我的采购

请输入包含最少两个字元或数字的关键字。

UCS Hong Kong Ltd
查询
ICTS - Information & Communications Technology Security
分享此页面
描述
联络供应商
描述
Risk Assessment
  • Identify risks & vulnerabilities
  • Conduct log analysis and penetration tests
Security Policy Formulation & Review
  • Ensure adequate rules & procedures
  • Make provision of resources
  • Define roles & responsibilities
Security Audit
  • Determine conformity to security policies & regulatory compliance
Security Incident Investigation
  • Evaluate adequacy of existing security measures
  • Seek continuous improvement initiatives
  • Identify who should be held responsible, and to what extent
Data Recovery & Computer Forensics
  • Recover critical data
  • Ensure business continuity
  • Act as expert witness in court
Staff Awareness Training
  • Mitigate non-malicious attack by staff due to ignorance or carelessness
Continuous Consultancy Services
  • Allow informed and independent business decision in acquisition of infrastructure
  • Keep track of ever-changing IT phenomenon and its security landscape
  • Provide comprehensive services by a team of specialists with a detective mindset and expertise

UCS Hong Kong Ltd

UCS Hong Kong Ltd

香港

服务行业公司

您或许喜欢

确定要取消关注此供应商?