-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcybersecurity.html
338 lines (284 loc) · 16.3 KB
/
cybersecurity.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
<!DOCTYPE html>
<html lang="en">
<head>
<!-- <!– Global site tag (gtag.js) - Google Analytics –>-->
<!-- <script async src="https://www.googletagmanager.com/gtag/js?id=UA-170180538-1"></script>-->
<!-- <script>-->
<!-- window.dataLayer = window.dataLayer || [];-->
<!-- function gtag() {-->
<!-- dataLayer.push(arguments);-->
<!-- }-->
<!-- gtag('js', new Date());-->
<!-- gtag('config', 'UA-170180538-1');-->
<!-- </script>-->
<meta charset="utf-8">
<meta content="width=device-width, initial-scale=1.0" name="viewport">
<title>Tekchain | Cybersecurity</title>
<meta content="" name="descriptison">
<meta content="" name="keywords">
<link rel="icon" href="assets/img/logo2.png">
<!-- Google Fonts -->
<link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i|Raleway:300,300i,400,400i,500,500i,600,600i,700,700i|Poppins:300,300i,400,400i,500,500i,600,600i,700,700i"
rel="stylesheet">
<!-- Vendor CSS Files -->
<link href="assets/vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
<link href="assets/vendor/icofont/icofont.min.css" rel="stylesheet">
<link href="assets/vendor/boxicons/css/boxicons.min.css" rel="stylesheet">
<link href="assets/vendor/animate.css/animate.min.css" rel="stylesheet">
<link href="assets/vendor/remixicon/remixicon.css" rel="stylesheet">
<link href="assets/vendor/line-awesome/css/line-awesome.min.css" rel="stylesheet">
<link href="assets/vendor/aos/aos.css" rel="stylesheet">
<!-- Template Main CSS File -->
<link href="assets/css/style.css" rel="stylesheet">
</head>
<body>
<header id="header" class="fixed-top d-flex align-items-center">
<div class="container d-flex align-items-center">
<div class="logo mr-auto">
<a href="index.html"><img src="assets/img/logo.png" alt="" class="img-fluid"></a>
</div>
<nav class="nav-menu d-none d-lg-block">
<ul>
<li class="active"><a href="index.html">Home</a></li>
<li><a href="index.html#about">About</a></li>
<li class="drop-down"><a href="#services">Services</a>
<ul>
<li><a href="cybersecurity.html">Cybersecurity</a></li>
<li><a href="software.html">Bespoke Software</a></li>
<li><a href="upskilling.html">Upskilling</a></li>
</ul>
</li>
<li><a href="index.html#team">Team</a></li>
<li><a href="index.html#contact">Contact</a></li>
</ul>
</nav>
</div>
</header>
<main id="main">
<section id="cybersecurity" class="cybersecurity">
<div class="container">
<div class="section-title" data-aos="zoom-out">
<p>Cybersecurity</p>
</div>
<div class="row content" data-aos="fade-up">
<div class="col-md-6">
<p>
Could your organisation afford to lose revenue, customers or hard-won reputation? Unfortunately,
these can be the consequences of a successful cyberattack – and such attacks are increasingly
common.
</p>
<p>
At Tekchain, we offer a wide range of services to help you embed robust security practices into
the fabric of your business, minimising the likelihood of a security breach.
</p>
</div>
<div class="col-md-6">
<p>
Drawing on our extensive experience in the field, we offer a pragmatic and tailored approach,
based on years of working with enterprise-grade security. With a background in R&D and real-life
application across multiple sectors, our consultants will identify any security risks within
your systems and help you determine the best way to address them – keeping malicious actors at
bay.
</p>
</div>
</div>
</div>
</section>
<section id="features" class="features">
<div class="container">
<ul class="nav nav-tabs t-features">
<li class="nav-item t-feature-item">
<a class="nav-link active show" data-toggle="tab" href="#tab-1">
<h4 class="">Strategy<br/>and<br/>Risk Management</h4>
</a>
</li>
<li class="nav-item t-feature-item">
<a class="nav-link" data-toggle="tab" href="#tab-2">
<h4>Security Architecture<br/>and<br/>Engineering</h4>
</a>
</li>
<li class="nav-item t-feature-item">
<a class="nav-link" data-toggle="tab" href="#tab-3">
<h4 class="">Cryptography<br/>and<br/>Key Management</h4>
</a>
</li>
<li class="nav-item t-feature-item">
<a class="nav-link" data-toggle="tab" href="#tab-4">
<h4 class="">Cloud Security</h4>
</a>
</li>
<li class="nav-item t-feature-item">
<a class="nav-link" data-toggle="tab" href="#tab-5">
<h4 class="">DevSecOps</h4>
</a>
</li>
</ul>
<div class="tab-content" data-aos="fade-up">
<div class="tab-pane active show" id="tab-1">
<div class="row">
<div class="col-md-8">
<p>
As well as assisting on specific security issues, we offer strategic guidance on the
management of security and risk. Our services are designed to help organisations looking
to take a long-term view, and ensure you have the correct procedures and controls in
place to successfully protect your business.
</p>
<p>
An important aspect of our strategic advice is to optimise the return of your investment
in security measures, ensuring your money is being spent wisely. We can review your
setup to identify cost-saving opportunities (for example, cyber liability insurance
premiums may be reduced by addressing underwriters' concerns with specific "point
solutions").
</p>
<p>
To help you define your security strategy, we start by analysing the status quo.
