<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Industry Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<atom:link href="https://threatsys.co.in/nproject-tag/industry/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatsys.co.in/nproject-tag/industry/</link>
	<description>We Defend, We Protect, We Secure</description>
	<lastBuildDate>Fri, 06 Jun 2025 06:30:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://threatsys.co.in/wp-content/uploads/2021/05/cropped-Final-1-Logo-PNG-32x32.png</url>
	<title>Industry Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<link>https://threatsys.co.in/nproject-tag/industry/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ensuring Data Security for One Crore Women Under Subhadra Yojana</title>
		<link>https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:01:29 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=647</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Subhadra Yojana, launched by Prime Minister Narendra Modi on his birthday i.e. September 17, 2024, is a groundbreaking initiative by the Government of Odisha aimed at empowering over 1 crore women between the ages of 21 to 60. Named after Goddess Subhadra, this scheme provides financial assistance of ₹50,000 over a five-year period to eligible beneficiaries, with funds directly transferred to their bank accounts in bi-annual installments of ₹10,000.</p>
<p>Subhadra scheme is the largest, single women-centric scheme and is expected to cover more than 1 crore women. Under the scheme, all eligible beneficiaries between the age of 21-60 years would receive Rs. 50,000/- over a period of 5 years between 2024-25 to 2028-29</p>
<p>An amount of ₹10,000 per annum in two equal instalments will be credited directly to the bank accounts of the beneficiaries. As many as 76 lakh women have so far registered in the scheme.</p>
<p>During the programme, over ₹1,250 crore was transferred to the bank accounts of more than 25 lakh women beneficiaries under the Subhadra scheme.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Subhadra Yojana<br>
<h6 style="margin:6px 0;display:inline-block;">Department:</h6> Department of Women and Child Development, Govt of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Woman and Child Development <br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-in Audit, Mobile Apps Penetration Testing, Web Application Security Audit, API Security Testing, AADHAR UIDAI AUA&KAU Audit <br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> E Square System & Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The Subhadra Yojana, a flagship initiative of the newly formed BJP government in Odisha, is launched on September 17, 2024, coinciding with Prime Minister Narendra Modi’s birthday. With the BJP coming to power in Odisha after 24 years of BJD rule, the government aimed to roll out this transformative program within the first 100 days of governance. This ambitious timeline posed significant challenges in completing the full cybersecurity assessment, including Aadhar-based verification audits.</p>
<p>The project required the collection of applications through Jana Seba Kendra/Common Service Centres, where all submissions would be verified against government databases and through field enquiries as needed. Beneficiaries were required to complete e-KYC formalities, preferably through face-authentication via the SUBHADRA Mobile Application, using their Aadhaar numbers. They could also opt to pass on the benefits to fellow women in Odisha through the SUBHADRA Portal.</p>
<p>With the complexity of the applications and the Aadhaar-based e-KYC system, ensuring robust security and compliance under these tight deadlines was a monumental task. The integration of the Aadhaar system, involving sensitive biometric data and authentication, added another layer of urgency to the assessment. Despite these challenges, we successfully ensured that the data infrastructure for Subhadra Yojana met the highest standards of security and compliance, enabling the government to empower over 1 crore women across the state.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>To meet the tight deadlines and extensive requirements of securing the Subhadra Yojana project, <strong>Threatsys</strong>, one of India’s leading cybersecurity firms, deployed a specialized team of experts. The team comprised eight security researchers, a Project and Delivery Manager, and a Chief Auditor for <a href="https://threatsys.co.in/security-consulting-and-compliance/cert-in-cyber-security-audit/"><strong>CERT-IN Cyber Security Testing and Audit</strong></a>. Additionally, three dedicated auditors were assigned to ensure <strong>UIDAI KUA and AUA Compliance</strong>.</p>
<p>Before initiating any security testing, the team thoroughly analyzed the workflow of the four critical modules within the Subhadra Yojana application, ensuring a deep understanding of the system architecture and data flow.</p>
