SlideShare a Scribd company logo
1 of 2
Download to read offline
DUKE GROUP OF INDUSTRIES                 CASE STUDY

                                         “Nevales UTM provides speedy performance. The most
                                         important quality of Nevales UTM is its remarkable 'Pay As
                                         You Use' service. The Nevales solution is running very well
                                         and has changed our perception about UTM solutions”.
                                                                      Mr. Amrut Barde - Vice President MIS
Company Stats
                                         Client Background
 · No. of offices and locations: 5       Originally founded in 2001, the Duke Group of Companies have merged
   (Bangalore, Pune (2), Delhi,          to form Duke Group of Industries, a global asset holding company
   Ahmednagar)                           focused on operations across various industries including Automotive,
                                         Aerospace & Defense, Clean Technologies & Renewable Energy, Electrical
 · Group Companies : Duke
                                         Equipment, Healthcare, Real Estate, Security Services & Equipment, and
   Corporation, Harig Crankshafts,
                                         Transportation. With operations in India, China, Europe and the U.S., the
   Gera Auto
                                         company provides growth capital, strategic guidance and operational
 · Vertical : Turnkey Projects           expertise for their growing portfolio of companies.

 · User Base : 100+                      Duke Group of Industries' principal growth strategy has been to expand
                                         their holdings with attractive opportunities that further broaden the
URL : www.duke-industries.com            global reach in Precision Manufacturing, Clean Energy Solutions, and
                                         Services. While most of their recent growth has come from the past
The Challenges                           private equity and corporate advisory activities, to date the company has
                                         closed more than 30 transactions around the globe with a specific focus
 · Vulnerable to external attacks’
                                         on High Growth industries in Emerging Markets, or in Distressed or
                                         Turnaround situations in Mature Markets.
 · Bandwidth misuse

 · Exposed inter-office connectivity     Challenges
                                         In order to increase business and stay connected with all offices and
The Technical Solution                   customers, the company needed to have faster systems, manage its cash
                                         flows and working capital, track material information and communicate
 · Robust Nevales firewall to manage     on a continuous basis. As a fast growing business, the company could not
   and protect all communications        afford extended system downtime and loss of critical data.
   between the internet and internal
   network                               They were exposed to constant threats due to a weak security system
                                         leading to damage to critical assets that were deployed to cater to key-
 · Nevales VPN for secure site-to-site
                                         clients which was ultimately leading to loss of business. Employee
   connection
                                         efficiency and motivation was also affected.
 · Nevales bandwidth management
                                         There was no secure inter-office connectivity. All the 5 office locations
   along with effective Nevales surf
   protection to manage and monitor      were unable to co-ordinate and streamline their work. This was leading to
   the use of the internet.              ambiguity in tasks, duplication of work, inappropriate use of resources
                                         and loss of valuable time.
The Results                                                                 Duke Group of Industries did not have any robust firewall solution and
                                                                            hence they were unable to protect their network from virus attacks and
  · Stable and secure network                                               did not have uniform management, control and performance monitoring
                                                                            for websites. They suffered heavy broadcasting on internal LAN due to
  · Easy centralized manageability                                          regular virus attacks from the Internet as there were decentralized IT
                                                                            policies which Nevales helped to make centralized.
  · Proper bandwidth utilization
                                                                            In addition to accessing social networking sites, employees were also
                                                                            uploading and downloading music and video content, listening to the
  · Considerable reduction in downtime                                      radio over the Internet, downloading music, and streaming videos over
                                                                            the Internet which resulted to heavy bandwidth utilization and slow
  · Network redundancy                                                      browsing.

  · Increased system and employee
                                                                            The Effective Solution offered
    efficiency and productivity
                                                                            After deliberate and extensive discussion with Duke Group of Industries
                                                                            and a detailed study/analysis of the existing system, Nevales suggested
                                                                            and executed the installation of a customized UTM system, fit to cater to
Nevales Benefits                                                            the objectives outlined by the client and more.

