Security If you’re a business with online transactions, or collecting valuable customer information, you should consider a cyber security plan for your online business. ICG can assist in network transformation,GRC, cloud and data centre with complete ownership of securing enterprise information by determining security requirements; preparing security standards, policies, and procedures. ICG extends consultative experience by leading & evaluating the security components of solution architectures with a focus on cloud. Our expertise also fall around determining security requirements, design specifications, and compliance controls as well validating adherence to security policies, standards, and industry-accepted best practices. ICG can provide deep technical expertise regarding security risks and risk mitigation approaches, and assist in the creation of a unified approach to security to support the rapid evolution and innovation needs of information technology projects and cloud migration projects. Specialities SOC Monitoring Services: Soc-as-a-service Security Incident and Crisis Support Forensic Analysis Cloud Monitoring Endpoint Detection & Response (EDR) Database Audit & Monitoring (DAM) Data Loss Prevention Next-Gen Firewalls SOC Management Services: Soc-as-a-service Patch Management Vulnerability Management Endpoint Detection & Response (EDR) Database Audit & Monitoring (DAM) Data Loss Prevention Next-Gen Firewalls