With growing advancements in modern technology, businesses today have become more and more vulnerable to the risk of cyber-attacks and security infringements. It has become imperative that organizations safeguard their assets from such existing and unforeseen threats.

Our Security experts at TCG Digital use their knowledge, experience and processes to help enterprises through the following service offerings :

  • Vulnerability Assessment
  • Penetration Testing
  • ISO 27001 implementation
  • Risk Assessment
  • Botnet and APT Simulation
  • Application Security
  • Mobile Application security Testing
  • Source Code Auditing
  • IoT Security Testing
  • Network security
  • Forensic analysis
Advisory Services
TCG Digital helps its clients to implement different international standards like ISO 27001 (ISMS), ISO 22301 (BCMS) etc. to comply with the requirements of those global good practices.
Payment Card Industry Data Security Standard (PCI DSS) is followed by merchants who accept, process, store or transmit credit card information. TCG Digital helps different financial organizations, retailers to implement and assess the compliance with PCI DSS.
Business Continuity Plan is mandatory for business houses requiring 24/7 uptime. Tests to be conducted at defined interval to ensure effectiveness of the plan. TCG Digital helps organization to frame business oriented continuity plan by doing proper outage impact analysis.
TCG Digital conducts security and compliance audit of ATM operations as per guidelines of RBI and PCI-DSS standards.
With the exponential increase in usage of personal mobiles devices within corporate network it is becoming mandatory to have some mechanism to avoid / reduce the scope of data breach/leak by applying "Bring you own device" policy. Trojans, Malware, theft, unsecured or Jailbroken devices, and a lack of proper control put corporate data at risk. The answer to this problem is to create and enforce BYOD policy guidelines to secure your work environment.
With more reliance on clouds, data and applications are becoming more decentralized and distributed across numerous cloud service providers (CSPs).

Audit on Governance, Data Management, Data Environment, Cyber Threat, Infrastructure, Logs and Audit Trails, Identity and Access Management using the standard ISO27001,NIST, PCIDSS etc. are done by experienced consultants of TCG Digital.
Assessment Services
A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network.

At TCG Digital we thoroughly audit the hardware, firmware, or software, Operating system or application vulnerability or design deficiency that leaves NOC and SOC open to potential exploitation, either externally or internally, resulting in the risk of compromise of information, alteration of information or denial of service.
It can be web, network, mobile or cloud application. At TCG Digital testings are done using different tools followed by manual testing.
Vulnerability Assessment and Penetration Testing (VAPT) helps you to find out vulnerabilities and flaws of your network, websites, servers, operating systems, applications etc. through which an attacker can get access to your critical business information. The test report of TCG Digital comprises of details of all vulnerabilities along with their remediation.
It is an effective technique for identifying security flaws in the coding. If the application is secured in code level the attack surface is reduced a lot to the application being made. At TCG Digital we also manually verify all the vulnerabilities that a automated tool generates. This reduces false positive results.
Computer forensic is the collection, preservation, analysis , identification and presentation of computer related evidence that can be useful in criminal cases for the purpose of facilitation or furthering the reconstruction of events found to be criminal.

AT TCG Digital we :-
  • Identify root cause of an event
  • Who was responsible for the event?
  • Gather, process, store, and preserve evidence to support the prosecution of the culprit(s), if desired.
  • To determine the motivation and intent of the attackers.
  • Using the correct investigative tools and procedures to maximize effectiveness of evidence gathering.



Col. Pankaj Verma

+91 9428212820

Sudipto Jena

+91 9958110278

Abir Atarthy

+91 9434243285

Vikash Chauhan

+91 9582248088

Joydeep Bhattacharya

+91 9830184530