About, Across Verticals
Across Verticals is a boutique security consulting firm that specializes in holistic, deeply technical and end to end security advisory services based on industry best practices and our consulting experience in several global organizations. The company was established by leading industry recognized information security professionals who have extensive security consulting experience within government and commercial customers in the Australasia region.
Our core competencies and skills include all technical aspects of computer system security, application security, software development and software programming security, security awareness, Risk management services, penetration testing and vulnerability analysis of inter-connected systems/networks. Across Verticals team has performed numerous network and application penetration tests, standards and regulatory compliance reviews, established security governance and implemented security solutions.
Our team has hands on system administration, software development, solution architecture and implementation backgrounds which giving us a wealth of technical knowledge to help secure the computer systems of our customers. We understand the time and effort needed to implement our recommendations, and that a security policy is more than a paper plan - we know how to enforce and implement what's on the paper. In addition, we take a holistic perspective focusing on not only the policies desired, the realities of the regulatory environment, maturity of processes, existing controls in place, threat scenarios, threat environment and the tools available in the market today; but how all of those components can be integrated smoothly.
Across Verticals is unique from other consulting companies as we take a holistic view of security issues and are able to relate that to the infrastructure and software development life cycle as well as security governance. We are rightfully positioned as a trusted advisor as we provide end to end, business aligned consulting that focuses on understanding root cause to implement preventive controls to avoid recurrence of issues. The big-picture factor allows us to map a technical issue (a symptom) to a root cause and align security to business thereby enabling our customers to be on top of security curve.
Across Verticals has pioneered cloud based Cyber Threat Risk and Vulnerability state assessment in the Malaysia with the development of proprietary ZoneSecure⢠Technology that provides continuous security assurance to our customers. The company is uniquely positioned to provide on demand and cloud based security assurance services.
Network Penetration Test
This testing is based on mature industry standard like the Open Source Security Testing Methodology Manual (OSSTMM). This criterion based testing includes:
- Network Surveying
- Application Testing (Review client scripts, SSL, broken links etc)
- Port Scanning
- Trusted Systems Testing
- Services Identification
- Firewall, router, switch testing
- System Identification
- Denial of Service (DOS) Testing (Based on client request)
- Vulnerability Research Verification
Web Application Penetration Test
This testing is based on mature industry standard like Open Web Application Security Project standards (OWASP). This criterion based testing includes:
- Authentication
- Session Management
- Authorisation
- Data Security
- Data Validation
- Exception Handling
- Communications Security
- Systems Security
Vulnerability Assessment Service
This is a unique service that allows an organisation to perform periodic independent assessment of the systems within their corporate network at a fraction of a cost. This service provides an assurance to the organisation that the host operating system and applications vulnerabilities are identified and resolved in time to give the organisation the best ongoing protection against existing risks as well as new and emerging threats.
Other Security Assessments
- Network Security Architecture
- Wireless Security
- Application Security Architecture
- SCADA Security
- Host Security Assessment
- VOIP Security
- Source Code Review
- ERP Security
- Data Security and Data Loss Prevention
- Cyber Security
- APT Monitoring
Regulation and Compliance
- APRA/ BNM/ MAS/BOT/BOI
- ISO 27001/2
- PCI Compliance
- Security Policy and Standards
Policies and Processes
- Security Policies & Standards Development
- Threat & Vulnerability Management
- Risk Management
- Security Incident and Event Monitoring
- Disaster Recovery Plan
- Secure SDLC