<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Projects Archives - Vayucast</title>
	<atom:link href="https://www.vayucast.com/category/projects/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vayucast.com/category/projects/</link>
	<description>Security in Layers</description>
	<lastBuildDate>Tue, 25 May 2021 15:09:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.1</generator>

<image>
	<url>https://www.vayucast.com/wp-content/uploads/2021/05/vayucastfavicon-90x90.png</url>
	<title>Projects Archives - Vayucast</title>
	<link>https://www.vayucast.com/category/projects/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>THREAT AND VULNERABILITY ASSESSMENT</title>
		<link>https://www.vayucast.com/threat-and-vulnerability-assessment/</link>
					<comments>https://www.vayucast.com/threat-and-vulnerability-assessment/#respond</comments>
		
		<dc:creator><![CDATA[superadmin]]></dc:creator>
		<pubDate>Mon, 28 Nov 2016 06:04:19 +0000</pubDate>
				<category><![CDATA[Projects]]></category>
		<guid isPermaLink="false">http://demo.accesspressthemes.com/parallaxsome/?p=189</guid>

					<description><![CDATA[<p>Context A medium sized mass media and telecommunications company engaged Cyber Security Team to perform vulnerability tests across the various technological security domains including the externally facing networks, internal networks, wireless networks and physical environment. What we did The scope of the vulnerability assessment included various technology security domains as following: – Email Phishing Campaign – Goal-based External </p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/threat-and-vulnerability-assessment/">THREAT AND VULNERABILITY ASSESSMENT</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Context</strong></p>
<p>A medium sized mass media and telecommunications company engaged Cyber Security Team to perform vulnerability tests across the various technological security domains including the externally facing networks, internal networks, wireless networks and physical environment.</p>
<p><strong>What we did</strong></p>
<p>The scope of the vulnerability assessment included various technology security domains as following:</p>
<ul>
<li>– Email Phishing Campaign</li>
<li>– Goal-based External and Internal Network Penetration Test &amp; Attack Tree Analysis</li>
<li>– Wireless Penetration Test</li>
<li>– Goal-based Web Application Penetration Test</li>
<li>– Goal-based Physical Security Penetration Test</li>
</ul>
<p><strong>Outcome</strong></p>
<p>This engagement helped the business to to identify relevant vulnerabilities by performing a network security and vulnerability assessment. This includes:</p>
<ol>
<li>Gaining an understanding of the potential weaknesses exposed to the Internet (e.g. resources accessible from the Internet) both at a wired/wireless network and application level;</li>
<li>Conducting a sample based review of specific systems to determine whether they contain security weaknesses;</li>
<li>Assessing the effectiveness of the security controls and awareness of the office locations in different provinces; and</li>
<li>Documenting and bringing to management’s attention of the potential weaknesses observed.</li>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Please contact us to discuss your Cybersecurity needs:</p>
[contact-form-7]
<p>The post <a rel="nofollow" href="https://www.vayucast.com/threat-and-vulnerability-assessment/">THREAT AND VULNERABILITY ASSESSMENT</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vayucast.com/threat-and-vulnerability-assessment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PRIVILEGED ACCESS MANAGEMENT</title>
		<link>https://www.vayucast.com/privileged-access-management/</link>
					<comments>https://www.vayucast.com/privileged-access-management/#respond</comments>
		
		<dc:creator><![CDATA[superadmin]]></dc:creator>
		<pubDate>Mon, 08 Aug 2016 06:08:06 +0000</pubDate>
				<category><![CDATA[Projects]]></category>
		<guid isPermaLink="false">http://demo.accesspressthemes.com/parallaxsome/?p=71</guid>

