Beruflich Dokumente
Kultur Dokumente
Table of Contents
1. Data Base security as in all
a. What are current threats
b. International trends
2. Policy Draft
a. IT policy impacting the DB security
b. How to enforce it?
3. Appliances to Enforce DB Security
a. Perimeter security to secure applications (UTM & IPS/IDS)
b. Prevent DDOS attack
c. DB Security - Guardium
i. (Access, control, Management, policy enforcement)
ii. Reports
iii. Incident management reporting and work flow
iv. Audit / Trail
4. Forensic Analysis - ArcSight
a. Central Log Management
b. Correlation
Entire info sec reporting
5. Defining KPI?
a. Security attacks
b. Security Breaches
c. 100% Data integrity of DB
i. Via backup of dat
6. Responsibility matrix
a. COMMTEL
b. HEC and other stakeholders
7. Onsite Implementation
a. Timelines / Plan
b. HR required
Copyright CommTel PVt Ltd , Use or disclosure of data contained on this page is subject
to the restriction in the disclosure statement of this document.
Introduction
CommTel Security Services has helped to set the standard for accountability,
reliability and protection in Managed Security Services (MSS).
These services are designed to help you enhance your information security
posture, lower your total cost of ownership and demonstrate compliance by
partnering with CommTel for the monitoring and management of your security
operations, regardless of device type or vendor on a 24/7/365 basis or as needed.
CommTel Managed Security Services delivers the expertise, tools and
infrastructure you need to secure your information assets from Internet attacks
24/7/365, often at a fraction of the cost of in-house security resources. Access to
the CommTel SOC, a secure Web-based management tool, provides a single
interface to easily monitor the security of your overall infrastructure of managed
and unmanaged security devices.
With Managed Security Services from our Security Services, you benefit from
improved operational, financial and strategic efficiencies across your enterprise:
1. Database Security
Privilege Elevation
Attackers may take advantage of database platform software vulnerabilities to
convert access privileges from those of an ordinary user to those of an administrator.
Vulnerabilities may be found in stored procedures, built-in functions, protocol
implementations, and even SQL statements. For example, a software developer at a
financial institution might take advantage of a vulnerable function to gain the
database administrative privilege. With administrative privilege, the rogue developer
may turn off audit mechanisms, create bogus accounts, transfer funds, etc.
Platform Vulnerabilities
Vulnerabilities in underlying operating systems (Windows 2000, UNIX, etc.) and
additional services installed on a database server may lead to unauthorized access,
data corruption, or denial of service. The Blaster Worm, for example, took advantage
of a Windows 2000 vulnerability to create denial of service conditions.
SQL Injection
In a SQL injection attack, a perpetrator typically inserts (or injects) unauthorized
database statements into a vulnerable SQL data channel. Typically targeted data
channels include stored procedures and Web application input parameters. These
injected statements are then passed to the database where they are executed. Using
SQL injection, attackers may gain unrestricted access to an entire database.
Denial of Service
Denial of Service (DOS) is a general attack category in which access to network
applications or data is denied to intended users. Denial of service (DOS) conditions
may be created via many techniques - many of which are related to previously
mentioned vulnerabilities. For example, DOS may be achieved by taking advantage
of a database platform vulnerability to crash a server. Other common DOS
techniques include data corruption, network flooding, and server resource overload
(memory, CPU, etc.). Resource overload is particularly common in database
environments.
Weak Authentication
Weak authentication schemes allow attackers to assume the identity of legitimate
database users by stealing or otherwise obtaining login credentials. An attacker may
employ any number of strategies to obtain credentials.
Brute Force - The attacker repeatedly enters username/password combinations
until he finds one that works. The brute force process may involve simple guesswork
or systematic enumeration of all possible username/password combinations. Often
an attacker will use automated programs to accelerate the brute force process.
Social Engineering A scheme in which the attacker takes advantage the natural
human tendency to trust in order to convince others to provide their login credentials.
For example, an attacker may present himself via phone as an IT manager and
request login credentials for system maintenance purposes.
Direct Credential Theft An attacker may steal login credentials by copying post-it
notes, password files, etc.
For example, a survey indicated that many companies do not purge data when
the companys computers are reassigned or disposed of; others do not even
install passwords on employee computers; still more do not encrypt personal
information when these are transmitted over the Internet or the company
networks.