Identifying and classifying the critical assets that make up your business (eg. systems,
data, trade secrets and so on), and working with you to determine your organisation’s
attitude to risk, we develop a clear, actionable roadmap to get you where you need to
be. This roadmap covers everything from quick wins to more gradual, longer-term changes,
and it’s fully customised to your risk appetite, budget and timeframe.
</p>
</div>
<div class="col-md-4 d-flex align-items-center justify-content-center">
<img src="assets/img/svg/analysis.svg" class="img-fluid" alt="Strategy and Risk Management"/>
</div>
</div>
</div>
<div class="tab-pane" id="tab-2">
<div class="row">
<div class="col-md-8">
<p>
We help you weave solid security fundamentals into the fabric of your operation – no
matter where you are in your journey.
</p>
<p>
Working with your team, we conduct a wide-ranging appraisal of your existing
security
architecture, and go into fine detail with deep dives into your infrastructure and
codebase.
</p>
<p>
Our nuanced understanding allows us to recommend or build security
controls
that keep you on top of threats and vulnerabilities as they occur.
</p>
</div>
<div class="col-md-4 d-flex align-items-center justify-content-center">
<img src="assets/img/svg/sketch_1.svg" class="img-fluid" alt="Security Architecture and Engineering"/>
</div>
</div>
</div>
<div class="tab-pane" id="tab-3">
<div class="row">
<div class="col-md-8">
<p>
In today’s world, successfully operating your business demands that you ensure the
confidentiality, integrity and authenticity of your data. The use of strong cryptography
supported by a solid key management foundation allows you to protect your sensitive
information, which is more important than ever; infringements of data legislation such
as GDPR can incur huge fines.
</p>
<p>
To ensure the security of data belonging to you and your customers, we offer a full
suite of cryptographic services – typically starting with a crypto audit.
</p>
<p>
Our audit serves to increase awareness around your current situation, and how strong
your cryptography and the processes around key management really are. We’ll uncover any
weaknesses in your systems before helping you to adopt a modern approach to cryptography
and key management. The result? A cost-effective route to achieve the crypto agility you
need to face down advances in the field of cryptanalysis.
</p>
</div>
<div class="col-md-4 d-flex align-items-center justify-content-center">
<img src="assets/img/svg/encryption.svg" class="img-fluid" alt="Cryptography and Key Management"/>
</div>
</div>
</div>
<div class="tab-pane" id="tab-4">
<div class="row">
<div class="col-md-8">
<p>With the cloud touching every element of modern digital operations it’s crucial to ensure
the security model is well understood. Cloud security rests on a shared responsibility
model, which calls for clarity between the cloud provider and customer, to define who is
responsible for securing what.
</p>
<p>
It’s also important to select the right cloud deployment and service models for your own
circumstances. These can vary based on your unique needs, anticipated workload and
security requirements, but a sound security architecture will be required whatever the
setup.
</p>
<p>
We can help you put the right security procedures, controls and techniques in place for
every element of your cloud deployment – including those involving cloud migration,
multi-cloud architecture and big data.
</p>
</div>
<div class="col-md-4 d-flex align-items-center justify-content-center">
<img src="assets/img/svg/artificial_intelligence_1.svg" class="img-fluid" alt="Cloud Security"/>
</div>
</div>
</div>
<div class="tab-pane" id="tab-5">
<div class="row">
<div class="col-md-8">
<p>
Organisations that successfully handle cybersecurity realise a cultural shift is as
necessary as any technological one. Embracing this and approaching security as a shared
responsibility is the way to develop a long-standing resilience to evolving threats.
</p>
<p>
Hence the rise of DevSecOps – a delivery mindset that rolls development, security and
operations into a single holistic approach. DevSecOps avoids the problems that commonly
arise from more siloed functions, where security considerations can either fall between
the gaps or become involved too late in delivery.
</p>
<p>
As your DevSecOps capability matures, it will become a competitive advantage. Having the
correct skills, procedures and security tooling working together throughout the pipeline
allows you to put high quality software in the hands of your customer far more quickly.
</p>
<p>
At Tekchain we’re experienced in delivering critical systems using a DevSecOps approach.
As such we’re well-placed to advise you on how to embed the tailored mix of technologies
and best practices that are involved.
</p>
</div>
<div class="col-md-4 d-flex align-items-center justify-content-center">
<img src="assets/img/svg/collaboration.svg" class="img-fluid" alt="DevSecOps"/>
</div>
</div>
</div>
</div>
</div>
</section>
<section id="cta" class="cta">
<div class="container">
<div class="row" data-aos="zoom-out">
<div class="col-lg-9 text-center text-lg-left">
<h3>Want to learn more?</h3>
<p>We’d be happy to discuss how our services could fit into your programme.</p>
</div>
<div class="col-xs-12 col-lg-3 cta-btn-container text-center">
<a class="cta-btn align-middle" href="index.html#contact">GET IN TOUCH</a>
</div>
</div>
</div>
</section>
</main>
<footer id="footer">
<div class="container">
<div class="social-links">
<a href="https://www.linkedin.com/company/tekchain" class="linkedin"><i class="bx bxl-linkedin"></i></a>
</div>
<div class="copyright">
© Copyright <strong><span>Tekchain</span></strong>. All Rights Reserved.
</div>
</div>
</footer>
<a href="#" class="back-to-top"><i class="ri-arrow-up-line"></i></a>
<script src="assets/js/bundle.js"></script>
<script src="assets/js/main.js"></script>
</body>
</html>