					<description><![CDATA[<p>Context A medium sized insurance company was concerned with password theft of privileged accounts due to malware and installation of key-loggers. There was a needed to implement multi-factor authentication for privileged accounts and also track usage of sensitive credentials. The existing IAM environment was not matured enough to handle additional requirements and increased volume. What </p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/privileged-access-management/">PRIVILEGED ACCESS MANAGEMENT</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Context</strong></p>
<p>A medium sized insurance company was concerned with password theft of privileged accounts due to malware and installation of key-loggers. There was a needed to implement multi-factor authentication for privileged accounts and also track usage of sensitive credentials. The existing IAM environment was not matured enough to handle additional requirements and increased volume.</p>
<p><strong>What we did</strong></p>
<ul>
<li>– Completed PAM assessment, strategy and two year implementation roadmap.</li>
<li>– Developed requirements, architectural design and project plan</li>
<li>– Integrated the PAM solution with enterprise IAM solution, LDAP, SIEM / SOC monitoring tool.</li>
</ul>
<p>Outcome</p>
<ul>
<li>– Well defined and repeatable privileged account management processes and tools were implemented.</li>
<li>– Implementation of centralized account repository facilitated scalable future application integrations.</li>
<li>– Enterprise privileged accounts were fully secured, monitored and controlled.</li>
<li>– Multi-factor authentication protected against malware.</li>
<li>– Improved control structure and regulatory compliance by centralizing User’s access to sensitive resources across the enterprise.</li>
</ul>
<p>&nbsp;</p>
<p>Please contact us to discuss your Cybersecurity needs:</p>
[contact-form-7]
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/privileged-access-management/">PRIVILEGED ACCESS MANAGEMENT</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vayucast.com/privileged-access-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ENTERPRISE IAM STRATEGY</title>
		<link>https://www.vayucast.com/enterprise-iam-strategy/</link>
					<comments>https://www.vayucast.com/enterprise-iam-strategy/#respond</comments>
		
		<dc:creator><![CDATA[superadmin]]></dc:creator>
		<pubDate>Mon, 08 Aug 2016 06:04:08 +0000</pubDate>
				<category><![CDATA[Projects]]></category>
		<guid isPermaLink="false">http://demo.accesspressthemes.com/parallaxsome/?p=68</guid>

					<description><![CDATA[<p>Context Transit provider was seeking to bring greater efficiency to managing the existing manual and complex system access validation processes. There was also a need to reduce the manager time and expenses inherent in reviewing more than 500,000 entitlements and access rights. What we did Reviewed and assessed the current IAM environment with respect to </p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/enterprise-iam-strategy/">ENTERPRISE IAM STRATEGY</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Context</strong></p>
<p>Transit provider was seeking to bring greater efficiency to managing the existing manual and complex system access validation processes. There was also a need to reduce the manager time and expenses inherent in reviewing more than 500,000 entitlements and access rights.</p>
<p><strong>What we did</strong></p>
<ul>
<li>Reviewed and assessed the current IAM environment with respect to future business requirements.</li>
<li>Established target state operating model for transit provider to scale its services</li>
<li>Laid out 5 year roadmap for accomplishing growth vision.</li>
</ul>
<p><strong>Outcome</strong></p>
<ul>
<li>IAM strategy was developed in support of the transit authority’s future growth plans.</li>
<li>Existing processes were analyzed in order to identity bottlenecks in the account lifecycle which lead to creation and modification of 70+ provisioning workflows.</li>
<li>User onboarding/offboarding cycle time was significantly improved.</li>
<li>Transit authority is reviewing prioritized list of target systems and existing IAM infrastructure as result of he IAM strategy.</li>
</ul>
<p>&nbsp;</p>
<p>Please contact us to discuss your Cybersecurity needs:</p>
[contact-form-7]
<p>The post <a rel="nofollow" href="https://www.vayucast.com/enterprise-iam-strategy/">ENTERPRISE IAM STRATEGY</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vayucast.com/enterprise-iam-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DIGITAL IDENTITY STRATEGY</title>
		<link>https://www.vayucast.com/digital-identity-strategy/</link>
					<comments>https://www.vayucast.com/digital-identity-strategy/#respond</comments>
		
		<dc:creator><![CDATA[superadmin]]></dc:creator>
		<pubDate>Mon, 08 Aug 2016 06:00:08 +0000</pubDate>
				<category><![CDATA[Projects]]></category>
		<guid isPermaLink="false">http://demo.accesspressthemes.com/parallaxsome/?p=65</guid>

