Authentication and Authorization
To audit and identify weaknesses in your Authentication and Authorization model
To define security rules, policies, procedures, or guidelines specified by the management to control access and usage of confidential information.
Security control management
Design policy and operate security control:DOS/DDOS, Firewall, IDS, IPS and Endpoint security