  · Managed Secured Services                                                After implementation, Nevales Firewall manages all communication
                                                                            traffic between the Internet and internal networks, controlling incoming
  · Direct Nevales Support                                                  and outgoing network traffic based on the corporate security policy,
                                                                            simultaneously blocking unauthorized access.
  · Pricing: OPEX
                                                                            We have configured the content filtering by creating user groups and
  · Integrated Load Balancing                                               giving them user access according to their privilege defined by
                                                                            company's IT security policy.
  · Customizable
                                                                            To provide quality of service to the users and increase network
  · Scalable                                                                redundancy we have implemented Load balancing / Failover between
                                                                            two ISPs.
  · Best of Breed OEM Partnerships
                                                                            Employees who misuse the bandwidth for illegal downloads and file
                                                                            sharing have been restricted by Nevales gateway level solution.
  · Free Hardware Replacement
                                                                            Along with Nevales firewall, we offered Unified Threat Management
  · Tangible ROI
                                                                            (UTM) features as well. One of the main requirements of the client was
                                                                            inter office connectivity. This requirement was fulfilled with the
                                                                            successful implementation of the IPSec/VPN feature.

                                                                            Also now, the solution serves as a central repository of all auditing and
                                                                            repository information.




Nevales Networks Pvt. Ltd. Advance House, 2nd Floor, Makwana Road, Off Andheri-Kurla Road, Andheri (East),
Mumbai – 400 059, Maharashtra, INDIA. Tel: +91 22 4236 4444 | Fax: +91 22 4236 4409 | Email: info@nevales.com
Web: www.nevales.com
C o p y r i g h t © 2011 Nevales Networks Pvt. Ltd. All rights reserved. Nevales Networks Pvt. Ltd has the right to change, modify, transfer or otherwise revise the content without
notice. The Actual performance may vary depending on the real network traffic environments. Network variables, different network environments and other conditions may
affect performance results. Nothing herein represents any binding commitment by Nevales.

More Related Content

What's hot

Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)Andreas Ramov
 
Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012Werner Luetkemeier
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at AbacusNovember014
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdfNovell
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
Enterprise Laptop Backup- Druva inSync
Enterprise Laptop Backup- Druva inSyncEnterprise Laptop Backup- Druva inSync
Enterprise Laptop Backup- Druva inSyncJaspreet Singh
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandDamian Hamilton
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Hanley Energy Data Centre3
Hanley Energy Data Centre3Hanley Energy Data Centre3
Hanley Energy Data Centre3emoclew
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentationeraz
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)sonnysonare
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSiraj Syed
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 
CentricsIT: We see IT differently.
CentricsIT: We see IT differently.CentricsIT: We see IT differently.
CentricsIT: We see IT differently.mbrandon17
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 

What's hot (20)

Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)
Permal case study (IaaS, Hosting, Citrix Management & Intrusion Detection)
 
Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012Novell Tour Europe and South Africa 2012
Novell Tour Europe and South Africa 2012
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at Abacus
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Enterprise Laptop Backup- Druva inSync
Enterprise Laptop Backup- Druva inSyncEnterprise Laptop Backup- Druva inSync
Enterprise Laptop Backup- Druva inSync
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New Zealand
 
Sycor
SycorSycor
Sycor
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Hanley Energy Data Centre3
Hanley Energy Data Centre3Hanley Energy Data Centre3
Hanley Energy Data Centre3
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentation
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 
CentricsIT: We see IT differently.
CentricsIT: We see IT differently.CentricsIT: We see IT differently.
CentricsIT: We see IT differently.
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 

Viewers also liked

Challenges Facing Small Business
Challenges Facing Small BusinessChallenges Facing Small Business
Challenges Facing Small BusinessLakesia Wright
 
Small Business Challenges
Small Business ChallengesSmall Business Challenges
Small Business ChallengesBonnie Canal
 
Small Business, Big Customer Success Challenges
Small Business, Big Customer Success ChallengesSmall Business, Big Customer Success Challenges
Small Business, Big Customer Success ChallengesGainsight
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology ChallengesInfinity Technologies
 