Policy Draft
This section describes aspects of security policy, and includes the following topics:
System Security Policy
This must include aspects of system security policy, and includes the following:
a) Database User Management
b) User Authentication
c) Operating System Security
This policy must describes aspects of user security policy, and must includes the
following topics/points while defining this policy:
a). General User Security
b). End-User Security
c). Administrator Security
d). Application Developer Security
e). Application Administrator Security
Password Management Policy
Database security systems depend on passwords being kept secret at all times.
Still, passwords are vulnerable to theft, forgery, and misuse.To allow for greater
control over database security, Oracle's password management policy is
controlled by DBAs.
This section describes the following aspects of Oracle password management:
a). Account Locking
b). Password Aging and Expiration
Auditing Policy
Security administrators should define a policy for the auditing procedures of each
database. You may, for example, decide to have database auditing disabled unless
questionable activities are suspected. When auditing is required, the security
administrator must decide what level of detail to audit the database; usually, general
system auditing is followed by more specific types of auditing after the origins of
suspicious activity are determined.
When possible, utilize roles in all possible situations to make end-user privilege
management efficient and simple.
10
Monitor, log, report and review database high privileged accounts and
activities (DBAs, developers, etc) to meet their compliance requirements with
internal audit; and for the purpose of
11
12
Traffic Threshold
The threshold method provides administrators with a way to trigger alerts if a preconfigured traffic volume threshold is exceeded.
The key to successfully using thresholds is to have an understanding for the normal
traffic levels on the network. In most cases, an external device such as, a Sniffer is
used to baseline the network, and the initial levels are set according to those data.
13
Once a baseline has been established, the administrator can enable the relevant
thresholds and configure each with values that make sense for the particular
network. In Figure Threshold Mode, an alert will be sent if a Sensor sees 1000 or
more TCP SYN packets within a 1 second interval.
14
15
Monitor, log, report and review database high privileged accounts and
activities (DBAs, developers, etc) to meet their compliance requirements with
internal audit; and for the purpose of
16
Solution Summary
Database Monitoring
IBM Guardium 8.0 is a proven solution consisting of system software and optional
hardware that helps organization secure their enterprise data and easily pass their
audits.
The worlds largest organizations have standardized on this technology to provide
visibility and reduced costs around audit tasks. Upon installation and connection to
the network, IBM Guardium 8.0 immediately begins monitoring and capturing
valuable information about the who, what, when, where and how of activity between
users and relational databases.
To better understand the components of the IT environment, Guardiums auto
discovery capability builds an interactive, real-time graphical map of the infrastructure
configuration including database and network connections by focusing on activity
monitoring, auditing and database security,
Guardium 8.0 can help enable companies to become compliant with regulations such
as Sarbanes Oxley, PCI, Basel II and Data Privacy.
Proposed Design and Implementation
IBM recommends leveraging best-practice methodologies to define a comprehensive
Database logging and monitoring strategy and policy regarding access to sensitive
data and changes to database by privileged users.
IBM recommends a federated system approach where many individual nodes
comprise one logical, federated system. This allows corporate policy to be unified
across diverse geographies yet allows for individual privacy laws, etc (like in
Switzerland) to personalize policies and reports for line-of-business use. Adherence
to these policies needs to be ensured by monitoring and auditing all attempts to
update, delete, insert, or view important data and database structures in real-time by
privileged users. All production databases should be considered in -scope for
logging and monitoring high privileged accounts based on categorization of the risk
The classification/definition of risk can be assessed by the IBM solution to provide a
list of classified assets and focus implementation tasks to the most critical assets
first.
Real-time reporting of activities will be implemented based on the industry best
practices and regulatory requirements. Over time, database logging and monitoring
will be able to establish patterns and provide risk-based real-time blocking of
privileged account activities using S-TAP Terminate and S-GATE.
Initial design will start with monitoring and reporting on Highly Privileged Users.
Industry guidelines suggest that database administrators (DBAs) and system
administrators activity should be monitored. Both internal and external auditors
require proof that no one has altered data inappropriately, either accidentally or
maliciously, that could jeopardize the integrity of data stored in databases or expose
sensitive data to this group inadvertently in the process of doing their jobs. Database
Activity Monitoring technologies that focuses on the who becomes the foundation of
a strong global strategy. Secondly we will review and suggest specific, selective
objects be monitored. As visibility increases into the activities of highly privileged
17
them into categories such as financial data, HR data, and sensitive customer data.
