SlideShare a Scribd company logo
1 of 9
CGC Solutions & Services
Martin Benuska
321-274-2484
benuskam@cgcsas.com
CGC SOLUTIONS & SERVICES
                          Introduction of our company


   Highest-quality solutions for facilities and information security management
    and monitoring
   Branch of the C.G.C. Inc. established in 1998 and employing 100+ employees.
   40+ large customers including IBM, T-Mobile, national water and power
    suppliers and two banks
   Individual approach covered by owners
   All services are provided and delivered by experienced professionals
Martin Benuska
             Branch Manager, Security Professional


   11 years experience delivering strategic IT security services

   15+ Security certifications including the CISSP and ISO27001 auditor

   Managed security infrastructure for 3 telecommunication service providers

   Audited security and designed measures for 5 banks and 3 government
    ministries

   Built three Security Operation Centers monitoring 10000+ workstations and
    500+ security devices
Security Audit
                     Are you aware of the risks?

Verify quality and functionality of yours measures protecting your:

   services exposed to the Internet (web, email, DNS, ftp)
   local and Wifi network
   application security (accounting system, banking system, CRM,
    custom applications)
   mobile devices and local workstations
   data storage and archivation
   business continuity and disaster recovery plans
   facility safeguards
   compliant with recommendations of NIADA and FTC

        This complex security audit consists of 800+ security tests!
Security Audit
                 Why you should be interested

o You store and process sensitive data
o Employees fluctuate between dealers
o Competition is strong and failure will cost you $$$
o Need to protect your reputation
o Know current threats and risks
o Improve detection of and reaction time to security incidents
o Minimize administration costs and maximize every dollar spent on
  security
o Achieve predictable, cost-effective compliance
o Insurance is expensive and lacks coverage of many risks
o Control service quality of your contractors
o Protection of data is required by Law
o Show customers how important they are to you
Ultimate Building Automation System
   monitor and control measures including alarm, access control, cameras
   unified user interface with the same graphics and control logic
   single log-in, without numerous passwords and client applications with
    different roles
   unique expansibility, not necessary to change existing components
   enhancement of the company‘s internal security against data loss
   reduced computing equipment costs by centralized database and cloud
   reduced HR-costs – by process automation and interlinked modules
   robust system, designed for continuous operation - history of over 10 years
   centralized overview of the facility protection using GUI, web browser or cell
    phone
   functionality adaptation to customer‘s needs
   monitor presence of the employees and customers
   reduced maintenance and user-training costs
   GPS car tracking
Other services
Security Monitoring and Management
Continuously monitored protection of your assets, safety of your employees and customers

Remote windows,linux administration
Outsource system management to process driven qualified professionals (MCSE, RHCE..)

Remote management of security devices
We are certified to provide qualified support for products of CheckPoint, RSA, IBM ISS,
ArcSight, TrendMicro and other vendors.

Remote programming services
Outsource programming tasks to experienced professionals. Our programmers have in
avarage 10 years    experience and are skilled with C++, Java, .Net, PHP and other
languages

Local training
Improve security awareness of your employees. We will teach your employees understand
threats and risks, teach them how to act safely and how to react in case of incident.
SUMMARY OF BENEFITS
   CGC is exceptional by providing complex protection:
     Information Technologies and data
     Buildings and Facilities
     Management & Monitoring

   Entered into SMB market after success with large customers

   Offers best price quarantee

   Vendor independent focused to deliver best quality

   Over 14 years experience delivering security solutions

   Over 100 employees with 24/7 hotline support

   ISO9001, ISO27000 and National Security Authority certified
CGC Solutions & Services
Martin Benuska
321-274-2484
benuskam@cgcsas.com

More Related Content

What's hot

Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwellMark Capwell
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Computer engineering company
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)Riad MAALOUF
 
Stop loss how it works eng
Stop loss   how it works engStop loss   how it works eng
Stop loss how it works engSergey Boronin
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture PrinciplesRichard Dempers
 
MBM Managed Security Services
MBM Managed Security ServicesMBM Managed Security Services
MBM Managed Security ServicesCharles McNeil
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCimetrics Inc
 
redwire video verification
redwire video verificationredwire video verification
redwire video verificationnokelley
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-networkhardik soni
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)Osama Ellahi
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)rver21
 

What's hot (20)

Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwell
 
MIservices
MIservicesMIservices
MIservices
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)
 
Stop loss how it works eng
Stop loss   how it works engStop loss   how it works eng
Stop loss how it works eng
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
resume-updated
resume-updatedresume-updated
resume-updated
 
Security Architecture Principles
Security Architecture PrinciplesSecurity Architecture Principles
Security Architecture Principles
 
MBM Managed Security Services
MBM Managed Security ServicesMBM Managed Security Services
MBM Managed Security Services
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
redwire video verification
redwire video verificationredwire video verification
redwire video verification
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
SIEM
SIEMSIEM
SIEM
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 

Similar to Security Consulting and Management by CGC - www.cgcsas.com

Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00Itconic
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overviewexpetec
 
