news & articles

PCI Compliance

PCI Compliance (Payment Card Industry Compliance) refers to the set of security standards designed to ensure that companies that handle credit card transactions maintain a secure environment. This helps protect…
continue reading

Penetration Testing

A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems,…
continue reading

Risk Assessment

Risk Management is a recurring activity that deals with the analysis, ‎planning, implementation, control and monitoring of implemented ‎measurements and the enforced security policy. Risk Assessment is ‎executed at discrete…
continue reading

Vulnerability Management and Assessment

In today’s competitive marketplace, companies cannot afford to lose time, money, or integrity due to security incidents. Businesses can suffer immeasurable losses if a data center has a production outage…
continue reading

Compliance Auditing

We in Hayyan Horizons Auditing offer the following auditing ‎services, utilizing our internal team and partners to conduct pre-assessment and internal audits for our clients, and our partnered ‎certification bodies…
continue reading

ISO27001 Implementation

ISO/IEC 27001:2005 Information Technology—Security techniques—‎Information security management systems—Requirements is an ‎information security management system (ISMS) standard published ‎in October 2005 by the International Organization for ‎Standardization (ISO) and International Electrotechnical…
continue reading

Vulnerability Management

Vulnerability Management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.  Security Vulnerabilities, in turn, refer to technological…
continue reading

GRC Governance Risk and Compliance (GRC)

Governance, risk and compliance (GRC) refers to a strategy for managing an organization’s overall governance, enterprise risk management and compliance with regulations. Think of GRC as a structured approach to…
continue reading

Advanced Threat Protection (ATP)

Advanced threat protection (ATP)  Refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as…
continue reading

Network Access Control (NAC)

The IoT revolution has raised a new challenge for network owners. How can you see and protect against a myriad of devices showing up on the network? Network Access Control…
continue reading
LOCATION
Amman, Sweifieh, Park Plaza, Building #24, 8th floor
COMPANY PROFILE
© 2024 HAYYAN. ALL RIGHTS RESERVED