Founded in 1990 ACPL has steadfastly focused and grown steadily in the Information Security Space. Over the years ACPL has emerged as a leading specialist provider of end-to-end Quality Solutions in the area of information security to customers across India ? Products, Services, Training and Consultancy. Innovative R&D & Strategic Associations with Global Leaders in each segment has enabled us to always offer the best of breed Information Security Solutions to our customers ? helping them manage the "e" & "I" of their business for profits. Our Vision:- Leadership gained by assisting organisations to help them secure their Information Assets and to continually progress through specific custom designed end to end solutions that fit their special needs and are consistently a class apart!
|Business Type||Service Provider|
|Firm Type||Pvt Ltd.|
Service Providers Training and Consultancy services.
Our Service List:-
ACPL Systems offers Products:-
Enterprise wide Antivirus Solutions
Intrusion Detection Systems
Security Policy Implementers
Single Sign On
ACPL Information Security Solutions:-
Internet Content Security.
Nokia Enables Secure
Reliable Connectivity Solutions
Manageable Connectivity Solutions.
Mcafee System Protection
Internet Security Systems
Prevent Attacks Against Online Assets.
Networked Enterprises Needing.
Check Point Software Technologies (Www.Checkpoint.Com)
Securing The Internet.
FortinetS Award-Winning Fortigateseries Of Asic-Accelerated Antivirus Firewalls Are The New Generation Of Real-Time Network Protection Systems.
Rsa Security Offers The Widest Range Of Authentication Options.
Websense Enterprise Software Enables Businesses To Monitor, Report, And Manage How Their Employees Use The Internet.
Barracuda Networks Is The Worldwide Leader In Plug And Play Appliances That Protect Email Infrastructure.
-Assessment And Analysis Services
-Technology Deployment Services
Assessment And Analysis Services:-
Acpl Assessment And Analysis Services Include:
Network Architecture Reviews
Asset Value Assessment
Intrusion Testing And Physical Security Assessments
Product Analysis And Code Reviews
Network & Host Security Assessments.
Technology Deployment Services:-
Our Consultants Are Experts At Implementing:
Proxy And Packet-Filtering Firewalls
Intrusion Detection Systems (Idss)
Virtual Private Networks (Vpns)
Public Key Infrastructure (Pki)
Deliverables For Deployment Services Vary With Each Project, But They Often Include Detailed Operations Guides For Your New Systems, Security And Operations Training For Your Staff, And Ongoing Support For Additional Deployment Requirement.
Man Aged Services:-
We Have Excellent Pool Of Certified And Trained Personnel On The Following Technologies -
Enterprise Antivirus Solutions
Intrusion Detection Expert
Intrusion Prevention Expert
Access Control Expert
Acpl?S Information Risk Management (Irm) Practice Provides A Complete Range Of Independent Consultancy Services Addressing All Aspects Of Information Security, Business Continuity And Risk Management At Both Technical And Management Levels.
Our Consultants Help And Advise Clients In Attaining Their Business Objectives By Using Our Business Objectives Oriented Risk-Based (B.O.O.R.A) Methodology To All Projects. They Are Equipped To Engage In Assignments From Either A Top-Down Perspective - Addressing The Totality Of A Client'S It Infrastructure Or Business Operations - Or Through Focused Engagements Addressing Previously Identified Areas Of Concern Or Risk.
Security Reviews & Gap Analysis
Security Strategy & Architecture
Security Strategy Includes:-
At A Minimum, The Security Policy That Is Developed Includes:
Defining Information Security Clearly And Providing A Statement Of Management?S Security Standards.
Describing Specific Security Requirements:-
Compliance With Legislative And Contractual Requirements,
Education, Detection, And Prevention,
Standards For Ensuring Business Continuity,
Roles And Responsibilities,
Processes For Reporting Suspected Security Incidents, And
Maintaining The Security Policy Document Itself.
Security Policy Consulting Includes:
Reviewing Each Client'S Business And The Related Security Goals And Requirements.
Assessing Current It Strategy And Security Concerns, As Well As New Developing Requirements For Security Management.
Comparing And Contrasting Existing Security Strategies To Best Practice Standards And Business Expectations.
Providing Clear Security Policies For Management And For Operational Staff.
No. 401, Bakshi House, 40-41, Nehru Place.
New Delhi, 110019 (Delhi) - (India)