Digital Vision Presentation
Digital Vision PresentationDigital Vision Presentation
Digital Vision Presentationrrotondo32
 
Security operations services
Security operations servicesSecurity operations services
Security operations servicesS&T GROUP
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptxssuser41d278
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project managerlijin thomas
 
Mintivo business IT service catalogue
Mintivo business IT service catalogueMintivo business IT service catalogue
Mintivo business IT service catalogueChris Gough
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security PresentationPeter921148
 
Imprnt systems cctv_thin_clients
Imprnt systems cctv_thin_clientsImprnt systems cctv_thin_clients
Imprnt systems cctv_thin_clientsimprnt
 

Similar to Security Consulting and Management by CGC - www.cgcsas.com (20)

Erzam profl oct18
Erzam profl oct18Erzam profl oct18
Erzam profl oct18
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00TGS-BP-BusinessPresentation-en-r00
TGS-BP-BusinessPresentation-en-r00
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
Digital Vision Presentation
Digital Vision PresentationDigital Vision Presentation
Digital Vision Presentation
 
Security operations services
Security operations servicesSecurity operations services
Security operations services
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project manager
 
Mintivo business IT service catalogue
Mintivo business IT service catalogueMintivo business IT service catalogue
Mintivo business IT service catalogue
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security Presentation
 
Imprnt systems cctv_thin_clients
Imprnt systems cctv_thin_clientsImprnt systems cctv_thin_clients
Imprnt systems cctv_thin_clients
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Security Consulting and Management by CGC - www.cgcsas.com

  • 1. CGC Solutions & Services Martin Benuska 321-274-2484 benuskam@cgcsas.com
  • 2. CGC SOLUTIONS & SERVICES Introduction of our company  Highest-quality solutions for facilities and information security management and monitoring  Branch of the C.G.C. Inc. established in 1998 and employing 100+ employees.  40+ large customers including IBM, T-Mobile, national water and power suppliers and two banks  Individual approach covered by owners  All services are provided and delivered by experienced professionals
  • 3. Martin Benuska Branch Manager, Security Professional  11 years experience delivering strategic IT security services  15+ Security certifications including the CISSP and ISO27001 auditor  Managed security infrastructure for 3 telecommunication service providers  Audited security and designed measures for 5 banks and 3 government ministries  Built three Security Operation Centers monitoring 10000+ workstations and 500+ security devices
  • 4. Security Audit Are you aware of the risks? Verify quality and functionality of yours measures protecting your:  services exposed to the Internet (web, email, DNS, ftp)  local and Wifi network  application security (accounting system, banking system, CRM, custom applications)  mobile devices and local workstations  data storage and archivation  business continuity and disaster recovery plans  facility safeguards  compliant with recommendations of NIADA and FTC This complex security audit consists of 800+ security tests!
  • 5. Security Audit Why you should be interested o You store and process sensitive data o Employees fluctuate between dealers o Competition is strong and failure will cost you $$$ o Need to protect your reputation o Know current threats and risks o Improve detection of and reaction time to security incidents o Minimize administration costs and maximize every dollar spent on security o Achieve predictable, cost-effective compliance o Insurance is expensive and lacks coverage of many risks o Control service quality of your contractors o Protection of data is required by Law o Show customers how important they are to you
  • 6. Ultimate Building Automation System  monitor and control measures including alarm, access control, cameras  unified user interface with the same graphics and control logic  single log-in, without numerous passwords and client applications with different roles  unique expansibility, not necessary to change existing components  enhancement of the company‘s internal security against data loss  reduced computing equipment costs by centralized database and cloud  reduced HR-costs – by process automation and interlinked modules  robust system, designed for continuous operation - history of over 10 years  centralized overview of the facility protection using GUI, web browser or cell phone  functionality adaptation to customer‘s needs  monitor presence of the employees and customers  reduced maintenance and user-training costs  GPS car tracking
  • 7. Other services Security Monitoring and Management Continuously monitored protection of your assets, safety of your employees and customers Remote windows,linux administration Outsource system management to process driven qualified professionals (MCSE, RHCE..) Remote management of security devices We are certified to provide qualified support for products of CheckPoint, RSA, IBM ISS, ArcSight, TrendMicro and other vendors. Remote programming services Outsource programming tasks to experienced professionals. Our programmers have in avarage 10 years experience and are skilled with C++, Java, .Net, PHP and other languages Local training Improve security awareness of your employees. We will teach your employees understand threats and risks, teach them how to act safely and how to react in case of incident.
  • 8. SUMMARY OF BENEFITS  CGC is exceptional by providing complex protection:  Information Technologies and data  Buildings and Facilities  Management & Monitoring  Entered into SMB market after success with large customers  Offers best price quarantee  Vendor independent focused to deliver best quality  Over 14 years experience delivering security solutions  Over 100 employees with 24/7 hotline support  ISO9001, ISO27000 and National Security Authority certified
  • 9. CGC Solutions & Services Martin Benuska 321-274-2484 benuskam@cgcsas.com