Browse by Year:

CIO Review >> Magazine >> October - 2016 issue

Benelec Infotech: Optimizing Infrastructures to Expedite Security Assessment and Breach Elimination

By

As high-profile breaches raise fears of security failures endangering the global economy, safeguarding infrastructure and financial information is a crucial part of every organization’s business strategy. Organizations are therefore looking for solutions to reach at the center of cyber preparedness instead of simply reacting to breaches that have already occurred. Combining expert consulting, integration and support services, Benelec, a Pune based IT firm assists organizations in maximizing value of existing infrastructure, while mitigating risk and reducing complexities.“We review client’s security infrastructure against principles of Security Architecture; Preventive Controls; and Detective Controls.” states Ravindra Benday, MD & CEO.

A Microsoft Certified Partner, Benelec was incepted in 1995 with the aim to offer Perimeter Security Services. However, over the years, the firm has expanded its IT security services portfolio viz. IT Security Audit, ISMS Consulting, DLP Audits, PCI Compliance Review, IT Forensic Analysis and Firewall Audits. Adding to the list are services for Risk Assessment, Social Engineering Assessment, Wireless Assessment, Web Application Assessment, Data Loss Risk Assessment and Data Leakage/Data Loss Prevention Services.

Armory of Security Consultants

Benelec’s vision of Infrastructure Optimization (IO) is often used as a strategic tool to evaluate the maturity level of an organization’s core technology infrastructure. The IO Model is a continuum of four levels or phases of progressively higher technological maturity: Basic, Standardized, Rationalized and Dynamic. Moreover, Benelec consultants possess experience with Active Directory design including migrations, expansions, branch office deployments, validations and application integration as well. “Till date we have deployed and maintaining more than 60+ customers on AD right from 200 users to 2500 users.” claims Ravindra.

Further, Benelec ties up with several top notch technology vendors to incorporate client’s infrastructure with combination of security features like Firewall, VPN, Intrusion Prevention, Traffic Shaping and Web-Filtering at a compelling price. The firm deploys a team of 40+ Certified IT Security Consultants and Engineers to perform constant threat surveillance and attack prevention by ensuring continuous updating of security subscriptions to boost protection in critical attack areas to block spam, spyware, web-based exploits and blended threats for comprehensive defenses. The expertise of team in Comprehensive Project Management and ability to handle Interdisciplinary Security Projects enables on time delivery of projects, within client’s budget.

Benelec’s Web Application Testing Audit yields a final written report delivers an analysis of any security or service problems discovered together with proposed solutions along with detailed advisories and recommendations. In its attempt to defend clients from increasingly sophisticated, targeted cybercrime threats; Benelec plans at building a SOC (Security Operations Center) which would be SOC 2 Type 2 certified. The SOC would be designed to take on the day-to-day defense of client’s infrastructure by monitoring network, systems and data 24 X 7 X 365, on premise or in-cloud. Moving further, Benelec plans at starting Intelligence Gathering Services on reasons specific to corporate needs, including mentions of the company, issues that may affect or interest the client companies.