Skip to main content

WeAreZoracom

We're - Zoracom
Last updated: January 20, 2023

Automating Observability, Cybersecurity and Infrastructure Management

  • We solving digital transformation challenges by deploying and running service assurance and service fulfillment solution for Cloud, Enterprise, Telco/ISP, SaaS, IoT & DC.
Miro
  • Automated network and services management solution that offers end-to-end observability into your entire network infrastructure, automates response to prevent hotspots and outright service failures.
Fortrex
  • Unified cybersecurity operational resilience solution that ensures safety and privacy of critical data, integrity and availability.
Zmart
  • Automated sensor monitoring and management solutions for complex interconnected systems, controllers, robotics, oil rigs/platforms, industrial IoT, smart homes and smart cities.
NSOC

ISMS Objective

  • Do whatever it takes to secure information.

Leader

  • CISO - Chief Information Officer

Dependency Unit

  • Human Resource
  • Information Technology
  • Operations

Control of hardcopy versions

  • The digital version of this document is the most recent version. It is the responsibility of the individual to ensure that any printed version is the most recent version. The printed version of this manual is uncontrolled, and cannot be relied upon, except when formally issued by the CISO and provided with a document reference number and revision in the fields below:

Responsibilities

  • Managers and supervisors are responsible for the implementation of this policy, within the scope of their responsibilities, and must ensure that all staff under their control understand and undertake their responsibilities accordingly.

Core Concepts

  • The framework focuses on protecting information resources and systems against:
  • Unauthorized Use and Access of Information
  • Unauthorized Disclosure and Modification of Information
  • Damage and Destruction of Information

Overview of Program

  • It is strategic decision taken by Zoracom to Design and Implementation of ISMS requirement:
  • Needs and objectives to be defined
  • Security requirements analysed
  • Standardization of the processes employed
  • Structure of the organization to commit to implementation