Viewers also liked (6)

Challenges Facing Small Business
Challenges Facing Small BusinessChallenges Facing Small Business
Challenges Facing Small Business
 
Overcoming Small Business Challenges
Overcoming Small Business ChallengesOvercoming Small Business Challenges
Overcoming Small Business Challenges
 
Small Business Challenges
Small Business ChallengesSmall Business Challenges
Small Business Challenges
 
Small Business, Big Customer Success Challenges
Small Business, Big Customer Success ChallengesSmall Business, Big Customer Success Challenges
Small Business, Big Customer Success Challenges
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
10 biggest challenges facing small business
10 biggest challenges facing small business10 biggest challenges facing small business
10 biggest challenges facing small business
 

Similar to Challenges faced by small and medium business

Distributed Enterprise Solutions
Distributed Enterprise SolutionsDistributed Enterprise Solutions
Distributed Enterprise Solutionsseanbrookes
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGrant Swanson
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
Tridium Telecom Profile
Tridium Telecom ProfileTridium Telecom Profile
Tridium Telecom Profilemcl221
 
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefWAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefJuniper Networks
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...Amazon Web Services
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionHossam Zein
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
NetScout Northumbrian water case study
NetScout Northumbrian water case studyNetScout Northumbrian water case study
NetScout Northumbrian water case studyContent Rules, Inc.
 
Sistem wireless canopy
Sistem wireless canopySistem wireless canopy
Sistem wireless canopyEko Kiswanto
 

Similar to Challenges faced by small and medium business (20)

Distributed Enterprise Solutions
Distributed Enterprise SolutionsDistributed Enterprise Solutions
Distributed Enterprise Solutions
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Product Information: Cloud Services
Product Information: Cloud ServicesProduct Information: Cloud Services
Product Information: Cloud Services
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Virtual server-hosting
Virtual server-hostingVirtual server-hosting
Virtual server-hosting
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
Tridium Telecom Profile
Tridium Telecom ProfileTridium Telecom Profile
Tridium Telecom Profile
 
InTechnology InSpire Newsletter - Issue 6
InTechnology InSpire Newsletter - Issue 6InTechnology InSpire Newsletter - Issue 6
InTechnology InSpire Newsletter - Issue 6
 
CommunityWide Case Study_V1
CommunityWide Case Study_V1CommunityWide Case Study_V1
CommunityWide Case Study_V1
 
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefWAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Grupo Banco Popular: Software Deployment Case Study
Grupo Banco Popular:  Software Deployment Case StudyGrupo Banco Popular:  Software Deployment Case Study
Grupo Banco Popular: Software Deployment Case Study
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Bi cloud saa_s
Bi cloud saa_sBi cloud saa_s
Bi cloud saa_s
 
NetScout Northumbrian water case study
NetScout Northumbrian water case studyNetScout Northumbrian water case study
NetScout Northumbrian water case study
 
Sistem wireless canopy
Sistem wireless canopySistem wireless canopy
Sistem wireless canopy
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Challenges faced by small and medium business

