SMEs Go Digital Pre-Approved Cyber Security Solutions

SMEs Go Digital – Pre-Approved Solutions

SMEs Go Digital – Pre-Approved Solutions

WHAT IS SMEs GO DIGITAL PROGRAMME?

Launched in April 2017, the SMEs Go Digital programme by the Infocomm Media Development Authority (IMDA) aims to help Small and Medium Enterprises (SMEs) use digital technologies and build stronger digital capabilities to seize growth opportunities in the digital economy.
(Source: IMDA)

SMEs Go Digital

IMDA

NOTE: The government grants applicable for the IMDA SMEs Go DigitalProgramme are under review. For updates / enquiry, please contact us here.

PRE-APPROVED SOLUTIONS

Under the programme, SMEs can apply for proven SME-friendly cyber security solutions pre-approved by IMDA to meet your business needs. SMEs will be able to evaluate the security of their technologies as they proceed with their Industry Digital Plans to improve productivity. Government grants such as PSG are available to enable your businesses for the digital future and to help lower the barrier of cost for the adoption of the following TÜV SÜD SME cyber security solutions:

  • Attack Surface Assessments and Penetration Testing

    Security Configuration Review

    • Reviews the configuration settings of operating systems, databases, devices etc against cyber security hardening industry benchmarks;
    • Ensure that systems are hardened to the best within your business needs to prevent vulnerabilities from being exploited;
    • Assure your customers that their user accounts are unlikely to be breached by attackers and their personal data in the applications are kept secure.

    Web Application Grey-Box Penetration Testing (Limited Scope)

    • A lightweight service as compared to a full-scope penetration test, a faster turnaround period;
    • Tests the login mechanism and session management of the web application; 
    • Ensure that the first line of defence of the web application will not be easily compromised by malicious attackers; 
    • Assure your customers that their user accounts are unlikely to be breached by attackers and their personal data in the application can be kept secure.

    Web Application Grey-Box Penetration Testing (Full Scope)

    • Includes all the assessments in the limited scope and also test cases based on OWASP and MITRE which are not covered in the limited scope;
    • Covers test cases from OWASP Top 10 2013-2017, injection based attacks as well as privilege escalation;
    • Assurance to customers that the web application is not affected by the common vulnerabilities that web applications are commonly subjected to;
    • Your customers can feel confident that their Personal Identifiable Information (PII) will be handled securely while using the web application.

    Endpoint Black-Box Penetration Testing

    • Targets the vulnerabilities of an endpoint from an attacker’s point of view;
    • The objective is to mimic real-life hacking scenarios an attacker uses to gain access to the endpoint from an outside in approach;
    • Assure your customers that the endpoint is unlikely to be subjected to an external attack.

    Click here for more details.

  • Cyber Security Assessments

    Security Architecture Review (Small System)

    • Security Architecture Review focuses on the architecture of the IT system (<6 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • The outcome of this exercise feeds into other deliverables in this advisory service. 

    Security Architecture Review with Threat & Risk Assessment (TRA) (Small System)

    • Security Architecture Review focuses on the architecture of the IT system (<6 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • A threat and risk assessment is a systematic process of identifying various threats and vulnerabilities to the IT system, based on the likelihood and impact of potential cyber attacks;
    • Business processes change over time and the cyber security landscape is constantly evolving, hence there is a need to perform regular risk assessments and keep the risk register updated. 

    Security Architecture Review with TRA and Control Review

    • Security Architecture Review focuses on the architecture of the IT system (<16 hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • The outcome of this exercise feeds into other deliverables in this assessment service. 

    Security Architecture Review with TRA (Large System)

    • Security Architecture Review focuses on the architecture of the IT system (<16 Hosts); 
    • Asset details and system architectural information are consolidated and high-level system vulnerabilities potentially exploitable by hackers can be identified; 
    • A threat and risk assessment is a systematic process of identifying various threats and vulnerabilities to the IT system, based on the likelihood and impact of potential cyber attacks;
    • Business processes change over time and the cyber security landscape is constantly evolving, hence there is a need to perform regular risk assessments and keep the risk register updated.

    Click here for more details.

 

TÜV SÜD IS A GLOBALLY TRUSTED SME CYBER SECURITY SOLUTIONS SERVICE PROVIDER

With the support of our highly skilled Vulnerability Assessment and Penetration Testing (VAPT) and Cyber Security assessment experts, TÜV SÜD can support SMEs in identifying cyber security flaws within their solutions & infrastructure to minimise the cyber-attack surface. 

SMEs like yours, can now enhance the security posture of your solutions with access to our cyber security experts. Starting off with a ‘healthcheck’ of your solution, your company will be able to determine how secure your solutions are and whether there is an urgent need to go for further testing. 

 

YOUR BUSINESS BENEFITS

We work closely with you to determine your requirements before providing recommendations on the type of assessments or testing services you can go for. Upon completion of our services, the SME will receive a report to determine the next course of action.

  • Detailed report – Our experienced cyber security experts will provide detailed documentation of the outcome of the tests.
  • Suggestions for network security improvements – By performing penetration tests, TÜV SÜD's experts not only expose security gaps, we also provide recommended solution(s) on how to close them.
  • In-depth assessment – TÜV SÜD can tailor a unique programme to suit your organisation’s needs. We can provide penetration tests on a regular basis spanning different areas with differing requirements to ensure the overall security of your business.
  • Build customer trust and confidence – By demonstrating that the security of your customers’ data and records is one of your company’s top priorities.

Next Steps

Site Selector