Webinar
ITGLOBAL.COM events

Information Security Outsourcing

Consideration of business specifics
Post-audit support
In-depth examination
Certified specialists

Outsourcing information security allows you to transfer to the operational management of ITGLOBAL.COM Security the protection of your information, thereby freeing up resources for core business processes

The Service is based on information security risk management methodology. Based on our expertise and experience, we build and manage information security processes that are really necessary to protect your data.

The result of the service is continuous provision of information security of the Company.

When a service is needed

Wanting to think only about the business

For companies that want to focus on their core business, shifting IS functions to an external provider

No resources for IS

.
For companies that don’t have the resources to do IS inhouse

IS maturity level is insufficient

When the IS level does not meet business needs

What processes we manage

Access control

Protecting accounts and preventing unauthorized access to confidential information

Network protection

Protection against threats related to the interception, alteration and interference with transmitted data

Monitoring of IS events

Centralized collection of IS events for the purpose of detecting and prevention of IS incidents

Vulnerability management

Prompt identification and remediation of vulnerabilities in the components of the IT infrastructure

Incident management

Prompt response and remediation of IS incidents

Management of the Company's assets

Control and accounting of all assets to ensure that each asset is protected

Information security tools

Private cloud implementation for high load databases. With the ability to host one database on one dedicated server, up to 6 TB RAM per server
Our clients

Information Security Outsourcing
Order a Service

You agree to the terms of the privacy policy

Process outsourcing together with SOC Service

Allows to minimize part of information security risks as much as possible
Read more

What the client gets

Guaranteed service level according to SLA

No dependence on key employees

Continuity of IS processes

Ability to rapidly scale up IS processes

Reduction of financial and reputational risks

Compliance with regulatory requirements (187-FZ, 152-FZ, GOST R 57580 and Central Bank Regulation)

What regulatory requirements we help you meet

    • FZ-187 “On KII”
    • FZ-152 “On Personal Data”
    • FZ-98 “On Commercial Secrets”
    • FZ-149 “On Information Protection”
    • GOST R 57580.1-2017
    • Compliance with the requirements of Regulations of the Bank of Russia No. 638-P/719-P/802-P/742-P/757-P and others

.

How the service is provided

01

Conducting an audit

  • Conducting interviews with business process owners responsible for IS and IT provision
  • Analyzing the information obtained during the interview
  • Conducting an IS risk assessment
  • Formation of a Development Plan or Strategy for a long period of time
02

Implementation of IS processes

  • Gathering information about IT infrastructure components, auditing their security settings
  • Designing each IS process within the Deming cycle
  • Development of configuration standards for IT infrastructure components
  • Finalization of existing IS documentation
  • Development of templates/registers/journals within each process
Upon completion of the implementation of the IS process, we take it on maintenance and at the same time start work on the implementation of the next process
03

Support of IS processes

  • Documentation of each process
  • Aligning actions with the components of each process
  • Responding to notifications from KICs
  • Continuous process control
04

Control of IS processes

  • Carrying out control activities within IS processes
  • Fixation of identified violations during control activities
05

Improvement of IS processes

Development of recommendations to eliminate violations identified during the monitoring stage
Our clients

Information Security Outsourcing
Order a Service

You agree to the terms of the privacy policy
Our clients

Information Security Outsourcing
Order a Service

You agree to the terms of the privacy policy
We use cookies to optimise website functionality and improve our services. To find out more, please read our Privacy Policy.
Cookies settings
Strictly necessary cookies
Analytics cookies