certified company

 

World Informatix Cyber Security (WICS) is proud to announce that we are now a ISO 9001:2008 Quality Systems certified company. This meticulous certification process ensures excellence in delivery of our cyber security services. WICS is committed to exceeding customer expectations of highest quality services and continuous improvement of our processes.

Our services are not just based on automated scanning tools but based on the deep experience of having completed over 5000 website vulnerability assessments by following a disciplined and rigorous process. Our expert engineers are adept at going beyond the usual and find vulnerabilities that automated scanners most likely will miss.

ISO 9001 certification is a reflection of our maturing cyber security organization with worldwide clients who trust our cyber security services.