IT Solutions

QuickBooks Consulting

QuickBooks Consulting

Centric Consulting is the partner you need to protract your small business or organization to improve profitability and productivity, by utilizing QuickBooks more effectively and planning for successful futures. We are certified QuickBooks ProAdvisor and provide QuickBooks consulting, training, and troubleshooting services.

Read More »


Sage ACCPAC Consulting

Sage ACCPAC Consulting

Take advantage of the freedom to do ERP your way. Designed from the ground up to meet the demanding needs of diverse business environments, Sage ERP ACCPAC gives you unprecedented flexibility to select from three powerful editions (100, 200, or 500), a robust suite of modules, comprehensive customization and scalability, and instant, seamless integration to a full set of end-to-end business management applications. SAGE ACCPAC ERP allows you to accomplish more with fewer resources, saving your time and money, and helps you grow your business faster.

Sage ACCPAC is deployed in more than 150 countries worldwide and supports multiple languages, multiple currencies and complies with local accounting so it can satisfy even the most demanding international requirements. Sage ACCPAC lets you choose the solutions and configurations that work best for your business with the low TCO.

Read More »


SAP Consulting

SAP Consulting

Centric Consulting has partnered with SAP to provide SAP B 1 implementation and training services in Pakistan. Centric Consulting's delivers a comprehensive range of SAP offerings to ensure optimum planning, deployment, and operation through every phase of your software life cycle. From expert guidance to complete execution, Centric Consulting's SAP services combine the expertise, tools, and methodologies to accelerate implementations, transfer knowledge, and continuously improve your business SAP Business One integrates all core business functions across your entire company. Unlike many other business solutions in the market today, SAP Business One is a single application, eliminating the need for separate installations and complex integration of multiple modules. Its core modules are:

  • Financial Management ( Financial accounting, Budgeting, Banking, Financial reporting )
  • Operations and Distribution (Sales and delivery, E-commerce, Purchasing, Inventory management, Production planning, BOM )
  • Administration and Reporting (Human resources management, Automatic alerts, Dashboards and reports, Drag and relate , Customization and integration
  • Customer Relationship Management (CRM) (Sales opportunity management, Microsoft Outlook integration, Customer service and support, Business partner management)

SAP Business One is designed for small and medium sized businesses and offers more than 550 industry-specific solutions

Read More »


What We Offer

Information System Audit

Information System Audit

Information Technology (IT) is a Strategic Asset and Critical Enabler for any organization to deliver integrated and easily accessible information to its management and staff regarding its operations, while ensuring that internal administrative operations are managed efficiently and effectively. As per the international standards defined by ISACA, IT Security as the \\\"safeguards\\\" to preserve the confidentiality, integrity, availability, intended use and value of electronically stored, processed or transmitted information.

Objective

The objective of the audit is to assess the organization compliance with the assurance on the Management of Information Technology and focusing on IT risk aspects and requirements. This included assurance that internal controls over the management of IT security were adequate and effective.

Centric Consulting offers to review following key areas but not limited to:

  • Physical and Environmental Review
  • System Administration Review
  • Application Software Review
  • Network Security Review
  • Business Continuity Review
  • Data Integrity Review

Our Approach

At Centric Consulting, we adopt a risk based approach to give our expert assesment after evaluating the following key areas of an organization:

  • Evaluate IT Governance
    • Evaluate IT processes to identify risk
    • Conduct a risk assessment and identify risk exposures that threaten;
      • Data integrity
      • Data security
      • Continuity of operations
      • Regulatory compliance
      • Level/types of access assigned to users and technical staff and customer service
  • Evaluate IT Infrastructure
    • Evaluate the use of computer hardware and software
      • Physical Environment
      • Information System Security
        • Network Security
        • Application Security
        • 3rd Party Service Security
    • Evaluation of data recovery process
  • Evaluate IT Procurement
  • Change Management Review
  • Business Continuity Review
  • Disaster Recovery and Incident Management 

For more information, Contact Us by providing brief information about your requirements in an online inquiry form or you can call us at: +92-51-2605672-74

Read More »


Fraud Solutions

Fraud Solutions

As the effects of the recession continue to bite, fraud is increasing. Attention therefore needs to be focused on protecting finances, assets and reputations. Reducing fraud losses and other financial harm to an absolute minimum is crucial if one is survive the storm. Equally, if you are in a public sector organization reducing losses to fraud can help you sustain levels of service at a time of cuts in public spending.

