SlideShare a Scribd company logo
1 of 5
Download to read offline
TOTAL FRAUD PROTECTION®
w w w . e a s y s o l . n e t
T R A N S A C T I O N R I S K M O N I T O R I N G
LOGIN MONITORING STRONG AUTHENTICATION
C L I E N T L E S S M A L W A R E D E T E C T I O N
CLOUD AUTHENTICATION FRAUD INTELLIGENCE
E M A I L A U T H E N T I C A T I O N
M OBILE FR A UD PREVENTION SAFE BROWSING
M U LT I - M O D A L B I O M E T R I C A U T H E N T I C AT I O N
IVRs MobileOnline ATM
Transaction Risk Monitoring
Fraud Intelligence
Strong Authentication
Safe Browsing
Easy Solutions’ Total Fraud Protection provides multi-layered security against all forms of electronic fraud and
across every stage of the attack cycle, from planning to cashing. Using real-time data to stop attacks before they
can even go live, Total Fraud Protection’s proactive solutions can be deployed independently, but become even
more powerful as part of an integrated suite of products that share intelligence to make each individual protection
layer more effective.
Reduce the number of attacks over time and control fraud losses by changing attacker incentives with website,
mobile, brand intelligence and compromised debit and credit card protection in one complete solution. Proactive
web fraud detection and takedown in an industry-leading average of 3.6 hours. Real-time portal-based visibility
into web and mobile threats with fully customizable reports.
Omni-channel authentication with the flexibility to deploy factors such as single-tap push notifications, hard-
ware-based device identification, mobile SDKs, multi-modal biometrics and many more. Clearly identify risk and
suspicious behavior, control event volume by reducing false positives and scale across large user bases without
customer friction. Unify authentication through the integration of legacy authentication solutions.
Proactive Mitigation for Account Takeover, Internet Scams
and Malicious Activity against Your Brands
Simple and Flexible Two-Factor Device and
Account Authentication
Fraud
Intelligence
Strong
Authentication
Stop fraud by protecting the end-user device with our anti-malware solutions that help prevent identity theft,
man-in-the-browser attacks and other sophisticated threats in real time. Leverage on-device analytics to quickly
respond and block threats before a fraud incident occurs. Endpoint protection can also be built into native banking
apps via SDK or through a user-friendly plug-and-browse USB device.
Proactive Malware Detection and Threat Analytics on Your
Customers’ Devices
Safe Browsing for
Any Environment
Detects, blocks, alerts and reports in real time on infected devices and webpages that contain malware and other
fraudulent content. Unlock the power of the mobile banking channel and accelerate its adoption among your
customer base with powerful analytics, strong next-generation push authentication and hardware-based device
identification embedded right into your application.
Qualify cross-channel transactional risk based on user behavioral profiles that the solution learns over time and
Suspicious Activity Analyzers that test for known fraud patterns. Initiate out-of-band risk-based authentication for
irregular transactions or login behavior. Streamline fraud investigations using a built-in case management system
and an interactive dashboard of real-time charts and statistics.
DMARC is an emerging email security standard supported by the world’s largest email providers to verify genuine
messages and prevent the rest from ever reaching an inbox. See analytics on all sent email associated with your
domain to fix email authorization gaps and quickly migrate to global blocking of fraudulent messages. Integrate
DMARC with attack takedown to identify and stop threat actors.
Integrate malware detection into your critical web pages to protect 100% of your customers against web injection
attacks with no download required. A screenshot with proof of the malware in action is immediately captured with
our patent-pending Malware Snapshot feature, enhancing attack detection accuracy and allowing you to decisive-
ly respond to risk across your entire customer population.
Use your smartphone to authenticate from anywhere while reducing the risk of a breach and enabling regulatory
compliance. Integrate flexible two-factor authentication into any web application to combat the problem of ram-
pant password reuse. Strong authentication delivered via a range of easy options, including push notifications,
mobile OTPs, multi-modal biometrics and email one-time passcodes.
for further information please contact us at
s a l e s @ e a s y s o l . n e t
or visit our website
w w w . e a s y s o l . n e t
Transparently Deploy Multi-Layered Security in Your Mobile
Banking Application
Simple and Flexible Two-Factor Device and
Account Authentication
Stop Email Spoofing with the Fastest Path to Full DMARC
Adoption
Transparent Malware Protection for All Clients with
Zero Friction
Multi-Factor Authentication for Web and Cloud
Applications.
Mobile Fraud
Prevention
Transaction & Login
Risk Monitoring
Email
Authentication
Clientless
Malware Detection
Cloud
Authentication
Easy Solutions®
is a security vendor focused on the comprehensive detection and prevention of electronic fraud across all de-
vices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and
transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 85 million
customers at 320 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad
are protected by the Easy Solutions Total Fraud Protection®
platform.
Easy Solutions®
is a proud member of key security industry organizations such as the Anti-Phishing Working Group (APWG),
American Bankers Association (ABA) and FIDO (Fast IDentity Online).
About
Easy Solutions
Headquarters
8550 NW 33 Street Suite 101 Doral, FL 33122
Tel. +1-866-524-4782
Latin America
Cra. 13A No. 98 – 21 Of. 401 Bogota, Colombia
Tel. +57 1- 7425570
APAC
East Tower 4th Floor Otemachi First
Square1-5-1 Otemachi, Chiyoda-ku Tokyo 100-0004
Tel . +81-90-8349-4073
EMEA
Parkshot House, 5 Kew Road Richmond, Surrey TW9 2PR, UK
Tel. +44 (0) 77917-798861
Middle East
Exclusive Desk No. 06, Ground floor, Dubai Internet City
Building 16
Tel. +971 564652679
sales@easysol.net
www.easysol.net
Easy Solutions, Inc. All rights reserved worldwide. Specifications and content in this document are subject to change without notice

