Get the most out of Our Hands-On Training Sessions

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified Global Consultation and Implementation firm, We believe in precision and quality above everything else. The areas of our expertise include Information Security and Cyber Security. Our success stories are translated in the form of positive testimonials from our growing list of clients.

VAPT & Privileged Access Management Workshop- Dhaka

ARCON | Privileged Access Management (formerly Known as ARCOS) is a highly effective solution that helps in managing, controlling and monitoring privileged user activities. The solution provides IT security team with a centralized policy framework to authorize the privileges based on role and responsibilities and provide rule-based restricted access to privileged accounts.

The solution mitigates data breach threats by providing a deepest level of granular control over privileged users access to OSes, databases, applications and other critical target systems. In addition, the solution offers multi-factor authentication and robust password vaulting that ensures authorized access to target systems.

ARCON Privileged Access Management also provides comprehensive audit logs of all privileged sessions.

Tenable®, Inc. is the Cyber Exposure company, providing continuous network monitoring and vulnerabilities exposure for any organisation across environments such as IT, DevOps, Mobile, Cloud and IoT and aims at reducing the attack surface, providing enough visibility and remediation plan.

  • SecurityCenter ®: Evaluates the vulnerable data across the enterprise, prioritize security risk, ensure compliances, assurance report cards, customisable dashboards and more.. ultimately providing a clear picture of your security posture.
  • SecurityCenter Continuous View®: Continuous visibility and advanced analytics, assets visibility, complete network monitoring, correlates real-time activity with vulnerable data.
  • Nessus®: Deployed by millions of users and 24000+ organisations worldwide, to identify vulnerabilities, policy violating configurations and malware attacks.
  • Protect any asset on any computing environment be it cloud, mobile devices, containers and web applications.

Core Impact: The most powerful tool in your security arsenal which exploits security weaknesses. Replicate attacks and enable organisations to detect, prevent and respond to real-world attacks across multi vectors such as Network, Web & Mobile.

  • Test more common vulnerability exploits than the competition
  • Ensure vulnerabilities are remediated
  • Client Side Testing
  • Phishing
  • Social Engineering Attacks
  • Dynamic Credential Capturing

Kindly Register for VAPT & Privileged Access Management Workshop to join senior network security professionals for an invitation-only Lunch and in-depth conversation.


City:      Dhaka, Bangladesh
Date:    29th January 2019 (Tuesday)
Time:    10:00 am – 5:00 pm
Venue:  Grand Oriental Hotel, Plot-1/B, Road-23, Gulshan-1, Dhaka-1212.
RSVP:   Kindly confirm your participation to:
Name : Rajesh Kumar
Mobile : +91 880 069 9595
Phone :  +91 804 120 8825

Register Today ! Save your Seat!

Note : This event requires registration & confirmation. Kindly Register by Filling up the Form!

Contact Us for Specialized Training Session

Getting started is simple. Just Contact us today and we’ll start to create a customized training plan built around you.