Trainings

Corporate Trainings

Soft Skills, Tax, Fraud & Internal Audit Training.

Centric Consulting offers a wide array of training programs for all organizational levels in public, private and social sectors. Centric Consulting aims at delivering life changing, highly interactive, goal oriented and life transforming training programs. Our trainers know the the turf and master adult learning psychology that help them designing and delivering goal specific training programs.

Learn More
Technology

Technology Solutions

The Company is engaged in technology strategy consulting, complex systems development and integration, enterprise software package implementation and maintenance, data warehousing, business intelligence and analytics, application testing, application maintenance, infrastructure management, and business and knowledge process outsourcing (BPO and KPO).

Accounting

Accounting Services

Reshaping The Future of Corporate Advisory.

Are you looking for an affordable, all-inclusive, hassle free accountancy service?
Do you want ALL your bookkeeping, accounts, payroll, VAT and tax returns done for you for a low fixed monthly fee?
YES? Then we want you to leave the stress and worry of your bookkeeping and accounts to us and say:
“Centric Consulting Got It Covered”

Learn More
VA and PT
By performing Vulnerability Assessment & Penetration Testing, you can know that what are the risks asscoiated with your IT systems and how can those risks be mitigated. The aim is to improve the overall security of your IT system.

Corporate Trainings



IT Solutions

QuickBooks Consulting

QuickBooks Consulting

Sage ACCPAC Consulting

Sage ACCPAC Consulting

SAP Consulting

SAP Consulting

What We Offer

Information System Audit

Information System Audit

Information Technology (IT) is a Strategic Asset and Critical Enabler for any organization to deliver integrated and easily accessible information to its management and staff regarding its operations, while ensuring that internal administrative operations are managed efficiently and effectively. As per the international standards defined by ISACA, IT Security as the \\\"safeguards\\\" to preserve the confidentiality, integrity, availability, intended use and value of electronically stored, processed or transmitted information.

Objective

The objective of the audit is to assess the organization compliance with the assurance on the Management of Information Technology and focusing on IT risk aspects and requirements. This included assurance that internal controls over the management of IT security were adequate and effective.

Centric Consulting offers to review following key areas but not limited to:

  • Physical and Environmental Review
  • System Administration Review
  • Application Software Review
  • Network Security Review
  • Business Continuity Review
  • Data Integrity Review

Our Approach

At Centric Consulting, we adopt a risk based approach to give our expert assesment after evaluating the following key areas of an organization:

  • Evaluate IT Governance
    • Evaluate IT processes to identify risk
    • Conduct a risk assessment and identify risk exposures that threaten;
      • Data integrity
      • Data security
      • Continuity of operations
      • Regulatory compliance
      • Level/types of access assigned to users and technical staff and customer service
  • Evaluate IT Infrastructure
    • Evaluate the use of computer hardware and software
      • Physical Environment
      • Information System Security
        • Network Security
        • Application Security
        • 3rd Party Service Security
    • Evaluation of data recovery process
  • Evaluate IT Procurement
  • Change Management Review
  • Business Continuity Review
  • Disaster Recovery and Incident Management 

For more information, Contact Us by providing brief information about your requirements in an online inquiry form or you can call us at: +92-51-2605672-74

Read More »


Fraud Solutions

Fraud Solutions

As the effects of the recession continue to bite, fraud is increasing. Attention therefore needs to be focused on protecting finances, assets and reputations. Reducing fraud losses and other financial harm to an absolute minimum is crucial if one is survive the storm. Equally, if you are in a public sector organization reducing losses to fraud can help you sustain levels of service at a time of cuts in public spending.

We provide proactive and reactive solutions to your most difficult “problems”, whatever they may be.  Our Fraud Solutions team can help you to save your organization money and protect its reputation, whether you are in the public or private sector. The impact of fraud and related crime can include:

  • Financial loss, which could have a catastrophic impact on the business
  • Compliance and regulatory infringements
  • Breaches of civil law resulting in litigation and damages paid to injured parties
  • Instigation of criminal proceedings
  • Damaging publicity
  • Loss of funds 

Read More »


Accounting and Bookkeeping

Accounting and Bookkeeping

Our goal is to assist small-to-medium size businesses with their financial accounting and bookkeeping needs. Our services allow organizations to focus on generating additional revenue and core business functions while allowing us to handle the administrative and back-office duties and responsibilities of entering receipts, reconciling accounts and performing month-end financial closings.

Read More »


Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment

We analyse and understand security risks to your business by performing comprehensive and managed vulnerability assessment.

Cyber security is constantly changing and new threats and vulnerabilities against businesses emerge every day. One way to secure company assets, maintain an awareness of the vulnerabilities in your environment and respond quickly to mitigate potential threats is through a regular vulnerability assessment.

A comprehensive vulnerability assessment provides organisations with the knowledge, awareness and risk background necessary to understand threats to their environment. Remediation measures can then be applied accordingly. Identifying risks before hackers do will drastically improve the cyber security posture of your business.

What is a vulnerability assessment?

Centric Consulting’s Vulnerability Assessment service helps to identify, quantify and address the security vulnerabilities that exist within your company’s infrastructure, including on-premise and cloud networks. Our cyber security professionals integrate advanced scanning technology into all vulnerability assessments, providing a high level of support required to address identifiable vulnerabilities.

What we assess

Centric Consulting's Vulnerability Assessment utilises advanced scanning software to detect live risks to your company’s infrastructure, identifying new internal and external vulnerabilities, preventing unauthorised access. Our qualified IT experts review the results of the vulnerability scans to provide a report, outlining key recommendations and threat remediation advice.

We test against the world’s largest integrated public database of exploits and provides the following benefits:

  • Identification of systems and processes that pose a security risk before attackers identify them.
  • Inventory creation of all devices on a business network, including system information.
  • Defined level of risk that exists on the network.
  • Inventory of all devices within the business to assist with future upgrades and future vulnerability assessments.

Penetration Testing

Preparing your business IT systems and infrastructure against any cyber attack is highly reccommended.

We’ll strengthen your network against cyber-attacks with our penetration testing services. Using ethical hacking techniques, real-world cyber-attacks are simulated through internal and external penetration tests to identify any cyber security weaknesses. We’ll expose your security vulnerabilities before hackers exploit them.

Any vulnerabilities that are identified by our team will have remediation techniques applied immediately to secure your IT infrastructure. Extensive reporting is provided, including executive summaries and detailed technical recommendations to enhance the level of existing security within your organisation’s networks.

What is Penetration Testing?

Penetration testing (also known as a ‘pentesting’) is an ethical hacking process designed to assess computer systems, networks and applications. This is with the aim of testing the ability of your systems to withstand a sustained cyber-attack and identify and address security vulnerabilities that could be exploited by cybercriminals.

Penetration Testing Services

  • Network testing
  • Web application security testing
  • Wireless network testing
  • Mobile security testing
  • Physical Devices
  • Firewall configuration review
  • Host configuration review

Read More »


VIEW ALL SERVICES

Newsletter Signup

Testimonials