  • 1. DUKE GROUP OF INDUSTRIES CASE STUDY “Nevales UTM provides speedy performance. The most important quality of Nevales UTM is its remarkable 'Pay As You Use' service. The Nevales solution is running very well and has changed our perception about UTM solutions”. Mr. Amrut Barde - Vice President MIS Company Stats Client Background · No. of offices and locations: 5 Originally founded in 2001, the Duke Group of Companies have merged (Bangalore, Pune (2), Delhi, to form Duke Group of Industries, a global asset holding company Ahmednagar) focused on operations across various industries including Automotive, Aerospace & Defense, Clean Technologies & Renewable Energy, Electrical · Group Companies : Duke Equipment, Healthcare, Real Estate, Security Services & Equipment, and Corporation, Harig Crankshafts, Transportation. With operations in India, China, Europe and the U.S., the Gera Auto company provides growth capital, strategic guidance and operational · Vertical : Turnkey Projects expertise for their growing portfolio of companies. · User Base : 100+ Duke Group of Industries' principal growth strategy has been to expand their holdings with attractive opportunities that further broaden the URL : www.duke-industries.com global reach in Precision Manufacturing, Clean Energy Solutions, and Services. While most of their recent growth has come from the past The Challenges private equity and corporate advisory activities, to date the company has closed more than 30 transactions around the globe with a specific focus · Vulnerable to external attacks’ on High Growth industries in Emerging Markets, or in Distressed or Turnaround situations in Mature Markets. · Bandwidth misuse · Exposed inter-office connectivity Challenges In order to increase business and stay connected with all offices and The Technical Solution customers, the company needed to have faster systems, manage its cash flows and working capital, track material information and communicate · Robust Nevales firewall to manage on a continuous basis. As a fast growing business, the company could not and protect all communications afford extended system downtime and loss of critical data. between the internet and internal network They were exposed to constant threats due to a weak security system leading to damage to critical assets that were deployed to cater to key- · Nevales VPN for secure site-to-site clients which was ultimately leading to loss of business. Employee connection efficiency and motivation was also affected. · Nevales bandwidth management There was no secure inter-office connectivity. All the 5 office locations along with effective Nevales surf protection to manage and monitor were unable to co-ordinate and streamline their work. This was leading to the use of the internet. ambiguity in tasks, duplication of work, inappropriate use of resources and loss of valuable time.
  • 2. The Results Duke Group of Industries did not have any robust firewall solution and hence they were unable to protect their network from virus attacks and · Stable and secure network did not have uniform management, control and performance monitoring for websites. They suffered heavy broadcasting on internal LAN due to · Easy centralized manageability regular virus attacks from the Internet as there were decentralized IT policies which Nevales helped to make centralized. · Proper bandwidth utilization In addition to accessing social networking sites, employees were also uploading and downloading music and video content, listening to the · Considerable reduction in downtime radio over the Internet, downloading music, and streaming videos over the Internet which resulted to heavy bandwidth utilization and slow · Network redundancy browsing. · Increased system and employee The Effective Solution offered efficiency and productivity After deliberate and extensive discussion with Duke Group of Industries and a detailed study/analysis of the existing system, Nevales suggested and executed the installation of a customized UTM system, fit to cater to Nevales Benefits the objectives outlined by the client and more. · Managed Secured Services After implementation, Nevales Firewall manages all communication traffic between the Internet and internal networks, controlling incoming · Direct Nevales Support and outgoing network traffic based on the corporate security policy, simultaneously blocking unauthorized access. · Pricing: OPEX We have configured the content filtering by creating user groups and · Integrated Load Balancing giving them user access according to their privilege defined by company's IT security policy. · Customizable To provide quality of service to the users and increase network · Scalable redundancy we have implemented Load balancing / Failover between two ISPs. · Best of Breed OEM Partnerships Employees who misuse the bandwidth for illegal downloads and file sharing have been restricted by Nevales gateway level solution. · Free Hardware Replacement Along with Nevales firewall, we offered Unified Threat Management · Tangible ROI (UTM) features as well. One of the main requirements of the client was inter office connectivity. This requirement was fulfilled with the successful implementation of the IPSec/VPN feature. Also now, the solution serves as a central repository of all auditing and repository information. Nevales Networks Pvt. Ltd. Advance House, 2nd Floor, Makwana Road, Off Andheri-Kurla Road, Andheri (East), Mumbai – 400 059, Maharashtra, INDIA. Tel: +91 22 4236 4444 | Fax: +91 22 4236 4409 | Email: info@nevales.com Web: www.nevales.com C o p y r i g h t © 2011 Nevales Networks Pvt. Ltd. All rights reserved. Nevales Networks Pvt. Ltd has the right to change, modify, transfer or otherwise revise the content without notice. The Actual performance may vary depending on the real network traffic environments. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Nevales.