top of page

Offerings in Cyber Security and IT Infrastructure Services

Marg Inc has partnered with Litmus Information Systems LLP established in 2016, with an employee strength of 250 in providing the following services

Litmus' Offering in IT Infrastructure Space

Litmus-02.png

Litmus' Offerings

Litmus-03.png

Support backed by the Centre of Excellence

Litmus-04.png

Litmus' Consolidated Monitoring

Litmus-05.png

Litmus’ Offerings Pillars

Availability Management

  • OS Clustering

  • Network HA

  • Database HA

  • Middleware HA

  • Backup & Recovery Setup

  • Disaster Recovery Design – RTO, RPO & RCO

  • DR Test

  • Compromised Computer Recovery Setup

Performance Management

  • Proactive Monitoring

  • Application Performance Management

  • Database Performance Troubleshooting

  • Middleware Memory Management

  • Network LAN / WAN Performance Management

Cyber Security Management

  • Robustness of IT Assessment

  • Cyber Security Framework

  • Cyber Security Implementation

  • Security Standards like ISO, PCI DSS setup

  • Privileged Account Management & PIM

  • Firewall Management

  • SOC Monitoring Centre

Process Management

  • ISMS Process

  • LLD Process Documentation

  • Monitoring Services Process

  • IT Infrastructure Management SOPs

  • Configuration Management Process

  • Incident Management & Problem Management

  • Change Management

  • Complete ITIL-Based Process Setup for Organizations

Litmus’ IT Assessment Philosophy

Litmus-01.png

Assessment Philosophy

  • Litmus, with its experience in implementing and managing huge data centers and IT Infrastructure, strongly feels that if an organization reduces the gaps in High Availability, Performance, and Security with stringent IT Process adherence, then it will result in a Robust It Infrastructure, which in turn increases the Business Application's Stability. And Stable Business application provides a boost to Customer's Confidence.
     

  • Since Hardcore, Handson conducts the assessment. IT Infrastructure Professionals, the outcome is more real-time rather than Checklist based.
     

  • Typically, Litmus conducts the assessment remotely & from a customer site, depending on the scope of assessment.
     

  • Litmus, with its IT Infrastructure Expertise, not only provides Gaps but also Remediation to plug these gaps.

Scope of Robustness of IT Assessment "RITA"

  • Study the current architecture

  • Interview Key associates at Customer and Hosting Partner

  • Understand Business Application Criticality

  • Understand Business Uptime requirements and Performance Requirements

  • Understand the Security Architecture deployed

  • Study the Underpinning Contracts

  • Documents Business' Expected SLA

  • Perform Single Point of Failure Analysis

  • Perform Configuration Assessment on Servers, and Network equipment's using Litmus-owned tool

  • Perform Vulnerability & Penetration Testing Assessment using the owned tool

  • Review Process Document and Adherence of process in day-to-day operations

  • Reviews BCP with RTO, RPO & RCO commitments and provides gaps

  • Perform Litmus "IT Robustness assessment" methodology.

Litmus – Robustness of IT Infrastructure Assessment Methodology

Business Criticality

  • Technology Staff Expertise Analysis

  • SLA Management

  • Backup Management Gaps

  • Standards and Process adherence

  • Business Legal Compliance Need

  • Business 3rd Party Audit Needs

  • Inventory of Application

  • Application Critically Metrix

  • Business Application Uptime Need

  • IT Support Methodology

  • Application Monitoring Methodology 

Security

  • Internal Vulnerability Assessment

  • External Penetration Assessment

  • Organization's ISMS Manual

  • SIEM Log Monitoring

  • File Integrity Management

  • Network Security Gaps identification

  • System Security Gaps identification

  • DLP Implementation

  • Firewall Implementation Gaps

  •  3rd Party Audit Compliance

  • Physical Security Gaps

  • Legal Compliance

Availability

  • Network Cluster Configuration Check

  • Applications Relationship Mapping

  • DR Requirement Study RPO & RTO

  • Assessment of Dynamic & Static Data RCO

  • Replication Methodology For Dynamic Data

  • Replication Methodology For Static Data

  • Asset Auto Discovery Study

  • Architecture Diagram Study

  • Single Point of Failure Analysis

  • OS Cluster Configuration Check

  • Application Cluster Configuration Check

  • DB Cluster Configuration Check

Process

  • 3rd Party Audit Compliance

  • S&P Manual Update

  • S&P Adherence

  • Supplier Contracts

  • License Management

  • Technology Change Management

  • Release Management

  • Incident Management

  • Business Continuity Process

  • DR Procedure

  • Business Process Monitoring

Performance

  • Threshold Setting Soft and Hard Thresholds

  • Compute Monitoring

  • Application Monitoring

  • Database Monitoring

  • Network Monitoring

  • Monitoring Process

  • Event Correlation Process and Tool

  • Website Performance Monitoring

  • End-User Experience Monitoring Tool

  • DR Monitoring Process

  • Replication Monitoring Process

  • Load Balancer Monitoring

Assessment Methodology

  • Availability Gap Analysis 

  • Performance Gap Analysis

  • Security Gap Analysis

  • Process Gap Analysis

  • Interview with Customers

  • Gaps & Remediation Report

  • Business Application Study

  • Business Application to Infrastructure Mapping

  • Onsite Data Collection

  • Organizations Process Document Collection

  • Underpinning Contract Study

  • SLA Discussions

Litmus has conducted the Robustness of IT Infrastructure Assessments for the following organizations

kalpurbank.jpg
cse.jpg
nabard.jpg
acuity.jpg
CAL.jpg
exim.jpg
andromeda.jpg
eps.jpg
BBPS.jpg
gem.jpg
bartleet.jpg
QX.jpg

Litmus Core Values

Be Customer’s Extended Arm

Solution would be Scalable

Full Business Transparency

Solution would be Cost Effective

Provide Operational Ease

Passion & Integrity

Cyber Security
in-depth

“We Manage You Control”

bottom of page