Skip to content

About

TechDefence Pvt Ltd is young but leading company basically concentrating upon the skills of
young members. Technologies were formed to meet the demands of security concern of the IT
industry in the web. TechDefence Consulting successfully tackle the growing number of
security treats in websites through a series of test conducted by some renowned security
experts which will finally end up giving a complete solution of web 2.0 along with the security.
TechDefence is founded by Sunny Vaghela who has contributed his knowledge of Ethical
Hacking, Cyber Crime Investigation & Forensics towards society since last 2 years. TechDefence
has also dedicated itself to the training and development of expert professionals in order to
meet the ever-growing challenges of technology industry. Now we are calculating to launch
ourselves globally seek and cross-frontiers that we have never attempted before. we are
currently working into following services domain.

Cyber Crime Investigations:

Analyzing, investigating and accumulating the digital evidence and cyber trails is better known
as Cyber Crime Investigation. It can be found in computer hard disks, cell phones, CDs, DVDs,
floppies, computer networks, the Internet etc. Digital evidence and cyber trails can be derived
from pictures, (steganography), encrypted files, password protected files, deleted files,
formatted hard disks, deleted emails, chat transcripts etc. Digital evidence and cyber trails are
generally related to online banking frauds, online share trading fraud, source code theft, credit
card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial
of service, hacking, divorce cases, murder cases, organized crime, terrorist operations,
defamation, pornography, extortion, smuggling etc.

Cyber Laws Consulting:

TechnoLegal, a branch of TechDefence, is the Cyber law Consultancy which is an online
internet based nonpareil and pioneering consultancy dedicated exclusively to Cyber laws.

Cyber law includes the laws relating to Cyberspace, Internet, and World Wide Web and indeed,
is a blend of many legal disciplines such as intellectual property, privacy, criminal, jurisdiction,
freedom of expressions, etc. In quintessence, cyber law is an endeavor to actuate laws
conceived for the physical world to human operations on the Internet. TechnoLegal is the
Consultancy that addresses all your Cyber law requirements and issues. It aspires to ensure you
a veridical analysis of contemporary and evolving trends in Cyber law according to your
queries. TechnoLegal, a completely new concept of consultancy online, is one stop that takes
care of all your legal exigencies in cyberspace.

Vulnerability Assessment & Penetration Testing:

Penetration Test is a method of actively evaluating the security of a computer system or a
network through simulation of a controlled and managed intrusion into your system by a
malicious user, known as a cracker. Active analysis of the system for any potential vulnerability
that may result from poor or improper system configuration is carried out. This analysis is
carried out from the perspective of a potential attacked, and can involve active exploitation if
security vulnerabilities. The results are then documented in a report which is presented at a
debriefing session, where questions can be answered and corrective strategies can be freely
discussed. Penetration Testing will help you cost-effectively reduce risk, achieve and maintain
regulatory compliance and reach your security goals. Vulnerability Assessment provides a clear
and in-depth understanding of how vulnerable, your network, servers and applications are to
attacks.

Security Audits:

Security Audits: A computer security audit is a systematic, measurable technical assessment of
how the organization’s security policy is employed at a specific site. Computer security auditors
work with the full knowledge of the organization, at times with considerable inside information,
in order to understand the resources to be audited.
Security audits do not take place in a vacuum; they are part of the on-going process of
defining and maintaining effective security policies. This is not just a conference room activity.
It involves everyone who uses any computer resources throughout the organization.

Given the dynamic nature of computer configurations and information storage, some
managers may wonder if there is truly any way to check the security ledgers, so to speak.
Security audits provide such a tool, a fair and measurable way to examine how secure a site
really is?

Computer security auditors perform their work though a personal interview, vulnerability scans
examination of operating system settings, analyses of network shares, and historical data. They
are concerned primarily with how security policies – the foundation of any effective
organizational security strategy – are actually used.

Cyber Forensics:

With the right application of science and technology for acquisition, preservation,
identification, analysis, and presentation of digital evidence or data in a way, we preserve the
integrity of the digital information blending it with the legal acceptability. While applying the
right methods that work well in the court of law, we put forward our expert witness, proficient
testimony and data recovery efforts that result in the success of eventualities. Our team
comprises of members that excel in the field of electronic investigation, corporate investigation
and litigation support. We aim to address all cyber forensic exigencies. TechForensics is
committed to research and development in this discipline of forensics. We provide the highest
quality instructor interactive training to help legal firms, accounting firms, government and law
enforcement agencies for better performance in the cyber forensic matters.

Training/workshops:

Looking at the Numbers of Cyber Crimes since last many years, We at TechDefence provides
training on Ethical hacking & Cyber Crime Investigation to students, IT professionals, law
professionals, bank employees as well as police officials. The training gives participant
advanced knowledge about hacking, cyber crime investigation & forensics.

 

Corporate Training (Hackintosh’09 8th-9th August, 2009, Chennai) Attended by 60+
Professionals from following companies:

Google
Yahoo!
Microsoft
ISACA
K7 Antivirus
TCS
Infosys
HCL
Deloitte
KPMG
Zoho
Temenos

Educational Institutes:

IIT Bombay.
IIT Guwahati.
IIT Delhi.
IIT Gandhinagar.
NIT, Rourkela.
NIT, Durgapur.
NIT, Calicut.
NIT, Bhopal.
NIT, Allahabad.
NIT, Surathkal.
NIT, Agartala.
NSIT,Delhi.
SRM University, Chennai.
Amity University, Noida.
KIIT University, Bhubaneswar.
Anna University, Guindy.

BFSI Sector:

Risk Control Unit, HSBC Bank, Ahmedabad.
Fraud Control Unit, ICICI Bank, Ahmedabad
Ahmedabad Mercantile Cooperative Bank Ltd, Ahmedabad.
Ahmedabad District Cooperative Bank Ltd, Ahmedabad.
Kalupur Commercial Cooperative Bank Ltd.
Surat Mercantile Cooperative Bank Ltd.
Maninagar Cooperative Bank Ltd.
Nidhi Cooperative bank Ltd.
Karnavati Cooperative Bank Ltd.
Maninagar Cooperative Bank Ltd.
Naroda N.C Bank Ltd.
Bapunagar Cooperative Bank Ltd.
Nutan Nagrik Sahkari Bank Ltd.
Rajkot District Government Association.

Government Sector:

Chief Minister’s Office, Gujarat Government.
Cyber Crime Cell, Crime Branch, Ahmedabad.
Ministry of Home Affairs, Malaysia.
Crime Branch, Hyderabad.
Crime Branch, Rajkot
Crime Branch, Nashik.
URICM, Gandhinagar.
Crime Branch, Surat.
Border Security Force (Gujarat).

Head Office:
A – 805, Wall street 2 Building, Opp Orient Club, Near Gujarat College, Ahmedabad

India Branch Offices:
New Delhi, Jaipur, Rajkot, Hyderabad.

International Offices:
Australia, Mauritius

Contact Us:

Email: info@techdefence.com
Website: http://www.techdefence.com
Ahmedabad Office: +91 79 40047405
+91 79 30471265-67

Jaipur Office: +91 141 5104143-44

Hyderabad Office: +91 40 65551560

Rajkot office: +91 9377171166.

Leave a Comment

Leave a comment