• Save
Esguf Profile Short V34
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Esguf Profile Short V34

on

  • 3,058 views

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Statistics

Views

Total Views
3,058
Views on SlideShare
3,055
Embed Views
3

Actions

Likes
1
Downloads
0
Comments
0

1 Embed 3

http://www.linkedin.com 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Introduce: ESGULF, partners, sponsors, yourself

Esguf Profile Short V34 Presentation Transcript

  • 1. E-Security Gulf Group WLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
  • 2. Profile
    • “ Leading security solutions ”
    • Strategic partner for security solutions
    • EU, GCC, Asia
    • ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX
    • Complete security portfolio
    • Physical Security
    • Homeland Security
    • Incidence Response Center
    • Managed Security Services
    • Pool > 50 security professionals
    • A 5tm Methodology
    • Time Based Security
  • 3. New Technologies, Risks
    • Laptops
    • Mobiles
    • Wireless
    • Bluetooth
    • PDA
    • Memory Sticks
    • Smart Card
  • 4. More sophisticated Attacks
  • 5. When Hackers grow UP?
  • 6. Your Business @ Risk!
  • 7. Critical resources
  • 8. Disaster Strikes easy…
  • 9. Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
  • 10. Business Risk Employee & customer privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
  • 11. The result is!
  • 12. Right Assumptions?
  • 13. Security Challenges Confidentiality Integrity Availability
  • 14. Threats and Risk
  • 15. Risk requires… Technology Process People
  • 16. Risk Matrices
  • 17. Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
  • 18. Security = Time Protection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
  • 19. A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm S ecurity Physical A dminister A pply A rchitect A ssess A wareness
  • 20. Security Services
    • Managed Security Services
    • CCTV & Access Control
    • Security Operations Center
    • Forensic Analysis
    • Incidence Response
    Administer
    • Security Education Training and Awareness
    • Organizational security
    • Security Maturity
    Awareness
    • Security Defense, Administration
    • PKI, VPN, Encryption
    • Biometrics, Smart Card, Access Control, Perimeter
    • Web Defacement Protection
    • Content Inspection and Management
    Apply
    • Design Security Perimeter
    • Security Awareness Program
    • Policies, Standards, Procedures, Guidelines
    • Physical Protection
    • Disaster Recovery Planning
    Architect
    • Vulnerability Testing
    • ISO27001 Assessment
    • Penetration Testing
    • Business Impact Assessment
    • Security Auditing
    Assess
  • 21. Security Research-1
    • Remote secure data access
    • Certificate based or dynamic password technology
    • Transparent technology
    Secure Access
    • Your portable Datacenter
    • Full Data synchronization
    • Multi-operating System Support
    • Support for full back and front office operations
    • Tactical solution for Disaster Recovery
    Disaster Recovery Box (DRB)
    • Cost Effective Security Operations Center
    • Internal or Externally Managed
    • Technology Transfer
    • Distributed Architecture, Scalable, Module
    • Support for full forensic analysis
    First Defence
    • Basis for Security Framework
    • Based on open Security Standards
    • Support for Time Based Security
    • Continuous Process
    • People, Process Technology Paradigm
    A 5 tm Methodology Key Features Solutions
  • 22. Security Research-2
    • Hackers Insight for CIO/CEO
    • Hackers Insight for Managers
    • Hackers Insight for Techies
    • Hackers Insight for Wireless
    • Practical Security Workshops
    • Learn attack and countermeasure technologies
    Hackers Insight Training Series
    • Managed Vulnerability Services
    • Managed Early alter Services
    • Managed Patching and Configuration Management
    • Managed Incidence Response
    • Managed Security Monitoring and Alerting
    Managed Security Services (MSS)
    • Multi technology for complete Defense
    • Early warning system
    • Internal and external protection
    • Managed Service
    Phishing Alert Plus (PAP)
    • Secure Hosting
    • Secure Data Vaulting
    • Complete Storage and Transmission Encryption
    Swiss Vault Key Features Solutions
  • 23. Integration Business Security Management Physical Security Management ICT Security Management
  • 24. A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
  • 25. Best Practices
  • 26. Securing Applications
  • 27. Flexible Architecture
  • 28. Physical Security
  • 29. Knowledge fills gaps SETA =Security Education + Training + Awareness
  • 30. A5™ Security Defense in depth
  • 31. Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
  • 32. SOC Continuous Response
    • 24x7x365
    • Security monitoring
    • Managed Services
    • Automatic Alerting
    • Incidence Response
    • Vulnerability Assessment
    • Patch Management
    • Forensic Analysis
    • Integration
  • 33. Various response types Business Availability
  • 34. Implementation Process Education Standards & Best Practices Support
  • 35. Partnerships
  • 36. Why eSgulf?
    • Integrated Methodology
    • Industry Best practices
    • Business & Risk Focus
    • Security Metrics approach
    • Security Experts
    • Proof of Concept and R&D Lab
    • Proven delivery, references
    • Cost effective solutions & services
    • Strategic Vendor Partnerships
    • 24x7x365 Support