<p>Security testing was conducted on a dedicated staging server to mirror real-world conditions without affecting the live environment. The use of diverse commercial cybersecurity tools, including <strong>Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Netsparker, HCL Appscan, Qualys Web Apps Scanner, OWASP Zap, SAINT</strong>, and <strong>Tenable</strong>, allowed for a comprehensive assessment of vulnerabilities in the web and mobile applications, as well as API security.</p>
<p>Threatsys followed the <strong>OWASP, CERT IN, NIST, SANS</strong> testing guide and <strong>ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM)</strong>. This approach simulated potential external attacks as well as actions taken by authenticated users, identifying several <strong>critical, high, medium, and low-level bugs</strong>. Threatsys team  closely collaborated with the development team to address and patch security issues in the mobile and web applications, as well as at the API level.</p>
<p>For the <strong>UIDAI KUA and AUA audit</strong>, Threatsys conducted a <strong>GAP Assessment</strong>, gathering essential evidence in line with the  <strong>UIDAI Audit Checklist 3.0</strong>. After completing the necessary testing and verifications, comprehensive reports were prepared, detailing findings and ensuring compliance. The <strong>Audit Certificate</strong> for the Aadhaar compliance was issued after all proper audits, evidence gathering, and documentation were completed.</p>
<p>Following thorough assessments, <strong>CERT-IN Certificates</strong> were issued to the Department for both the <strong>Subhadra Mobile Application</strong> and the <strong>Web Application</strong>, marking the completion of all required cybersecurity audits. These certifications confirm that both platforms are secure and compliant with Indian cybersecurity standards, further reinforcing the integrity of the Subhadra Yojana initiative.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Through a meticulous and well-coordinated approach, Threatsys successfully delivered and <strong>Secured Data for 1 Crore Women</strong>:</p>
<p>By implementing advanced cybersecurity measures, <a href="https://threatsys.co.in/"><strong>Threatsys</strong></a> ensured the safe handling of sensitive data for over 1 crore women beneficiaries in Odisha, safeguarding personal information and preventing unauthorized access.</p>
<p>Threatsys successfully completed the <strong>UIDAI KUA and AUA Audits</strong>, ensuring full compliance with Aadhaar-related security and privacy requirements. The issuance of the <strong>Audit Certificate</strong> confirmed that all security measures aligned with UIDAI’s stringent guidelines.</p>
<p>Both the <strong>Subhadra Mobile Application</strong> and <strong>Web Application</strong> received <strong>CERT-IN Certificates</strong>, validating that the platforms met national cybersecurity standards and were safe for large-scale use.</p>
<p>Despite the tight deadline set by the newly formed Odisha government, Threatsys completed the full cybersecurity assessment, Aadhar audits, and necessary documentation within the required timeframe, supporting the successful launch of the Subhadra Yojana. The secure integration of Aadhaar-based e-KYC through face-authentication on the Subhadra Mobile Application ensured smooth onboarding for beneficiaries, enhancing user experience while maintaining robust security.</p>
<p>These results not only supported the successful launch of Subhadra Yojana but also set a benchmark for secure implementation of large-scale government initiatives, ensuring both data integrity and compliance with regulatory standards.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CSM relies on Threatsys&#8217;s CYQER to protect its IT assets</title>
		<link>https://threatsys.co.in/projects/soc-as-a-services-case-studies-cyqer/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 06 Aug 2018 10:29:13 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=603</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/soc-as-a-services-case-studies-cyqer/">CSM relies on Threatsys&#8217;s CYQER to protect its IT assets</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>CSM Technologies provides transforming solutions and services in IT for Governments and large or small Industries. As a CMMI Level 5 company, CSM emphasizes more on Quality of delivery and Customer Satisfaction. With about 2 decades of delivering solutions and more than 1200 employees, CSM has developed a comprehensive portfolio of products, solutions and smart consulting services. CSM has achieved quite a few unique distinctions of being first to many unexplored business opportunities.