Call Us - +91 844 8444 025 | Email - contact@esecforte.com
logo dark logo light logo
  • Company
    • About Us
    • Our Blog
    • Careers
    • Meet The Team
    • Technology Partners
    • Contact Us
  • Services
    • Specialized Security Services
      • Red Team Assessment
      • DevSecOps /Secure DevOps
      • Container Security
      • Social Engineering
      • Forensic Analysis
      • Incident Response & Malware Analysis
      • Cloud Security Assessment
    • Security Assessment Services
      • Vulnerability Assessment
      • Web Application Security
      • Mobile Application Security Testing
      • Source Code Review
      • Wireless Network Assessment
      • Penetration Testing Services
      • Configuration Assessment
    • Security Consulting Services
      • Security Risk and Gap Assessment
      • Information Security Maturity Assessment
      • Policy & Procedures
      • User Security Awareness
      • System Integration Services
      • Business Continuity Planning
    • Compliances
      • PCI DSS QSA
      • ISO 27001
      • CERT-INDIA
      • SAMA Compliance
      • NESA Compliance
  • Solutions
    • Security Management
      • NxSAM-Security Audit Management
      • CyberObserver
    • SD WAN
      • Cato Networks – SD WAN
    • Firewall Management
      • Tufin Orchestration Suite
    • Application Security
      • HCL Appscan
      • Arxan Application Protection
      • BurpSuite Pro
      • Microfocus
    • Vulnerability Management
      • Nessus
      • Tenable IO
      • Tenable SecurityCenter
    • Container Security
      • Twistlock
    • Security Suite
      • Fortinet
      • Checkpoint
      • Ixia
      • Shape
      • Palo Alto Networks
    • Forensic Software
      • Forensic Toolkit – FTK
      • Atola Insight Forensic
      • IDA Pro
      • MH Forensic Workstation
    • Penetration Testing
      • Core Impact
    • Data Loss Prevention
      • GTB Technologies
      • Forcepoint
    • Privileged Access Management
      • Beyond Trust
    • Threat Intelligence
      • Zerofox
    • SIEM
      • Logrhythm
  • Clients
  • Case Studies
  • Events
    • Upcoming Events & Trainings
      • Trainings
    • Past Events
      • DSCI 2020
      • NULLCON 2020
      • DSCI 2019
      • BSides Delhi 2019
      • RSA Conference 2019 APJ
      • FRAUD & BREACH SUMMIT: BENGALURU 2019
      • AISS 2018 | NASSCOM – DSCI Annual Information Security Summit
      • BSides Delhi 2018
      • International Police Expo 2018
      • Infosec Intelligence Conclave 2017
      • BSides Delhi 2017
      • DSCI – AISS 2017
    • Past Trainings
      • Secure DevOps Training
      • VAPT & Privileged Access Management Workshop : Dhaka
      • DevOps Security Training Bangalore
      • Cyber Security & Agility Technical Workshop : New Delhi
      • Cyber Security & Agility Technical Workshop : Bangalore & Mumbai
      • VAPT & SAST Workshop
      • Tufin CONNECT 2018
      • Tenable Interlock Session – 2nd February 2018
      • Checkmarx & Netsparker Hands-on Training
Contact Us
logo dark logo light logo
  • Company
    • About Us
    • Our Blog
    • Careers
    • Meet The Team
    • Technology Partners
    • Contact Us
  • Services
    • Specialized Security Services
      • Red Team Assessment
      • DevSecOps /Secure DevOps
      • Container Security
      • Social Engineering
      • Forensic Analysis
      • Incident Response & Malware Analysis
      • Cloud Security Assessment
    • Security Assessment Services
      • Vulnerability Assessment
      • Web Application Security
      • Mobile Application Security Testing
      • Source Code Review
      • Wireless Network Assessment
      • Penetration Testing Services
      • Configuration Assessment
    • Security Consulting Services
      • Security Risk and Gap Assessment
      • Information Security Maturity Assessment
      • Policy & Procedures
      • User Security Awareness
      • System Integration Services
      • Business Continuity Planning
    • Compliances
      • PCI DSS QSA
      • ISO 27001
      • CERT-INDIA
      • SAMA Compliance
      • NESA Compliance
  • Solutions
    • Security Management
      • NxSAM-Security Audit Management
      • CyberObserver
    • SD WAN
      • Cato Networks – SD WAN
    • Firewall Management
      • Tufin Orchestration Suite
    • Application Security
      • HCL Appscan
      • Arxan Application Protection
      • BurpSuite Pro
      • Microfocus
    • Vulnerability Management
      • Nessus
      • Tenable IO
      • Tenable SecurityCenter
    • Container Security
      • Twistlock
    • Security Suite
      • Fortinet
      • Checkpoint
      • Ixia
      • Shape
      • Palo Alto Networks
    • Forensic Software
      • Forensic Toolkit – FTK
      • Atola Insight Forensic
      • IDA Pro
      • MH Forensic Workstation
    • Penetration Testing
      • Core Impact
    • Data Loss Prevention
      • GTB Technologies
      • Forcepoint
    • Privileged Access Management
      • Beyond Trust
    • Threat Intelligence
      • Zerofox
    • SIEM
      • Logrhythm
  • Clients
  • Case Studies
  • Events
    • Upcoming Events & Trainings
      • Trainings
    • Past Events
      • DSCI 2020
      • NULLCON 2020
      • DSCI 2019
      • BSides Delhi 2019
      • RSA Conference 2019 APJ
      • FRAUD & BREACH SUMMIT: BENGALURU 2019
      • AISS 2018 | NASSCOM – DSCI Annual Information Security Summit
      • BSides Delhi 2018
      • International Police Expo 2018
      • Infosec Intelligence Conclave 2017
      • BSides Delhi 2017
      • DSCI – AISS 2017
    • Past Trainings
      • Secure DevOps Training
      • VAPT & Privileged Access Management Workshop : Dhaka
      • DevOps Security Training Bangalore
      • Cyber Security & Agility Technical Workshop : New Delhi
      • Cyber Security & Agility Technical Workshop : Bangalore & Mumbai
      • VAPT & SAST Workshop
      • Tufin CONNECT 2018
      • Tenable Interlock Session – 2nd February 2018
      • Checkmarx & Netsparker Hands-on Training
Contact Us
mobile-logo
Contact Us
  • Company

