We're #hiring a new IBM Guardium Data Protection Specialist in Mumbai, Maharashtra. Apply today or share this post with your network.
About us
Welcome to CoreGenix, the ultimate destination for all your IT and OT requirements. Our esteemed team comprises seasoned experts who excel in delivering tailor-made IT solutions, aimed at assisting our clients in accomplishing their business goals. At CG Consultancy and Engineering Services (CGCES), we pledge to unravel intricate technological dilemmas through meticulous planning and consulting services. Rest assured, every project undertaken by CGCES strictly complies with relevant standards and specifications.
- Website
-
www.coregenix.in
External link for CoreGenix
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- Mumbai
- Type
- Privately Held
- Founded
- 2004
Locations
-
Primary
Mumbai
Mumbai, IN
Employees at CoreGenix
-
Modassir Tanweer
Ex-Locuz SHI / Ex-Wipro / Ex-Black Box
-
Swati Shukla
Business Development Executive
-
MOHAMMAD TAHA ANSARI
Security Consultant |Risk Assessment|Endpoint protection |Internal Audit & Compliance| CEH | Cybersecurity (Isc2)
-
Prashant Sandanshiv
Account Manager || CoreGenix || IT Consulting || Cybersecurity
Updates
-
Discover how Zero Trust Network Access (ZTNA) transforms multi-cloud security in this comprehensive infographic. Let's talk more about ZTNA. Monika Goyal Yusuf Shaikh Ashok Singh M TEJESHWAR BS Adithyan Santhosh Yashwanth K s Surya Paramita Sengupta Varun P
-
With AI transforming the cybersecurity landscape, cybercriminals are leveraging advanced tools to automate attacks, bypass defenses, and steal critical data. For India to combat these evolving threats, the focus must shift to proactive strategies. But what should take precedence according to you? Vote and be a part of our journey in cyber awareness. #CyberAwareness #AIDefense #FutureOfSecurity Monika Goyal Yusuf Shaikh Ashok Singh M Varun P Stuti Belwal TEJESHWAR BS Adithyan Santhosh Lavanya N Paramita Sengupta Devanand Mahakud Yashwanth K s Surya
This content isn’t available here
Access this content and more in the LinkedIn app
-
Streamline employee onboarding and offboarding with automated #IAM tools. Prevent gaps in security by ensuring timely access updates, while reducing manual effort and errors in managing user privileges. For industry's finest IAM solutions, contact us. #CloudIAM #AccessManagement #SecurityAutomation #TechSolutions Monika Goyal Yusuf Shaikh Yashwanth K s Surya Ashok Singh M Varun P TEJESHWAR BS Adithyan Santhosh Paramita Sengupta Devanand Mahakud
-
Leverage automated log correlation and predictive analysis to detect vulnerabilities in real time. Optimize operational workflows while maintaining the integrity of your cloud environment. Experience security redefined through AI innovation. Secure Your Systems, Connect with us today! #SecOpsAutomation #LogAnalysis #AIinCybersecurity #OperationalExcellence Monika Goyal Yusuf Shaikh Ashok Singh M Varun P
-
Your first line of defense is awareness. Gain actionable insights with CoreGenix Cyber Risk Assessments and protect what matters most. Email us to know more about our solutions. Monika Goyal Yusuf Shaikh Ashok Singh M Varun P #CyberResilience #RiskManagement #ITSecurity
-
Stay ahead of the game with rapid response and smarter detection. Let deception technology guide your IT and SecOps teams to what matters most. 🎯 Connect with CoreGenix team today. #TechDefense #DeceptionTech #IntrusionPrevention Monika Goyal Yusuf Shaikh
-
Key Rule Sets for SIEM Compliance as per SEBI, RBI: 1. Authentication Logs: Monitor failed/successful login attempts, privilege escalation, and unauthorized access. 2. Audit Trail: Track all administrative actions, user account modifications, and system configuration changes. 3. Transaction Monitoring: Log and analyze financial transactions for any anomalies or failures. 4. File Integrity Monitoring: Ensure integrity of critical files (e.g., sensitive data, system configurations). 5. Network Security: Detect unusual network activity, including port scanning, unauthorized access, and DDoS attempts. 6. Data Exfiltration: Monitor large file transfers or downloads of sensitive data. 7. Incident Response: Automate active responses for critical events such as IP blocking or service disruption. 8. Log Retention: Ensure compliance with regulatory log retention policies (e.g., 5 years). 9. Compliance Reporting: Generate regular compliance reports for audits and inspections. 10. Access Control: Restrict log and configuration file access to authorized personnel only. 11. Data Privacy Monitoring: Detect unauthorized access to personal or sensitive data, ensuring GDPR or local privacy regulations compliance. 12. Database Activity Monitoring: Monitor for unauthorized queries, data changes, and access to financial databases. 13. Application Security: Track access and changes to critical applications, including ERP or trading systems. 14. System Integrity: Ensure that critical system files and configurations are not altered without proper authorization. 15. Event Correlation: Correlate multiple logs from different sources (firewall, EDR, DLP, etc.) for better threat detection and root cause analysis. 16. Multi-Factor Authentication (MFA): Monitor MFA usage and failed attempts to ensure proper implementation of access control. 17. Security Patch Management: Ensure logs are generated for all security patch installations and updates to meet compliance standards. 18. Internal Threat Detection: Monitor for unusual internal activities, such as employees accessing systems or data outside of their role. 19. Third-Party Integration Logs: Track activities from third-party integrations (e.g., vendors) to detect unauthorized access. 20. Access to Encrypted Data: Monitor attempts to decrypt sensitive data or bypass encryption mechanisms. #SEBI #RBI #SIEM #Cybersecurity #Compliance #Wazuh #Security #RegulatoryCompliance #IncidentResponse #DataPrivacy
-
Reactive security strategies are no longer enough. CoreGenix's Proactive Threat Operation Centre finds vulnerabilities before attackers do. We neutralize risks early, so your business stays secure and resilient. DM us for more information. #CyberDefen se #VulnerabilityDetection #ThreatHunting #SecurityInnovation #CoreGenixSecurity Monika Goyal Yusuf Shaikh
-
CoreGenix offers a quick and highly effective CTEM solution to help organizations in finance, insurance, healthcare, and other sectors uncover vulnerabilities, prioritize risks, and take action. From understanding your attack surface to validating robust defences, CTEM empowers your team to attain a top-tier security posture. With CoreGenix as your trusted partner, your cybersecurity efforts will become smarter, faster, and impactful—helping you focus on growth while we protect your business. Don’t wait for a breach. Implement CTEM today with CoreGenix. #CTEM #CyberSecurity #CoreGenix #RiskManagement #CloudComputing #Cybesecuritystrategy #digitalsecurity Monika Goyal Yusuf Shaikh