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> CSM Technologies <br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> IT/ITes Industry<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> SIEM Implementation, SOC as a Services, Managed Cyber Security Services, 24X7 Monitoring<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>A Key challenge for CSM has been protecting and monitoring a very high volume of data of Government Web Applications, System Security, Infrastrcture full protection along with monitoring without incurring prohibitive costs and allowing the solution to scale as necessary. The CSM team sought clear security metrics, with good visibility and real-time monitoring in case of security incidents. To accomplish this, They engaged Threatsys to implement it&#8217;s flagship all in one SOC Product, <a href="http://www.cyqer.in">CYQER</a>, SIEM solution that allowed integration with all the end points like Server, Routers, Firewall, Switches, Systems and more. CSM works with sensitive data such as their customers&#8217; personal information, Government&#8217;s Data which must be protected. This was the main concern of the cybersecurity team, as keeping their systems secure also means keeping their customers safe. &#8220;Protecting that data and maintaining user security is a top priority for CSM,and cybersecurity plays a very important role”, states Amit Das, CISO, CSM Technologies.</p>
<p>As a Leading Company of Odisha, they needed a all in one Powerful SIEM, SOAR, UEBA, FIM that was powerful and efficientso that we have deployed CYQER which is also easy to deploy, and its multiple capabilities have allowed us to achieve our goal with security at CSM. We can say that CYQER has met our expectations so far&#8221;, explains Prafulla Parida, VP, IT The CSM team required all in one SIEM tool that allowed them to monitor, receive alerts of vulnerabilities, incidents, attacks, or breaches, and at the same time, comply with GDPR, ISO 27001 regulations.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>By implementing Threatsys&#8217;s Flagship all in one SOC Product, CYQER, the CSM team has successfully kept track of all breaches, attacks, and threats that might have arisen. “We use the CYQER integration with Ticketing Management, so every time there is an alert, we are alerted through email by their SOC Analysts. We review the alert to assess its severity and can take action quickly when necessary”,Amit Das, CISO, CSM Technologies says.</p>
<p>CYQER has saved his team time, effort and money, and has helped them respond to threats in near real time and achieve their goal of keeping security always on point. Furthermore, due to their scope of work, they required a solution that would allow high scalability, since “the number of agents needed could increase rapidly”. For all these reasons they opted for CYQER, which also allowed them to save costs, as “usually, SIEMs and other commercial cybersecurity products are very expensive”.</p>
<p>As a result, the CSM security team have been able to achieve their goal of protecting and monitoring their all security events incuding cloud security and improving their environment visibility with the CYQER monitoring options, and all at a minimal cost.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >About CYQER</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><a href="http://www.cyqer.in">CYQER : Cyber Yield Quantification for Enterprises and Reporting</a> : all capabilities in one Product. Our CYQER platform provides Security Operations Center (SOC) services to help organizations build their strongest defense against cybercrime and maximize return on investment. With CYQER, you can rest easy knowing that you have a team of experts monitoring your systems and ensuring that your organization is protected from cyber threats.</p>
<p>CYQER protects workloads across on-premise, virtualized, containerized, and cloud-based environments. Used by thousands of organizations around the world, from small businesses to large enterprises, the Threatsys&#8217;s CYQEER solution is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats, and behavioral anomalies.</p>
<p>CYQER consists of an endpoint security agent, deployed to monitored systems, and an intelligent management server, which provides the threat intelligence and performs the data analysis. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. Our lightweight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/soc-as-a-services-case-studies-cyqer/">CSM relies on Threatsys&#8217;s CYQER to protect its IT assets</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</title>
		<link>https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 10:49:24 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=5821</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana (BSKY) is a health insurance scheme that the Government of Odisha launched in India in 2018. The scheme aims to provide affordable and accessible healthcare to the people of Odisha, especially to those who are economically disadvantaged or belong to vulnerable sections of society. Under the BSKY scheme, eligible beneficiaries can avail of cashless treatment at empanelled hospitals for various medical conditions, including hospitalisation, surgery, and pre and post-hospitalisation expenses. The scheme also covers the cost of diagnostic tests, medicines, and other medical supplies.</p>