    • About Us
    • Our Blog
    • Careers
    • Meet The Team
    • Technology Partners
    • Contact Us
  • Services

    • Specialized Security Services
      • Red Team Assessment
      • DevSecOps /Secure DevOps
      • Container Security
      • Social Engineering
      • Forensic Analysis
      • Incident Response & Malware Analysis
      • Cloud Security Assessment

    • Security Assessment Services
      • Vulnerability Assessment
      • Web Application Security
      • Mobile Application Security Testing
      • Source Code Review
      • Wireless Network Assessment
      • Penetration Testing Services
      • Configuration Assessment
    • Security Consulting Services
      • Security Risk and Gap Assessment
      • Information Security Maturity Assessment
      • Policy & Procedures
      • User Security Awareness
      • System Integration Services
      • Business Continuity Planning

    • Compliances
      • PCI DSS QSA
      • ISO 27001
      • CERT-INDIA

      • SAMA Compliance

      • NESA Compliance

  • Solutions
    • Security Management
      • NxSAM-Security Audit Management
      • CyberObserver
    • SD WAN
      • Cato Networks – SD WAN
    • Firewall Management
      • Tufin Orchestration Suite
    • Application Security

      • HCL Appscan
      • Arxan Application Protection
      • BurpSuite Pro
      • Microfocus
    • Vulnerability Management

      • Nessus
      • Tenable IO
      • Tenable SecurityCenter
    • Container Security

      • Twistlock
    • Security Suite
      • Fortinet

      • Checkpoint

      • Ixia

      • Shape

      • Palo Alto Networks

    • Forensic Software

      • Forensic Toolkit – FTK
      • Atola Insight Forensic
      • IDA Pro
      • MH Forensic Workstation
    • Penetration Testing

      • Core Impact
    • Data Loss Prevention
      • GTB Technologies
      • Forcepoint
    • Privileged Access Management
      • Beyond Trust
    • Threat Intelligence