More Related Content

What's hot

FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsThe TNS Group
 
Managed Security Infographic
Managed Security InfographicManaged Security Infographic
Managed Security InfographicThe TNS Group
 
Poor authorization and authentication
Poor authorization and authenticationPoor authorization and authentication
Poor authorization and authenticationSalma Gouia
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Watering hole attacks detect the undetectable
Watering hole attacks detect the undetectableWatering hole attacks detect the undetectable
Watering hole attacks detect the undetectablePaladionNetworks01
 
Distribution: Industries we Serve
Distribution: Industries we ServeDistribution: Industries we Serve
Distribution: Industries we ServeThe TNS Group
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning OneLogin
 
Managed Security Solutions
Managed Security SolutionsManaged Security Solutions
Managed Security SolutionsThe TNS Group
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Media: Industries we Serve
Media: Industries we ServeMedia: Industries we Serve
Media: Industries we ServeThe TNS Group
 
Plurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick OverviewPlurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick OverviewScott Forman
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudTransUnion
 
Security Testing of Online Stores and Banking Applications
Security Testing of Online Stores and Banking ApplicationsSecurity Testing of Online Stores and Banking Applications
Security Testing of Online Stores and Banking ApplicationsQATestLab
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by SymantecCheapest SSLs
 

What's hot (20)

FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
Construction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking ThreatsConstruction: Protect Your Assets From Ground-Breaking Threats
Construction: Protect Your Assets From Ground-Breaking Threats
 
Managed Security Infographic
Managed Security InfographicManaged Security Infographic
Managed Security Infographic
 
Poor authorization and authentication
Poor authorization and authenticationPoor authorization and authentication
Poor authorization and authentication
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Watering hole attacks detect the undetectable
Watering hole attacks detect the undetectableWatering hole attacks detect the undetectable
Watering hole attacks detect the undetectable
 
spyware
spywarespyware
spyware
 
Distribution: Industries we Serve
Distribution: Industries we ServeDistribution: Industries we Serve
Distribution: Industries we Serve
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning
 
Managed Security Solutions
Managed Security SolutionsManaged Security Solutions
Managed Security Solutions
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
How to beat ransomware
How to beat ransomwareHow to beat ransomware
How to beat ransomware
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Media: Industries we Serve
Media: Industries we ServeMedia: Industries we Serve
Media: Industries we Serve
 
Plurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick OverviewPlurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick Overview
 
Creating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online FraudCreating a Winning Experience While Battling Online Fraud
Creating a Winning Experience While Battling Online Fraud
 
Security Testing of Online Stores and Banking Applications
Security Testing of Online Stores and Banking ApplicationsSecurity Testing of Online Stores and Banking Applications
Security Testing of Online Stores and Banking Applications
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 

Similar to Easy Solutions Product Brochure

How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingSoftwareDeals
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud DatasheetMani Rai
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital LifeSoftwareDeals
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationOnsite Helper
 

Similar to Easy Solutions Product Brochure (20)

How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life2024's Top Antivirus Picks: Safeguarding Your Digital Life
2024's Top Antivirus Picks: Safeguarding Your Digital Life
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 