We provide proactive and reactive solutions to your most difficult “problems”, whatever they may be.  Our Fraud Solutions team can help you to save your organization money and protect its reputation, whether you are in the public or private sector. The impact of fraud and related crime can include:

  • Financial loss, which could have a catastrophic impact on the business
  • Compliance and regulatory infringements
  • Breaches of civil law resulting in litigation and damages paid to injured parties
  • Instigation of criminal proceedings
  • Damaging publicity
  • Loss of funds 

Read More »


Accounting and Bookkeeping

Accounting and Bookkeeping

Our goal is to assist small-to-medium size businesses with their financial accounting and bookkeeping needs. Our services allow organizations to focus on generating additional revenue and core business functions while allowing us to handle the administrative and back-office duties and responsibilities of entering receipts, reconciling accounts and performing month-end financial closings.

Read More »


Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment

We analyse and understand security risks to your business by performing comprehensive and managed vulnerability assessment.

Cyber security is constantly changing and new threats and vulnerabilities against businesses emerge every day. One way to secure company assets, maintain an awareness of the vulnerabilities in your environment and respond quickly to mitigate potential threats is through a regular vulnerability assessment.

A comprehensive vulnerability assessment provides organisations with the knowledge, awareness and risk background necessary to understand threats to their environment. Remediation measures can then be applied accordingly. Identifying risks before hackers do will drastically improve the cyber security posture of your business.

What is a vulnerability assessment?

Centric Consulting’s Vulnerability Assessment service helps to identify, quantify and address the security vulnerabilities that exist within your company’s infrastructure, including on-premise and cloud networks. Our cyber security professionals integrate advanced scanning technology into all vulnerability assessments, providing a high level of support required to address identifiable vulnerabilities.

What we assess

Centric Consulting's Vulnerability Assessment utilises advanced scanning software to detect live risks to your company’s infrastructure, identifying new internal and external vulnerabilities, preventing unauthorised access. Our qualified IT experts review the results of the vulnerability scans to provide a report, outlining key recommendations and threat remediation advice.

We test against the world’s largest integrated public database of exploits and provides the following benefits:

  • Identification of systems and processes that pose a security risk before attackers identify them.
  • Inventory creation of all devices on a business network, including system information.
  • Defined level of risk that exists on the network.
  • Inventory of all devices within the business to assist with future upgrades and future vulnerability assessments.

Penetration Testing

Preparing your business IT systems and infrastructure against any cyber attack is highly reccommended.

We’ll strengthen your network against cyber-attacks with our penetration testing services. Using ethical hacking techniques, real-world cyber-attacks are simulated through internal and external penetration tests to identify any cyber security weaknesses. We’ll expose your security vulnerabilities before hackers exploit them.

Any vulnerabilities that are identified by our team will have remediation techniques applied immediately to secure your IT infrastructure. Extensive reporting is provided, including executive summaries and detailed technical recommendations to enhance the level of existing security within your organisation’s networks.

What is Penetration Testing?

Penetration testing (also known as a ‘pentesting’) is an ethical hacking process designed to assess computer systems, networks and applications. This is with the aim of testing the ability of your systems to withstand a sustained cyber-attack and identify and address security vulnerabilities that could be exploited by cybercriminals.

Penetration Testing Services

  • Network testing
  • Web application security testing
  • Wireless network testing
  • Mobile security testing
  • Physical Devices
  • Firewall configuration review
  • Host configuration review

Read More »