Tata Consultancy Services Ltd

Tata and TCS Marks - Stacked

 

Address: Barbati SEZ
IT/ITES
Special Economic Zone
Plot No. 35
Chandrasekharpur
Odisha 751024
India
Level 6
765 Berry Street
North Sydney
NSW 2060
Australia
La Defense 8
100-101 Quartier Boieldieu
92042 Paris La Defense
Cedex 92053
France
Telephone: +919 5834 27766
Email: [email protected]
Website: http://www.tcs.com
Contact: Srimant Acharya

Kunal Pradhan
+44 (0)7703 471790
[email protected]

 

Address: 38 MT Building
4-1-4 Shibakoen
Minato-Ku
Tokyo 105-8508
Japan
3010 LBJ Freeway Suite
400 Dallas
TX 75234
USA
Room 301 & 302
25 Proctor Street
London
WC1V 6NY
UK

EVM under Cyber Security Practice (TCS) leverages its air-gapped security labs to carry out vulnerability assessments, penetration testing & vulnerability management which encompasses application security, infrastructure security, mobile app security & secure SDLC. Enlisted below are some of the imperative
features of the services:

• Pre-built assessment framework and templates to execute & document penetration testing results and recommendation
• Risk classification criteria based on principle of likelihood and impact to help prioritize remediation measures
• Risk categorization template based on various parameters that are used to aggregate and classify risks into high, medium and low

Dedicated Cyber security practice with 3850+ SMEs bringing in depth experience in area of vulnerability assessment and penetration testing.

Capabilities

Penetration Testing

Contact: Kunal Pradham
+44 (0)7703 471790
[email protected]

TCS’ Web Application PT Methodology leverages the OWASP Web Application PT Methodology to evaluate the security of a Web Application. The process involves an active analysis of the application for any security flaws or vulnerabilities and exploiting those vulnerabilities.

TCS team utilizes its open source, proprietary and industry proven tools to identify security weaknesses, demonstrate the potential consequences of an attack, and garner information that can assist in the mitigation of an actual data incident.

CREST Qualified Consultants:
Practitioner Security Analysts:  Yes
Registered Penetration Testers: No
Certified Web Application Testers: No
Certified Infrastructure Testers: No
Certified Wireless Testers: No