Happiest Minds brings ThreatVigil a security solution

|February 18, 2015 0
Image courtesy of Stuart Miles at freedigitalphotos.net
It will offer an intuitive mobile penetration testing

BANGALORE, INDIA: Happiest Minds has announced its upgraded version of Cloud based penetration testing, ThreatVigil, which will offer an intuitive mobile penetration testing module encompassing Android, iOS and Windows platforms.

This expansion to cover various mobile applications is over and above the existing security testing modules currently being used by other organizations globally for their Cloud security assessment, Web Application security testing, Network and infrastructure security testing, Secure SDLC and Database security testing.

Available On-Demand, the cloud based penetration testing offering has been developed with a combination of industry proven automated tools and in-depth manual assessment techniques. This facilitates Zero False Positives and comprehensive business logic testing based on industry standard frameworks like OWASP, WASC, NIST, etc. and helps organizations meet regulatory requirements such as Sarbanes-Oxley, GLBA, PCI and HIPAA.

___________________________________________________________________________________________________________

Prasenjit Saha, CEO, Infrastructure Management Services and Security Business, Happiest Minds Technologies said, “The impetus provided to our iSaaS platform through the ThreatVigil offering will be by far, the industry?s most exhaustive security testing solution in the area of threat management in cloud, mobile, network and applications security testing.”

ThreatVigil will facilitate security testing, remediation and protection of mobile applications against targeted attacks and will enable compliance with internal & external policies and regulations.

Enterprises today are embracing the BYOD (bring your own device) more than ever before. It’s becoming challenging by the day for Enterprises to adopt a BYOD strategy and ensure they are not vulnerable to security breaches. This cannot be achieved unless they adopt methods and technologies for mobile application security testing and risk assurance, communicated Saha.

No Comments so fars

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.