POSTS
15
December 2016
Blog Post Title
18
September 2016
Hello world!
PORTFOLIO
SEARCH
SHOP
  • Your Cart Is Empty!
Your address will show here +12 34 56 78
See what our Professionals did in last few years

 

Our Projects

Best Of DPI Consulting


  • Text Hover

Security Access and Vulnerability Testing

PROJECT BRIEF:

 

Provide security consulting to ensure Optus devices (firewalls / laptops etc) are used to facilitate logical access (e.g. serial or telnet access) to the solution by the vendor or its agents within Optus facilities.

Ensure devices are sanitised after use or at a regular interval.
Implement dedicated virtual terminal.
Implement 3rd party review of all vulnerabilities prior to granting access to Optus network. This included imposing stringent firewall rules/policies, end point protection, vulnerability mitigation and only allow identified protocols

 

NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU


 

Security management

K04 Security and firewall management including delivery “as a service”


Location of Engagement

Sydney

 

Engagement Price

$75000

  

Start Date (if applicable)

Dec 2015

 

End Date/ Delivery Date

March 2016

  

Client Organisation

Optus

 

  • Text Hover

Write Security policy for Optus ICT environmentg

PROJECT BRIEF

 

Implement new policy framework including the review and approval of policy development across the organisation for ISO 27001 Audits.

Review and mature existing IT policies, guidelines and procedures.
Review the risk management, framework and supporting policies, guidelines and processes to ensure adequate systems of control are in place which are routinely performed, are effective and comply with legislative requirements, best practice and relevant ISM / PSM / PCI standards.

Assist with the coordination of external audits like 27001/2

 

NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU


 

Security management

K01 Security strategy including delivery “as a service”

 

Location of Engagement

Sydney

 

Engagement Price

$75000

  

Start Date (if applicable)

Dec 2015

 

End Date/ Delivery Date

April 2015

  

Client Organisation

Optus

 

  • Text Hover

Undertake Deployment of Cisco ISE for NBN environment and ensure that testing meets agreed standards

PROJECT BRIEF:

 

Manage the planning and delivery of complex and/or large scale ICT projects such as the Cisco ISE implementation across NBN.

Switch and Wireless LAN Controller Configuration.

  1. Required to Support Cisco ISE Functions.
  2. Ensure Cisco ISE is able to interoperate with network switches.

Configure network switches with the necessary NTP, RADIUS/AAA, 802.1X, MAB, and other settings for communication with Cisco ISE.

Enable Your Switch to Support Standard Web Authentication.

Define a Local Username and Password for Synthetic RADIUS Transactions.

Set the NTP Server to Ensure Accurate Log and Accounting Timestamps.

Enable AAA Functions.

RADIUS Server Configuration.

Configure Switch to Send RADIUS Accounting Start/Stop to Inline Posture Nodes.

Enable RADIUS Change of Authorization (CoA).

Enable Device Tracking and DHCP Snooping.

Enable 802.1X Port-Based Authentication.
Use EAP for Critical Authentications.
Throttle AAA Requests Using Recovery Delay.
Define VLANs Based on Enforcement States.
Define Local (Default) ACLs on the Switch.
Enable Cisco Security Group Access Switch Ports.
Enable EPM Logging.
Enable SNMP Traps.
Enable SNMP v3 Query for Profiling.
Enable MAC Notification Traps for Profiler to Collect.
Configure the RADIUS Idle-Timeout.
Set Up Wireless LAN Controller for iOS Supplicant Provisioning.
FIPS Support on Wireless LAN Controller with Inline Posture Node.
Troubleshoot on 802.1x.


NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU


 

Security management

K02 Security management security and firewall installation including delivery “as a service”

 

Location of Engagement

Sydney

 

Engagement Price

$55000

  

Start Date (if applicable)

Aug 2014

 

End Date/ Delivery Date

Aug 2014

  

Client Organisation

NBNCo

 

  • Text Hover

SIEMS Implementation for Dataengine environment

PROJECT BRIEF

 

DataEngine infrastructure had no uniform way of monitoring customers logs for operational intelligence. Customer business generated massive volumes of data every millisecond of every day. This machine data contains a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. DPI Consulting was responsible for 3 tier implementation ( Search head / Indexer / Forwarder) of Splunk to co-relate data for operational intelligence and put alerts on the dash for Tier -1 security analyst.

Manage and administer.

  1. Splunk, Arcsight, SSLVPN, ASA firewall and Sourcefire appliances.
  2. F5 LTM, ASM and APM, iRules.
  3. PKI, HSM, Remote access.
  4. Proxy servers / web servers.

Manages operational and project risks proactively, ensuring existing and emerging risks are identified and effective risk mitigation strategies are implemented.

Undertake systematic monitoring and scanning of the enterprise’s external environment to identify emerging technologies that have the potential to create value.

Develop and implement project management plans and reporting streams to ensure and track project success.

 

NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU


 

Security management

K02 Security management security and firewall installation including delivery “as a service”

 

Location of Engagement

Sydney

 

Engagement Price

$85000

  

Start Date (if applicable)

Dec 2015

 

End Date/ Delivery Date

Feb 2016

  

Client Organisation

Data Engines

 

  • Text Hover

Audit that suppliers must comply with the physical and logical security requirements set out in the Commonwealth Protective Security Manual (PSM) and ISM

PROJECT BRIEF:

 

The work involved DPI Consulting to ensure that Boral Physical and logical security requirements have been accredited according to AS/NZS 17799.2:2003 “Information security management, Part 2 Specification for information security management systems and ISO9001 2000.

Review Boral physical security policy describes procedures that apply within Boral and includes plan for following areas.

  1. Reception areas
  2. General office areas
  3. Computer/Communications rooms
  4. Warehouse/Storage areas
  5. Data processing areas
  6. Loading docks
  7. Utility areas
  8. External storage areas

Review the computer storing the data is located in a secure area and data retention is agreed as per customer requirement.

Access to computer room is restricted to those staff members or third parties with a specific requirement as defined by their job specification. All visitors to computer/communications rooms are escorted at all times by a Boral staff member unless cleared to act without supervision. Logical access controls like electronic cards/tokens (swipe or proximity), Login name / complex password, encryption protect access to all computer/communications.

NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU


 

Security management

K03 Security testing including delivery “as a service

 

Location of Engagement

Sydney

 

Engagement Price

$44000

  

Start Date (if applicable)

Sep 2015

 

End Date/ Delivery Date

Dec 2016

  

Client Organisation

Boral