Secure your Company with Us. Let us help you to prevent, minimize and control cyber-attacks.
As the world is getting advanced day by day, cyber threats are highly increasing and vulnerability of data is a major concern. With the help of SCSL’s Cyber Security Services and solutions you can not only identify severe threats but also secure your valuable data.
PKI R&D Lab Project
Establishment of CA Monitoring System (CAMS) and Security is a Project under the Office of the Controller of Certifying Authorities (CCA), Information & Communication Technology Division, Ministry of Posts, Telecommunications and ICT, People’s Republic of Bangladesh.
CCA has a number of initiatives to introduce latest developments in digital signature like e-Sign, Unique Identity Service, Central Repository service and so on. Hence, it is required to have a research lab at CCA office to test and enhance the Digital Certificate Portfolio as well as expand and reach the digital certificate domain. The lab will also do research to expand the usage of electronic signatures in various offices/sectors of the Government.
This Lab will also make research on-
1. Technology, Policy, Procedure and Guidelines of PKI,
2. Development of PKI tools in the CCA and provide support (human resource support) for
Research and Development on PKI and Electronic Signature.
3. Support to encourage the CAs for their own PKI related R&D innovation works and development
The PKI Lab will initially consist of One or Two rack-mounted servers and 10 workstations / Desktops divided amongst required distinct subnets and interconnected via a router, two switches and Firewall at back. The initial plan of work has been sub-divided into three (3) distinct phases to facilitate planning and deployment.
The CCA PKI Laboratory project is quite large and complex so the project plan has been sub-divided into seven distinct phases in order to implement our concept. The Seven phases are as follows: Phase 1 – Acquisition, Base Configuration & Networking: All hardware and software will be acquired as part of Phase 1 so that subsequent phases can proceed without interruption. Phase 1 also includes configuration and networking components. Phase 2 – PKI Configuration: This phase will involve the implementation and configuration of both the PKI and the directory software. Phase 3 – Cross-Certification & Validation: Prior to cross-certification being able to occur the directories will need to be linked using either chaining or cross-references. This phase also includes the implementation and configuration of the Validation Authority. Phase 4 - Test Application: Phase 4 includes implementing the messaging infrastructure. Phase 5 - Detail work on the current system’s security and make it more secure to use all over the country. Phase 6 - Research and Implement the E-signature process and make it secure and accurate to use the different Govt. concern Section like- NBR, Education Board Etc. Phase 7 - Test the E-Signature Process on a specific section and find the issue for future implementation and arrange training to use the system to all the sectors in Bangladesh.
Expected benefits
Each project or any work we do is for any kind of benefit. In e-signature it also includes, there are multiple benefits behind this e-signature project. Especially government officials will have to do manual signature less, with the help of this system a document can be signed and verified by digitally which requires less printing cost as there is no requirement of printing. Detecting fraud documents is easier, multiple departments of the government can share signatures using this system which will be easier for government officials to work as well as for normal civilians. This project will not only benefit government officials or civilians, along with them it will enrich our country's R&D center, as this project requires an R&D center.
Procurement of SIEM and WAP (Web Application Protocol Under The Establishment of CA Monitoring System (CAMS) and Security Project
About the project-
Establishment of CA Monitoring System (CAMS) and Security is a Project under the Office of the Controller of Certifying Authorities (CCA), Information & Communication Technology Division, Ministry of Posts, Telecommunications and ICT, People’s Republic of Bangladesh.
Security information and event management (SIEM) is a vital part of cyber defense strategies. his is due to the need to manage the network and have a wide understanding of all the events that happen within. When the cyber security team has this understanding then it becomes easy to notice irregularities within network traffic, therefore becomes easier to pinpoint threats.
Expected benefits
One of the largest roll out of SIEM in country giving the benefits of Splunk SIEM which combines patterns, machine learning and threat intelligence to verify all instances within a network. It offers greater scalability to help with network monitoring and works easily with other tools to improve defenses. This combination provides real-time security monitoring, allowing teams to track and analyze events and maintain security data logs for auditing and compliance purposes. In addition with the 24/7 SOC support it assists achieving–
Streamline compliance reporting
Detect the undetected
Improve the efficiency of incident handling activities
SOC Center Consultancy & VAPT Service Outsourcing
One of prestigious upcoming projects to roll out in international platform under a three tier data center project.
Building a security operation center SCSL will perform:
• Assessing Security Operations Capabilities.
• Defining the SOC strategy.
• Designing the SOC Infrastructure.
• Building the SOC services.
• Preparing the 24/7 SOC services for the start.
In addition with the 24/7 SOC support it assists achieving–
- Streamline compliance reporting
- Detect the undetected
- Improve the efficiency of incident handling activities
- Perform VAPT service
SCSL will deploy -
• People.
• Process.
• Technology.
|| What We Think
Use of advanced Data Correlation strategies to emphasize Best practices in the organization
In a world swarming with data, we deliver intelligent Data Analysis and Visualization. We use advanced Data Correlation strategies to emphasize Best practices in the organization and use machine learning techniques to highlight Positive security capabilities.
We add value and bring perpetual advantages along with it under one umbrella.
Security is our TOP Priority. We drive security eco-systems appreciating the business practices like COBIT, TOGAF, ITGI, NIST, and SABSA. Our security leadership and advisory combined expertise is more than 80+ Years. We add value and bring perpetual advantages along with it under one umbrella.
Conduct Risk Assessment based on Peer as well as Industry Benchmarking
Our assessment methodology focuses on prioritizing the organization’s Security Risk Remediation process based on immediate challenges identified during the assessment. We also conduct Risk Assessment based on Peer as well as Industry Benchmarking.
Cyber Security Consulting and Managed Security Services
We are powered by dedicated, highly experienced and certified cyber security researches. We employ DESIGN THINKING approach to deliver industrial expertise in 'Cyber Security Consulting and Managed Security Services'.
|| What We Do
DTS Digital Transformation Solutions
We provide SD-WAN Engineering & Managed Solutions as well as IT & Cyber Security digital transformation assessment. Our expertise will help you to provide Cost benefit analysis and security...
CSS Continuous Security Services 24 x 7
Our Custom built managed security services will protect your data 24/7. Our SOC Security operations center has Incident management engineering and operations unit to reponse immediatly for any solu...
Vulnerability Assessment & Penetration Testing
We do VAPT for all sorts of IoT & Smart Devices. Moreover we also do Mobile & Web Application Penetration Testing. For data center we have Networks, Systems, API & Cloud environment Pen...
Cyber Security Advisory
If you already have an existing cyber security team, we offer them advanced cyber security trainings. Besides get advice from our certified consultants to secure your data with with proper sol...