By selectively applying controls to these groups of sensitive data, risk can be
mitigated. Moving from reporting on these events to preventative controls (like
blocking a DBA from seeing sensitive financial data outside of an application) further
increases effectiveness of a monitoring solution.
Lastly, as an option, certain situations may call for comprehensive (or Full) auditing
where both inbound SQL requests and outbound result sets are logged. Moving to a
full audit scenario where the who, what, when, where, and how of database access
and usage is monitored, audited and reported on can provide further insight on
business processes, suggest optimization of the database infrastructure and monitor
patterns of DB activity both through applications and independently by DBAs and
SysAdmins. Entitlement reports, change-control reconciliation, and further
adherence to evolving industry regulations are possible when all data is monitored,
analyzed, and reported to other systems as well as IT/business personnel.
Both statistical and real-time alerts will be implemented. A Statistical Alert is
triggered by a query that looks back over a specified time period to determine if the
query condition has been satisfied (for example, alerting when over the course of a
week if a privileged user has extracted many records from the same table). These
are important because a sophisticated attacker may not try to extract 100,000
records all at once (thus triggering a real-time alert) but rather access 10 records at a
time over a very long period of time. Statistical alerts allow us to define any condition
over long periods of time through which patterns and behaviours can be identified.
A real-time alert is triggered by a security policy rule as database traffic is being
analyzed in real-time (for example, an attempt to extract credit card information by an
unauthorized application). Each alert should be able to utilize any combination of the
following four notification mechanisms: SMTP (outgoing e-mail) server, SNMP
(network information and control) server, Syslog, and custom (a user written handler
that can invoke functions that may already exist as part of the infrastructure).
All of this forensics-quality audit data will be retained for a period of 90 days online
within the IBM solution
18
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
1.12
Document and assign responsibilities for the installation and operation of Guardium
software to the members of the implementation team
Responsible Party: Project Manager
Estimate professional services time need and arrange required support with
Guardium
Responsible Party: Project Manager
19
1.13
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
Discuss any customization (i.e. installation of additional network cards) done to the
Guardium appliance with the professional services consultant. Be prepared to
install additional patches to accommodate changes
Responsible Party: Guardium Administrator & Guardium Consultant
Configure appliance1
Responsible Party: Guardium Administrator, Network Administrator & Database Administrator
Download latest version of the S-TAP software from Guardium FTP site
Responsible Party: Guardium Administrator & System Administrator
Install S-TAP 2
Responsible Party: System Administrator
20
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
Observe traffic volume. Adjust alert thresholds and times for backup, archive and
aggregation to coincide with the time of low traffic volume
Responsible Party: Guardium Administrator
Incorporate Guardium warning and error messages into the overall monitoring of
the database server process
Responsible Party: System Administrator
Verify that SNMP traps and polls deliver correct information. Incorporate monitoring
of Guardium appliances into overall infrastructure monitoring
Responsible Party: Guardium Administrator, Network Administrator, & Guardium Consultant
Asses data and verify assumptions used to build a policy. For example, if you were
planning to filter traffic based on the name of the application executable and the
captured data is not specific enough this rule will have to be replaced
Responsible Party: Guardium Administrator, Business Analyst & Application Development Team
Work with the database/application administrator to generate traffic for each rule
defined in the policy
Responsible Party: Guardium Administrator, Database Administrator & Application Development Team
Check backup, archive, and purge processes. Note disk space used for backup
outside Guardium appliance and adjust disk space estimates accordingly
Responsible Party: Guardium Administrator & Storage Administrator
Perform backup/recovery test using backup from the production appliance and
restoring data into development environment. Document steps.
Responsible Party: Guardium Administrator & Guardium Consultant
4.1
4.2
4.3
Define roles, responsibilities and steps for daily review of audit processes,
including audit reports and appliance health check reports
Responsible Party: Security Team, Guardium Administrator
21
4.3.1
To deploy IBM Guardium in HEC premises, we required below still set from HEC
and our skill set will be provided as per chart below.