<p>BSKY provides health insurance coverage for medical expenses (up to Rs. 5 lakhs for families and up to Rs. 10 lakhs for women) incurred for treatment in hospitals and health centres across the state of Odisha. Around 4,036 medical treatments and 255 surgical procedures are covered under this scheme.</p>
<p>Insights of BSKY Project under Department of Health and Family Welfare, Goverenment of Odisha. Beneficiary 4.79 Cr. Total Households 119.5 Lakhs, Card Holders 3.34 Cr., Households Covered 96.42 Lakhs (81%), Hospitals 9,324, where as Govt. 8,530 Private 794 No. of Treatments Done 1.19 Cr., Govt 1.17 Cr., Private 2,76,240. 2023 Reimbursement (Pvt) 628.02 Cr.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Biju Swasthya Kalyan Yojana(BSKY)<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Healthcare Industry<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-IN Audit, WAPT, Mobile Apps Penetration Testing<br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana Projects consists of several Modules like BSKY Portal, Hospital Empanelment Portal, BSKY Citizen Dashboard, Grievance Portal, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more.</p>
<p>BSKY Healthcare data is highly sensitive, and there is a significant risk of data breaches, which can lead to identity theft and other serious consequences of each Biju Swashthya Kalyan Card Holders. Threatsys is ensuring that data privacy is maintained and that sensitive information is adequately secured.</p>
<p>BSKY Portals and applications are the prime target for cybercriminals due to the vast amount of sensitive data they store. All the Web and Mobile Applications are heavily regulated, and compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act) and <strong><a href="https://threatsys.co.in/security-consulting-and-compliance/gdpr-compliance/">GDPR</a></strong> (General Data Protection Regulation) is crucial. Threatsys needs to complete the whole project of 10+ Applications within 1 month of timeline.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys, the well-known Cyber Security Firm of Bhubaneswar, Odisha, has appointed ten security researchers under the Project and Delivery Manager. In order to gain a better understanding of the application, the team thoroughly studied the workflow of the four modules before conducting any security testing. The testing was carried out on a host that was hosted on the staging server, using a variety of commercial cyber security tools, including Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Intruder, Netsparker, HCL Appscan, Qualsys Web Apps Scanner, OWASP Zap, SAINT, and Tenable.</p>
<p>Threatsys used a combination of the Open Web Application Security Project (OWASP) testing guide and ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM) for conducting penetration test of the server and applications. The testing was done to simulate as closely as possible the viewpoint of completely external attacker and Application user.</p>
<p>the threatsys team identified more than 50+ bugs across all the portals i.e BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application, including 15+ critical and 23 high-level vulnerabilities. All projects were delivered and retested within the set deadline, with the development team taking three weeks to fix all the raised security gaps. Threatsys remains committed to ensuring the integrity and confidentiality of the data and applications it works on, helping to safeguard sensitive BSKY Card holders information and online citizen services managed by the Government of Odisha.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys has successfully completed the cyber security testing and CERT-IN Security audit project with the utmost diligence and professionalism. Threatsys provided Initial Version 1 and Final Version 2 Reports with the appropriate support on time for 10+ Applications, and according to the proper security implementation, which has helped to issue the CERT-In VAPT certificate for all four modules of the Biju Swasthya Kalyan Yojana(BSKY), Odisha Government</p>
<p>All the modules of Department of Health and Family Welfare Departments that is BSKY applications are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that citizens of Odisha can now use the BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more. These web and mobile applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the Best Cyber Security Service Provider that protects the data of all the BSKY Card Holders Data of Odisha and responsible for their security, integrity and privacy.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