					<description><![CDATA[<p>Context Canadian Telecom carrier was seeking to answer how to provide key services to meet the growing digital identity needs of consumers, and the private and public sectors. An encompassing Cosnumer IAM strategy was needed to formulate product offerings demanded by growth in Digital Identity space. What we did – Review of relevant trends – </p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/digital-identity-strategy/">DIGITAL IDENTITY STRATEGY</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Context</strong></p>
<p>Canadian Telecom carrier was seeking to answer how to provide key services to meet the growing digital identity needs of consumers, and the private and public sectors. An encompassing Cosnumer IAM strategy was needed to formulate product offerings demanded by growth in Digital Identity space.</p>
<p><strong>What we did</strong></p>
<ul>
<li>– Review of relevant trends</li>
<li>– Evaluation of the tools required to stand up a Digital Identity platform</li>
<li>– Competitive analysis on different technologies, models and approaches to Digital Identity .</li>
<li>– Development of detailed use cases for Digital Identity platform.</li>
</ul>
<p><strong>Outcome</strong></p>
<p>Through the work performed to date, there have been a number of positive outcomes:</p>
<ul>
<li>– Clear definition of the Digital Identity product strategy.</li>
<li>– Clear strategy on Telecom’s involvement in Digital Identity sector for broad participation across the full ecosystem.</li>
<li>– Deep understanding of the competitive landscape and the different models to enable Digital Identity platform.</li>
<li>– Executive support to proceed with the vision.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/digital-identity-strategy/">DIGITAL IDENTITY STRATEGY</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vayucast.com/digital-identity-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IDENTITY AND ACCESS GOVERNANCE</title>
		<link>https://www.vayucast.com/identity-and-access-governance/</link>
					<comments>https://www.vayucast.com/identity-and-access-governance/#respond</comments>
		
		<dc:creator><![CDATA[superadmin]]></dc:creator>
		<pubDate>Mon, 08 Aug 2016 05:51:11 +0000</pubDate>
				<category><![CDATA[Interior]]></category>
		<category><![CDATA[Projects]]></category>
		<guid isPermaLink="false">http://demo.accesspressthemes.com/parallaxsome/?p=62</guid>

					<description><![CDATA[<p>Context A local hydro and utilities company wanted to facilitate user access recertification for various departments in order to meet internal governance and NERC CIP compliance requirements. Existing manual provisioning process was very cumbersome and lacked the required auditing capabilities. What we did – Built the full IGA server infrastructure for Dev, Test and Production </p>
<p>The post <a rel="nofollow" href="https://www.vayucast.com/identity-and-access-governance/">IDENTITY AND ACCESS GOVERNANCE</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Context</strong></p>
<p>A local hydro and utilities company wanted to facilitate user access recertification for various departments in order to meet internal governance and NERC CIP compliance requirements. Existing manual provisioning process was very cumbersome and lacked the required auditing capabilities.</p>
<p><strong>What we did</strong></p>
<ul>
<li>– Built the full IGA server infrastructure for Dev, Test and Production</li>
<li>– Enabled new processes surrounding NERC CIP role request and termination.</li>
<li>– Provisioning raccess to NERC resources automatically based on request approvals.</li>
</ul>
<p><strong>Outcome</strong></p>
<ul>
<li>– Resulting new process flows in the IAM solution led to a better posture for maintaining NERC CIP compliance.</li>
<li>– The solution was extended to form a role repository and perform role-based certifications.</li>
<li>– The solution facilitated detection of segregation of duty violations which were addressed as part of regular audit cycles.</li>
<li>– User access request and certification process was automated, leading to significant cost savings and shifting focus of capital expenditure budgests to value-add projects.</li>
</ul>
<p>&nbsp;</p>
<p>Please contact us to discuss your Cybersecurity needs:</p>
[contact-form-7]
<p>The post <a rel="nofollow" href="https://www.vayucast.com/identity-and-access-governance/">IDENTITY AND ACCESS GOVERNANCE</a> appeared first on <a rel="nofollow" href="https://www.vayucast.com">Vayucast</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.vayucast.com/identity-and-access-governance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
