info@promasecure.com
(+968) 2459 0810 - 12
Facebook
Twitter
Linkedin
Home
About
Consultancy
International Standards - ISO / BS
ISMS : ISO 27001:2013 - Information Security Management
BCMS:ISO 22301:2012-Business Continuity Management System
ITSM/SMS:ISO 20000:2011 - Service Management System
RM:ISO 31000:2009 - Risk Management Framework
ITG:ISO 38500:2008 - IT Governance
EA:ISO 19439:2006 - Enterprise Integration Architecture
ICT DR:ISO 24762:2008 - Disaster Recovery
EM:ISO 14001:2004 - Environmental Management
AM:ISO 55000:2014 - Asset Management System
OHSAS 18001 - Occupational Health & Saftey System
Frameworks
OGEAF - OMAN Government Enterprise Architecture Framework
TOGAF - The Open Group Architecture Framework
ITIL - Information Technology Infrastructure Library
CMMi - Capability Maturity Model Integration
NIST RMF - Risk Management Framework
NIST CSF - Cyber Security Framework
ITAF - Information Technology Assurance Framework
BMIS - Business Model for Information Security
Domain Based
DLP - Data Loss Prevention
BCM - Business Continuity Management
DR- Disaster Recovery Planning
DRM - Digital Rights Management /IRM - Information Rights Management
Inforamtion Classification Method
IT Governance
Development of IS Policy & Procedures
Information Security Awareness
IT Strategy Development
Operation Centers
SOC - Security Operation Center
NOC - Network Operation Center
Physical Security
CCTV Surveillance / Access Management / Physical Security Zoning
Other Standards Process Standard based on
PCI-DSS - Payment Card Industry Data Security Standards
COBIT4.1 / COBIT5
UPTIME Institute / TIA-942
Data Center / Disaster Recovery Site Standards
Tier based Standards
Assurance
Information System Audit
Internal Audit Function
External Assurance Auditing
IT General Controls Audit
IT Infrastructure Baseline Audit
Scope Based Application Audit
Generic Application Audit
Firewall Audit
Functional Application Audit
Oracle EBS Audit
SAP Audit
Core Banking Application Audit
Financial Application Auditt
IT Scope based IT Device Audit
UTM - Unified Threat Management System Audit
Firewall Device Audit
SIEM Audit (Log Management)
General Network Audit (Include Wireless Network)
Vulnerability Assessment & Penetration Testing
Networks Testing
VA - Vulnerability Assessment
IPT - Internal Penetration Testing
EPT - External Penetration Testing
Application Penetration Testing
Web Application Penetration
Mobile Application Penetration
Generic Application Penetration
Security Assessments
CERT Advisory
ISF Advisory
OWAP Top 10
SANS Top 20
Mobile Application Security
PCI-Payment Card Industry
ISO Standards
Security Metric Assessment
Standard Based Benchmark Audit
Datacenter / DR Site
TIA-942 / Uptime benchmark audit - Tier based
Technology Services
Enterprise tool based consultation & implementation
GRC - Governance Risk & Compliance
ITSM - Information Technology Service Management
DLP - Data Loss Prevention
BI - Business Intelligence
IT Governance
ERM - Enterprise Risk Management
PCI - Payament Card Industry
BC - Business Continuity
DR - Disaster Recovery
BIA - Business Impact Analysis
SIEM - Security Information & Event Management
IAM - Idendity & Acess
AM - Asset Management
UTM - Unified Threat Management
Enterprise Backup
Endpoint Security
BYOD - Device Management
Relationship
Clients
Partners
Contact / More
Contact
Security as a Service
Information Security Audit as a Service
Project Management Methodology
Focus Refocused
Relationship
Clients
Our Clients
We deliver the best value to our stakeholders.
Show All