Choose another country to see content specific to your location

//Select Country

Cyber Security Solutions with Up to 80% Grant Support

SMEs Go Digital – Pre-Approved Solutions

WHAT IS SMEs GO DIGITAL PROGRAMME?

Launched in April 2017, the SMEs Go Digital programme by the Infocomm Media Development Authority (IMDA) aims to help SMEs use digital technologies and build stronger digital capabilities to seize growth opportunities in the digital economy.
(Source: IMDA)

SMEs Go Digital

IMDA

 

PRE-APPROVED SOLUTIONS WITH UP TO 80% GRANT SUPPORT TILL DEC 2020

Under the programme, SMEs can apply for proven SME-friendly cyber security solutions pre-approved by IMDA to meet your business needs. Government grants such as PSG are available to enable your businesses for the digital future and to help lower the barrier of cost for the adoption of the following TÜV SÜD cyber security solutions:

  • Attack Surface Assessments and Penetration Testing

    Security Configuration Review

    • Reviews the configuration settings of operating systems, databases, devices etc against cyber security hardening industry benchmarks;
    • Ensure that systems are hardened to the best within your business needs to prevent vulnerabilities from being exploited;
    • Assure your customers that their user accounts are unlikely to be breached by attackers and their personal data in the applications are kept secure.

    Web Application Grey-Box Penetration Testing (Limited Scope)

    • A lightweight service as compared to a full-scope penetration test, a faster turnaround period;
    • Tests the login mechanism and session management of the web application; 
    • Ensure that the first line of defence of the web application will not be easily compromised by malicious attackers; 
    • Assure your customers that their user accounts are unlikely to be breached by attackers and their personal data in the application can be kept secure.

    Web Application Grey-Box Penetration Testing (Full Scope)

    • Includes all the assessments in the limited scope and also test cases based on OWASP and MITRE which are not covered in the limited scope;
    • Covers test cases from OWASP Top 10 2013-2017, injection based attacks as well as privilege escalation;
    • Assurance to customers that the web application is not affected by the common vulnerabilities that web applications are commonly subjected to;
    • Your customers can feel confident that their Personal Identifiable Information (PII) will be handled securely while using the web application.

    Endpoint Black-Box Penetration Testing

    • Targets the vulnerabilities of an endpoint from an attacker’s point of view;
    • The objective is to mimic real-life hacking scenarios an attacker uses to gain access to the endpoint from an outside in approach;
    • Assure your customers that the endpoint is unlikely to be subjected to an external attack.

    Click here for more details.

  • Cyber Security Assessments

    Security Architecture Review (Small System)

    • Security Architecture Review focuses on the architecture of the IT system (<6 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • The outcome of this exercise feeds into other deliverables in this advisory service. 

    Security Architecture Review with Threat & Risk Assessment (TRA) (Small System)

    • Security Architecture Review focuses on the architecture of the IT system (<6 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • A threat and risk assessment is a systematic process of identifying various threats and vulnerabilities to the IT system, based on the likelihood and impact of potential cyber attacks;
    • Business processes change over time and the cyber security landscape is constantly evolving, hence there is a need to perform regular risk assessments and keep the risk register updated. 

    Security Architecture Review with TRA and Control Review

    • Security Architecture Review focuses on the architecture of the IT system (<16 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • The outcome of this exercise feeds into other deliverables in this assessment service. 

    Security Architecture Review with TRA (Large System)

    • Security Architecture Review focuses on the architecture of the IT system (<16 Hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • A threat and risk assessment is a systematic process of identifying various threats and vulnerabilities to the IT system, based on the likelihood and impact of potential cyber attacks;
    • Business processes change over time and the cyber security landscape is constantly evolving, hence there is a need to perform regular risk assessments and keep the risk register updated.

    Click here for more details.

 

TÜV SÜD IS A GLOBALLY TRUSTED CYBER SECURITY SERVICE PROVIDER

With the support of our highly skilled Vulnerability Assessment and Penetration Testing (VAPT) and Cyber Security assessment experts, TÜV SÜD can support SMEs in identifying cyber security flaws within their solutions & infrastructure to minimise the cyber-attack surface. 

SMEs like yours, can now enhance the security posture of your solutions with access to our cyber security experts. Starting off with a ‘healthcheck’ of your solution, your company will be able to determine how secure your solutions are and whether there is an urgent need to go for further testing.

Embark on a cyber secure future with TÜV SÜD now – fill up the form on this page and we will be in touch with more details!

 

YOUR BUSINESS BENEFITS

We work closely with you to determine your requirements before providing recommendations on the type of assessments or testing services you can go for. Upon completion of our services, the SME will receive a report to determine the next course of action.

  • Detailed report – Our experienced cyber security experts will provide detailed documentation of the outcome of the tests.
  • Suggestions for network security improvements – By performing penetration tests, TÜV SÜD's experts not only expose security gaps, we also provide recommended solution(s) on how to close them.
  • In-depth assessment – TÜV SÜD can tailor a unique programme to suit your organisation’s needs. We can provide penetration tests on a regular basis spanning different areas with differing requirements to ensure the overall security of your business.
  • Build customer trust and confidence – By demonstrating that the security of your customers’ data and records is one of your company’s top priorities.

Next Steps

Select Your Location

Global

Americas

Asia

Europe

Middle East and Africa