Deliverable
Resource
Type
Source
Skill Set
Quantity
Information
gathering for
deployment
Project
Manager
Consultant/CommTel
Min 5 year
experience CISSP
and CCNA and
CCSP must be IT
graduate
Deployment Team
Engineers
Consultant/CommTel
Minimum 5 similar
deployments,
must be IT
graduate
Network team
Engineers
Internal IT/HEC
Internal
Database Admins
Engineer
Internal IT/HEC
Internal
Depends
on how
many
DB
admins
HEC has
and DB
server
type
Support/Monitoring
team
Engineer
Consultant/Commtel
Minimum 3 year of
experience and 2
deployments
22
23
Each university in every region is connected to the POP and in turn to the
other region
So the flow of traffic is University -> POP rtr -> Regional rtr
PERN has a mandate to centralize and monitor all of their network device
logs from all these different regions
ArcSight was not provided any details on the number of proxy servers such
as ISA and SQUID and has assumed the count of 10 for each.
ArcSight was not provided with any event rates or log volumes and has made
the following assumptions around the Events Per Second (EPS) rate for the
four categories of devices:
o
24
ArcSight Web
(SOC Tier 1)
Dashboards
Reports
Notifications
Module Layer
Workflow
IdentityView
Solution
Core-Engine Layer
ArcSight Express
M7200 - X
C3000
Event
Sources
L3200
C3000
C3000
Connector
Server
University Level
Connector
Server
University Level
Integration Layer
Connector
Server
University Level
L3200
Event
Sources
26
SOC Dashboard
27
28
Ability/Skill Management
Critical Reports
Ability/Skill Management
Data Center Security Services & Deployment team skills matrix should be
29
Resource
Type
Source
Skill Set
Quantity
Information
gathering for
deployment
Project
Manager
Consultant/CommTel
Min 5 year
experience CISSP
and CCNA and
CCSP must be IT
graduate
Deployment
Team
Engineers
Consultant/CommTel
Minimum 5 similar
deployments, must
be IT graduate
Network team
Engineers
Internal IT/HEC
Internal
Server Admins
Engineer
Internal IT/HEC
Internal
Depends
on
quantity
and type
of
servers
behind
DMZ
Support /
monitoring
team
Engineer
Consultant/CommTel
Minimum 3 year of
experience and 5
deployments in
specific field
To deploy DB Security Solution in HEC premises, we required below still set from
HEC and our skill set will be provided as per chart below.
Deliverable
Resource
Type
Source
Skill Set
Quantity
Information
gathering for
deployment
Project
Manager
Consultant/CommTel
Min 5 year
experience CISSP
and CCNA and
CCSP must be IT
graduate
30
Deployment Team
Engineers
Consultant/CommTel
Minimum 5 similar
deployments,
must be IT
graduate
Network team
Engineers
Internal IT/HEC
Internal
Database Admins
Engineer
Internal IT/HEC
Internal
Depends
on how
many
DB
admins
HEC has
and DB
server
type
Support/Monitoring
team
Engineer
Consultant/Commtel
Minimum 3 year of
experience and 2
deployments
Resource
Type
Source
Skill Set
Quantity
Project
Methodology
Presentation
Project
Manager
Consultant/CommTel
Min 10 year
experience CISSP
and CCNA and
CCSP, CEH must be
IT Security Phd
Support Team
Engineers
Consultant/CommTel
Minimum 5 similar
deployments, must
be IT graduate with
CISSP and CEH
Depends
on scope
Network team
Engineers
Internal IT/HEC
Internal
Depends
Server Admins
Engineer
Internal IT/HEC
Internal
Depends
how
many
web
servers
and
admins
31
Resource
Type
Source
Skill Set
Quantity
Information
gathering for
deployment
Project
Manager
Consultant/CommTel
Min 5 year
experience CISSP
and CCNA and
CCSP must be IT
graduate
Deployment Team
Engineers
Consultant/CommTel
Minimum 5 similar
deployments,
must be IT
graduate
Network team
Engineers
Internal IT/HEC
Internal
Server Admins
Engineer
Internal IT/HEC
Internal
Depends
on
quantity
and type
of
servers
behind
DMZ
Support/Monitoring
Engineer
Consultant/CommTel
Minimum 3 year of
experience and 3
deployments
32
Resource
Type
Source
Skill Set
Quantity
Information
gathering for
deployment
Project
Manager
Consultant/CommTel
Min 5 year
experience
CISSP and CCIE
R&S and ISO
27001 Certified
Deployment Team
Engineers
Consultant/CommTel
Minimum 5
similar
deployments,
must be IT
graduate with 5
year of
experience in
industry
Network team
Engineers
Internal IT/HEC
Internal
Server Admins
Engineer
Internal IT/HEC
Internal
ALL
Application
servers
and
network
devices
Support/Monitoring
Engineer
Consultant/CommTel
Minimum 3 year
of experience
and 3
deployments
34
35
36
Critical Reports
I love one page management reports which summarise the entire business. Ideally
each critical success factor would have one key performance indicator. Unfortunately
this isn't always possible. Some critical success factors are complicated and have
multiple dimensions of performance or clear cause and effect which you need to
understand.
