My Sourcing

LanguageEnglish

Please enter a valid keyword with 2 or more characters / numbers.

UCS Hong Kong Ltd
Enquire
ICTS - Information & Communications Technology Security
Share this page
Description
Contact Supplier
Description
Risk Assessment
  • Identify risks & vulnerabilities
  • Conduct log analysis and penetration tests
Security Policy Formulation & Review
  • Ensure adequate rules & procedures
  • Make provision of resources
  • Define roles & responsibilities
Security Audit
  • Determine conformity to security policies & regulatory compliance
Security Incident Investigation
  • Evaluate adequacy of existing security measures
  • Seek continuous improvement initiatives
  • Identify who should be held responsible, and to what extent
Data Recovery & Computer Forensics
  • Recover critical data
  • Ensure business continuity
  • Act as expert witness in court
Staff Awareness Training
  • Mitigate non-malicious attack by staff due to ignorance or carelessness
Continuous Consultancy Services
  • Allow informed and independent business decision in acquisition of infrastructure
  • Keep track of ever-changing IT phenomenon and its security landscape
  • Provide comprehensive services by a team of specialists with a detective mindset and expertise

UCS Hong Kong Ltd

UCS Hong Kong Ltd

Hong Kong

Service Company

You may also like

Unfollow the following supplier?