Case Study

Risk Management & Automation for a Leading US Bank

Aujas was engaged by a leading bank in US with retail as well as commercial operations for creating a risk management framework and its automation. 

Aujas started by conducting a detailed strategic planning and solution design initiative to identify quick wins and to establish the long term roadmap for managing access risk.

Read More

Secure Code Review of Internet of Things for a Leading Payment Service Provider

One of the leading payment service provider in APAC engaged us to secure their mobile payment devices through secure code review and remediation advisories.

Goal of this engagement was to assess the device application source code for security flaws and validate that secure coding practices has been incorporated in the source code development life cycle. Also to assess the source code with Industry best practices – OWASP.

Read More

Information Security Program Evaluation to Meet Regulatory Requirements for a Commercial Bank

Our client is a large international bank with an extensive network of branches, ATMs and remittance centers. Over the past three decades it has expanded dynamically and now provides a full range of banking products and services to retail and corporate customers. It also offers home financing and heavy equipment leasing services.

Read More

Aujas RSA Archer Center of Excellence

RSA Archer is a powerful eGRC automation technology which has been identified by Gartner as the market leader for the last two years. Many large organizations use RSA Archer for automating their IT GRC (governance, risk and compliance), vendor governance, and legal and financial compliance.

Read More

Security Analytics and Visualization Platform (SAVP)

The platform has been designed and developed to provide clients with high level of customization for visualization, workflow definitions etc. Its flexibility and adaptability at a reasonable TCO makes its one of its kind in the industry. The parser model allows for easy control integration for new of modified technologies or processes.

Read More

Retail Giant Eliminates Data Leakage Threats

Our client is the world’s third largest retailer with a turnover of $115 billion (£72 billion), a presence in 12 countries with a market leader position in six. With over half a million employees, 6,600 stores, and a strong online business, this retailer is known for bringing best value, choice and service to millions of customers. The company also operates an extensive loyalty program that has operations similar to a bank.

Read More

Information Security Incident Management Framework for Large Oil & Gas Client

Many industries depend on technology for managing critical information and operations and providing better user service and experience. As a result, companies who embrace technology have increasingly become the target for various hackers and organized crime groups. Information security incidents are increasing, especially those that involve data leakage or the compromise of sensitive business or customer information. Reputation damage, legal actions, and fines or compensation payouts are among the consequences victimized companies face.

Read More

Solution Design & Implementation for Managing Privileged IDs in Telecom Environment

Aujas designed an innovative solution to manage shared IDs over 4000+ devices distributed over a country wide network. Aujas leveraged Identity and Access to bring in accountability and ease of use in running telecom NOC operations.

Read More

Archer eGRC Automation for a Large Telecom Client

Today’s information security experts are wise to focus on cybercrime detection and prevention. Cyber criminals are using very sophisticated attack vectors such as advanced persistent threat (APT), zero-day attacks, and spear-phishing to compromise systems and steal data. Multiple point technologies have emerged to help organizations detect and prevent these attacks. What many companies lack, however, is a structured, cohesive and integrated program to leverage security intelligence from all tools to improve cyber defense, and prevent and manage security incidents consistently.

Read More

Our Methodology Provides the Insurance for an Effective DLP Implementation

Information security was a big concern for large insurance company, which had units specializing in auto, health, and property and casualty insurance. To safeguard information and meet regulatory compliance requirements, the company had implemented ISO27001:2005 controls and achieved certification for compliance.

Read More

Download Case Study