So, it was former employee account attempt. This Account named 'mhedberg' was
disabled and someone enable it for some transactions.
37
After some investigations, picture is in front of you. User 'Zara' has enabled and
disabled this account after some transactions.
that was sample of compliance monitoring, now lets take a look at some other type of
reports.
Attacks Monitoring on Firewalls & IPS in one dashboard.
below snapshot indicates intrusion attacks coming from outside of network. Reports
shows source country as well.
38
Virus activity report, detail of activity from where virus was spreading to which IPs
39
40
41
42
Facilities
CommTel
HEC
Provide Power, backup power, HVAC, 24x7 physical security, video surveillance, biometrics, fire
X
suppression
Provide Internet
Provisioning
CommTel
Ensure that the Configuration of Security Appliances, as specified, is sufficient to meet HEC
HEC
X
Comply with CommTel Tech Policies regarding the deprecation of hardware and/or software
For every Eligible Application, maintain redundant hardware of equal specifications for all
constituent servers and devices
43
CommTel
Replace defective hardware(which is part of managed service) within 4 business hour of diagnosis
HEC
by CommTel
Before going live, set up health check tests, in conjunction with CommTel, to determine
Monitor for application health and availability pursuant to HEC's written instructions
Before going live, provide a detailed written description of all monitoring, alerting, notification
Implement emergency failover procedures that are developed by HEC and provided to Commtel in
Provide up-to-date contact information via Commtel for contact authorization, monitoring, alerting
and response procedures, including an up-to-date contact distribution list with specific response
and escalation instructions for complex contact protocols with numerous parties
Notify CommTel and other non-Commtel authorized contacts of any maintenance that may result
CommTel
Apply critical security updates (e.g., patches addressing vulnerabilities that allow remote root or
Apply quarterly critical security patches through planned maintenance with 24 hours' notice
Manage firewalls and implement access changes as requested by authorized client contact in
writing
44
HEC
X
X
Follow generally accepted security practices for the administration of Hosting Equipment
CommTel
Provide 24x7x365 Network Security Operations Center support via telephone, Web and email &
HEC
Onsite
Provide systems, network, and security administration, which includes the following: (1) operating
system AV if part of managed services maintenance and upgrading; (2) responding to Trouble
Tickets and alerts; (3) performing routine network Security Devices administration and
maintenance; (4) systems database security administration to ensure high-availability; (5) replacing
failed Hosting Equipment; and (6) maintaining a CommTel client portal
Develop, maintain and support all Client applications and Content, including tuning services upon
Maintain the compatibility of all HEC Applications and Content with O/S version and version
upgrades
CommTel
45
HEC
Maintain sufficient committed backup storage space for a minimum of 2 restore points per server
Determine backup storage requirements on a per server basis based on days retention required
Notify CommTel of all changes to a server that may affect backups, e.g., a change in partitions,
etc.
Configure custom backups for data contained in files held open by the operating system, including
database files
Security
CommTel
HEC
Follow generally accepted practices for network security and server administration
Apply critical security updates for applications and operating systems on virtual machines
CommTel
Execute upgrades and maintenance to the All Security Devices in HEC premises
Notify clients of maintenance that may result in unavailability of the Infrastructure or Cloud device
Confirm that high availability failovers execute properly in the event of isolated compute node
failures
Provide online support through CommTel Cloud Services Website, including documentation and
forums
46
HEC
Onsite Implementation
The CommTel Approach to Information Security:
In order to streamline security and help meet your information security needs,
CommTel has developed a five-step methodology covering the complete security
management lifecycle, including phases for Assessment, Design, Deployment,
Management and Education. This process identifies and analyzes gaps between the
current security state and industry standards and best practices, designs and
implements solutions to close those gaps and ensures that the gaps remain closed.