      • Zerofox
    • SIEM
      • Logrhythm
  • Clients
  • Case Studies
  • Events
    • Upcoming Events & Trainings
      • Trainings
    • Past Events
      • DSCI 2020
      • NULLCON 2020
      • DSCI 2019
      • BSides Delhi 2019
      • RSA Conference 2019 APJ
      • FRAUD & BREACH SUMMIT: BENGALURU 2019
      • AISS 2018 | NASSCOM – DSCI Annual Information Security Summit
      • BSides Delhi 2018
      • International Police Expo 2018
      • Infosec Intelligence Conclave 2017
      • BSides Delhi 2017
      • DSCI – AISS 2017
    • Past Trainings
      • Secure DevOps Training
      • VAPT & Privileged Access Management Workshop : Dhaka
      • DevOps Security Training Bangalore
      • Cyber Security & Agility Technical Workshop : New Delhi
      • Cyber Security & Agility Technical Workshop : Bangalore & Mumbai
      • VAPT & SAST Workshop
      • Tufin CONNECT 2018
      • Tenable Interlock Session – 2nd February 2018
      • Checkmarx & Netsparker Hands-on Training

Case Studies

We assure you high quality deliveries every time and on time!

vulnerability assessment Services
Vulnerability Management – World’s Largest Semiconductor Manufacturer
bank_afganistan
ISMS Implementation – Bank of Afghanistan
network_assessment
Wireless Assessment / Network Audit for a Telecom Giant
Application Audit for A Leading Indian Govt. Bank
oil-and-gas
Vulnerability Assessment for India’s Leading Oil & Gas Company
aviation1
Leading Indian Civil Aviation Infrastructure Company
Privileged Access Management Solution for a Leading Bank
Security Audit of World’s Largest Airport
Risk Assessment for one of the Largest Banks in India
Firewall Management Solution for Telecommunication Solution Provider
Business Continuity Plan Assessment for a leading Public Sector Bank
Case Studies - Application Assessment
Assessment of 100+ Applications for a leading Mongolian bank
Information Security Maturity Assessment for a leading bank in Sri Lanka
NESA compliance for a leading insurance firm in UAE
Red Team Assessment for a leading Indian Bank
Designed and implemented CI/CD for one of the largest banks in India
Forensics Infrastructure Setup for State Law Enforcement Agency
PCI DSS assessment for a fintech company in Singapore
PCI DSS assessment for a leading Fintech company
Mobile Application Security Services
cms_web_development
Web & CMS Development
network_assessment
Network Security Implementation
ANI_media
Leading News Agency in India
patient-management_system
Patient Management System
Reach Us

GURUGRAM:
Plot No. 311, Udyog Vihar Phase- IV, Gurugram – 122015
+91 124-4264666

BANGALORE:
143, 3rd Floor, 10th Cross, Indira Nagar 1st Stage, Bangalore – 560038

+91 80 41208825

MUMBAI:
Plot C-59, Bandra Kurla Complex, Bandra East, Mumbai- 400051
+91 98118 61551

SINGAPORE:
eSec Forte​® Technologies Singapore PTE Ltd.
1 North Bridge Road, #11-10, High Street Centre, Singapore 179094
+65 31650903

SRI LANKA:
eSec Forte Technologies Lanka Pvt. Ltd
Level 26 & 34, East Tower, World Trade Center, Echelon Square, Colombo, 00100, Sri Lanka
+94 772513065

Specialized Security Services

Red Team Assessment
DevSecOps/Secure DevOps
Container Security
Social Engineering Services
Forensic Analysis
Incident Response & Malware Analysis
Cloud Security Assessment

Security Consulting Services

Security Risk and Gap Assessment
Information Security Maturity Assessment
Policy & Procedures
User Security Awareness
System Integration Services
Business Continuity Planning

Security Assessment Services

Vulnerability Assessment
Web Application Security
Mobile Application Security
Source Code Review
Wireless Assessment
Penetration Testing Services
Configuration Assessment

Compliances

PCI DSS QSA
ISO 27001
SAMA Compliance
NESA Compliance

About us | Our Blog | Career | Meet the Team | Technology Partners | Contact us
Follow Us

Copyright 2010-2020 eSec Forte® Technologies Pvt. Ltd.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptCookies Policy