Point

ValiantTechnologies

ValiantTechnologies
About us
Valiant Technologies is a speciality consulting organization focussing on full cycle information security consulting and training. Headquartered in India, the company has delivered consulting solutions to clients in India, Sri Lanka and the six GCC countries – Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and United Arab Emirates. Valiant has remained a vendor-neutral security consulting organization ensuring that the approach and recommendations are not influenced by any brand or product.

Valiant Technologies was established in 2002 with the objective of emerging as a reliable provider of end-to-end information security consulting and training solutions to enterprise operating in different business segments commercial enterprises, government departments, law enforcement, judiciary, and armed forces

Valiant is well positioned to offer end-to-end consulting
and training services to different verticals; particularly those in BFSI; Manufacturing; Oil and Gas; IT and ITES; Financial Regulators; Armed Forces; Law Enforcement and Logistics. Our consulting engagements cover a comprehensive range of services delivered using expertise brought to the table by consultants with successful and long track records in multiple countries spanning different verticals. Our consultants bring with them collectively over 100 consultant-years of experience, to offer solutions that assist clients in identifying, assessing and minimizing virtually every type of risk associated with information assets.

We provide our clients with the kind of assurance and comfort level that they would require when it comes to information security. Our 'security-only'positioning differentiates us from other consulting organizations that 'also' offer security services.
KEY PERSON:
Dr. K. Rama Subramaniam
FOUNDED:
2003
OFFICES:
Chennai (Regd Office), Bangalore (Corporate Office), Abu Dhabi, UAE and Colombo, Sri Lanka
CLIENTELE:
BFSI and Banking Regulators, Oil Industry, Telecom, Military and Law Enforcement, Manufacturing, IT and ITES, Academic Institutions
INVESTORS:
Privately held
COMPETITORS:
Information Security Consulting Companies
WEBSITE:
PRODUCT OFFERINGS:
Our service portfolio caters to all sizes and types of businesses and provides consulting support in the areas of
  • Information Security Management,
  • Information SecurityAssessment,
  • Governance, Risk and Compliance (GRC), and
  • Cybercrime Management.
Our consulting practice assists organizations to design and build security management systems that will significantly improve the security posture of the organization. By adopting globally accepted best practices (e.g., GAISP, COBIT, ISM3 and vertical-specific standards like Basel-II for Banks) mapped to industry requirements, we build a combination of best of breed technology and processes, for client organizations.
DIFFERENTIATING FACTORS:
"Security only" focus and being vendor neutral
REVENUE MODEL:
Direct billing and working through partners in defined territories