Easy Solutions Product Brochure

  • 1. TOTAL FRAUD PROTECTION® w w w . e a s y s o l . n e t T R A N S A C T I O N R I S K M O N I T O R I N G LOGIN MONITORING STRONG AUTHENTICATION C L I E N T L E S S M A L W A R E D E T E C T I O N CLOUD AUTHENTICATION FRAUD INTELLIGENCE E M A I L A U T H E N T I C A T I O N M OBILE FR A UD PREVENTION SAFE BROWSING M U LT I - M O D A L B I O M E T R I C A U T H E N T I C AT I O N
  • 2. IVRs MobileOnline ATM Transaction Risk Monitoring Fraud Intelligence Strong Authentication Safe Browsing Easy Solutions’ Total Fraud Protection provides multi-layered security against all forms of electronic fraud and across every stage of the attack cycle, from planning to cashing. Using real-time data to stop attacks before they can even go live, Total Fraud Protection’s proactive solutions can be deployed independently, but become even more powerful as part of an integrated suite of products that share intelligence to make each individual protection layer more effective. Reduce the number of attacks over time and control fraud losses by changing attacker incentives with website, mobile, brand intelligence and compromised debit and credit card protection in one complete solution. Proactive web fraud detection and takedown in an industry-leading average of 3.6 hours. Real-time portal-based visibility into web and mobile threats with fully customizable reports. Omni-channel authentication with the flexibility to deploy factors such as single-tap push notifications, hard- ware-based device identification, mobile SDKs, multi-modal biometrics and many more. Clearly identify risk and suspicious behavior, control event volume by reducing false positives and scale across large user bases without customer friction. Unify authentication through the integration of legacy authentication solutions. Proactive Mitigation for Account Takeover, Internet Scams and Malicious Activity against Your Brands Simple and Flexible Two-Factor Device and Account Authentication Fraud Intelligence Strong Authentication Stop fraud by protecting the end-user device with our anti-malware solutions that help prevent identity theft, man-in-the-browser attacks and other sophisticated threats in real time. Leverage on-device analytics to quickly respond and block threats before a fraud incident occurs. Endpoint protection can also be built into native banking apps via SDK or through a user-friendly plug-and-browse USB device. Proactive Malware Detection and Threat Analytics on Your Customers’ Devices Safe Browsing for Any Environment
  • 3. Detects, blocks, alerts and reports in real time on infected devices and webpages that contain malware and other fraudulent content. Unlock the power of the mobile banking channel and accelerate its adoption among your customer base with powerful analytics, strong next-generation push authentication and hardware-based device identification embedded right into your application. Qualify cross-channel transactional risk based on user behavioral profiles that the solution learns over time and Suspicious Activity Analyzers that test for known fraud patterns. Initiate out-of-band risk-based authentication for irregular transactions or login behavior. Streamline fraud investigations using a built-in case management system and an interactive dashboard of real-time charts and statistics. DMARC is an emerging email security standard supported by the world’s largest email providers to verify genuine messages and prevent the rest from ever reaching an inbox. See analytics on all sent email associated with your domain to fix email authorization gaps and quickly migrate to global blocking of fraudulent messages. Integrate DMARC with attack takedown to identify and stop threat actors. Integrate malware detection into your critical web pages to protect 100% of your customers against web injection attacks with no download required. A screenshot with proof of the malware in action is immediately captured with our patent-pending Malware Snapshot feature, enhancing attack detection accuracy and allowing you to decisive- ly respond to risk across your entire customer population. Use your smartphone to authenticate from anywhere while reducing the risk of a breach and enabling regulatory compliance. Integrate flexible two-factor authentication into any web application to combat the problem of ram- pant password reuse. Strong authentication delivered via a range of easy options, including push notifications, mobile OTPs, multi-modal biometrics and email one-time passcodes. for further information please contact us at s a l e s @ e a s y s o l . n e t or visit our website w w w . e a s y s o l . n e t Transparently Deploy Multi-Layered Security in Your Mobile Banking Application Simple and Flexible Two-Factor Device and Account Authentication Stop Email Spoofing with the Fastest Path to Full DMARC Adoption Transparent Malware Protection for All Clients with Zero Friction Multi-Factor Authentication for Web and Cloud Applications. Mobile Fraud Prevention Transaction & Login Risk Monitoring Email Authentication Clientless Malware Detection Cloud Authentication
  • 4.
  • 5. Easy Solutions® is a security vendor focused on the comprehensive detection and prevention of electronic fraud across all de- vices, channels and clouds. Our products range from fraud intelligence and secure browsing to multi-factor authentication and transaction anomaly detection, offering a one-stop shop for end-to-end fraud protection. The online activities of over 85 million customers at 320 leading financial services companies, security firms, retailers, airlines and other entities in the US and abroad are protected by the Easy Solutions Total Fraud Protection® platform. Easy Solutions® is a proud member of key security industry organizations such as the Anti-Phishing Working Group (APWG), American Bankers Association (ABA) and FIDO (Fast IDentity Online). About Easy Solutions Headquarters 8550 NW 33 Street Suite 101 Doral, FL 33122 Tel. +1-866-524-4782 Latin America Cra. 13A No. 98 – 21 Of. 401 Bogota, Colombia Tel. +57 1- 7425570 APAC East Tower 4th Floor Otemachi First Square1-5-1 Otemachi, Chiyoda-ku Tokyo 100-0004 Tel . +81-90-8349-4073 EMEA Parkshot House, 5 Kew Road Richmond, Surrey TW9 2PR, UK Tel. +44 (0) 77917-798861 Middle East Exclusive Desk No. 06, Ground floor, Dubai Internet City Building 16 Tel. +971 564652679 sales@easysol.net www.easysol.net Easy Solutions, Inc. All rights reserved worldwide. Specifications and content in this document are subject to change without notice