[kswr_iconinfoboxlist iibl_list_default=”1″][kswr_infoboxitem_child iibl_title=”Professional Security Engineer” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]Our experiences security engineers design system from the ground up, protecting the right things in the right ways. Make sure every things don’t happen by designing, implementing and testing complete and secure systems.[/kswr_infoboxitem_child][kswr_infoboxitem_child iibl_title=”Vulnerability assessment” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]Engineers identify the worst case scenarios and setup proactive plans. With security analysis software, vulnerabilities in a computer, network, or communications infrastructure are identified and addressed.[/kswr_infoboxitem_child][kswr_infoboxitem_child iibl_title=”Penetration testing” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]This entails deliberately probing a network or system for weaknesses.[/kswr_infoboxitem_child][kswr_infoboxitem_child iibl_title=”Network Intrusion Detection Systems” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]Monitors a system for suspicious or malicious activity.[/kswr_infoboxitem_child][kswr_infoboxitem_child iibl_title=”IT Security Frame work” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]To setup processes and policies for managing security.[/kswr_infoboxitem_child][kswr_infoboxitem_child iibl_title=”Firewalls” iibl_title_color=”#333333″ iibl_subtitle_color=”#777777″ iibl_content_color=”#555555″ iibl_icon=”securicon-secure-shield” iibl_iconsize=”20″ iibl_bgsize=”25″ iibl_border_radius=”0″ iibl_ic_color=”{“type“:“color“,“color1“:“rgba(199, 91, 37, 1)“,“color2“:“#333“,“direction“:“to left“}” iibl_font_default=”0″ iibl_title_fsize=”font-size:16px;line-height:1.4;” iibl_title_fstyle=”font-family:Inherit;font-weight:500;” iibl_subtitle_fsize=”font-size:12px;” iibl_subtitle_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_content_fsize=”font-size:13px;” iibl_content_fstyle=”font-family:Inherit;font-weight:inherit;” iibl_image_enable=”0″ iibl_rotation=”false” iibl_style_default=”0″ iibl_icon_margins=”margin-top:0px;margin-bottom:0px;” iibl_title_margins=”margin-top:0px;margin-left:10px;margin-right:0px;margin-bottom:0px;” iibl_subtitle_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;” iibl_content_margins=”margin-top:0px;margin-left:15px;margin-right:0px;margin-bottom:0px;”]Firewall will filter the data as to the information source, destination and services/ports. Myanmar Tech Wave will advice the selection of Firewall that suit to your organization in the aspect of reasonable price and quality.[/kswr_infoboxitem_child][/kswr_iconinfoboxlist]