Whether performed by HEC, by CommTel, or a combination of the two, these steps
are critical to the over-all success of the project.
47
48
Before CommTel or its subcontractor can mobilize their resources for a University
site deployment, there are a set of pre-deployment pre-requisites and deliverables
are expected from the university staff to be delivered or sent to CommTel or its subcontractor in order to confirm that the required resources and tools are available and
the environment is ready for the Security Firewalls deployment. The following are the
pre-requisites the university staff would have to confirm availability before any
deployment, otherwise the deployment will not be scheduled and will not take place
until the requirements are written confirmed.
Site Pre-requisites:
Surrounding topology is up: The customer will need to confirm that the
surrounding network devices have been deployed and up and running including
but not limited to the following
Internet Router
Firewall/UTM
Internal Switches
Internet Access: The customer should confirm that there is internet access
and that its stable and operational. The internet access will be use updating the
installed components and will help in retrieving the required license. If the internet
access is not available for any reason, the customer should notify CommTel team
or its subcontractor so that it takes necessary measures.
Availability of the hardware server required management application
according to the required specification as per this minimum requirements
document.
Availability of a dedicated technical personnel : this personnel will be
the facilitator for the deployment crew in case they need any further help within
the requirements.
49
Deployment Report
After the completion of the deployment technical tasks, CommTel Team will
commence in documentation in order to deliver all the required technical and
administrative details of the project for the customer. CommTel team will provide the
customers with the following documentation:
Deployment Technical Report: This report will include all the technical details that
have been tackled in the deployment, including but not limited to:
1. Reviewed Network Design including new Security components
with technical explanation
2. Software configuration for All products including
schema,
usernames, password and permissions.
3. Specific Management tools settings such as, Email distribution
policy, central responses, SNMP rules, Update scheduling, etc.
4. Hardware cabling guide for the Installed appliances
5. The general Final Policy applied on All products, any exception
will briefly be mentioned
6. Extracted Events and Reports generated over the period of the
deployment and during the policy fine tuning phase.
Client Responsibilities
During the course of the project it is important for the satisfactory conclusion of the
work that HEC undertakes certain responsibilities to:
50
Carry out a back-up of the most critical systems, to protect against the unlikely
event of an unintended system failure or disruption.
Ensure that all appropriate personnel within his organization are informed of the
nature and timing of the work to be undertaken, on a need-to-know basis, to
avoid undesirable disruptions or delays to us or HEC.
A client representative with deep technical knowledge of the environment being
protected will be present with CommTel team.
Inform us of the existence of available downtime windows, which are ideally
suited to carry out some of the more sensitive probes.
Answer any of our queries in a timely fashion.
CommTel will require access to key staff to undertake this service. This may
include the Chief Security Officer, Chief Information Officer and Network
Administrators. Please ensure key staff will be available during the entire period.
CommTel team will typically spend half of the time of an assignment on site.
Each team member will require an adequate desk, access to a printer and a
telephone line.
Each team member must have an individual access badge to give them to the
working area from 8am to 5pm. Additionally, the badge should grant access to
the server rooms, and any other area within the scope of this assessment.
Access badges should be applied for before the project commences. Campus
maps should be provided along with explicit instructions on areas that
consultants must not visit must be made during the kick-off meeting.
Project Organization
Name
Designation
Responsibilities
Asher
Faisal
Khan
Director
Ovais
Zahid
Project
Manager
51
Organization
Contact
Details
CommTel
03008413673
Project Management
Scheduling
Assigning tasks
Responsible for
deployment of the
Security Solution as per
the scope document
Responsible for testing
and support of the
Security Solution as per
CommTel
03218230154
Shoaib
Abbasi
Lead Security
Solution
Tehseen Deployment
Sarwar
Engineer
CommTel
03432517608
CommTel
03432517612
03432517611
Sh.Abdu
l Majid
Deployment
Engineer
Deployment of the
McAfee Solution ,
BlueCoat and SafeNet
under the guidelines of
the Project Manager
CommTel
Najdat
Khan
Deployment
Engineer
CommTel
Ahsan
Khan
Deployment
Engineer
CommTel
52
03432517609
Ahemr
Faisal
Khan
DB Security
Expert
53
Deployment of DB
Security Solution
CommTel
03218103161