Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Rns ppt

12 views

Published on

RNS PRESENATION

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Rns ppt

  1. 1. RNS Technology Services Secure, Simplify, Manage. Dubai Abu Dhabi Singapore
  2. 2. We are a company of security specialists. We passionately believe that information security is a critical concern in every business. About us
  3. 3. Our Mission, Vision: To Protect individuals, organizations, and society through comprehensive Information Security Management To be the Worldwide Leader and Trusted Advisor in IT Security.
  4. 4. Team Meet our team of quirky and hardworking professionals. Samir Chopra Founder and CEO Sagar Chopra Head of Sales Kumanan D Vice President Technology Shiva XXXXXXXXXXX Amgad El-Maleh General Manager Sales, Abu Dhabi Amol Khangar Service Delivery Manager
  5. 5. Employee Data Leaks Traditional Malware Vulnerability Exploits Advanced Malware Targeted Attacks Evolving Threat Landscape Sophistication Time
  6. 6. Enterprise Cyber Threat Gap Prevention Gap Response Gap Detection Gap 1. 3. 2. 1. Prevention Gap Time to put preventative measures in place to avoid future attacks Can we avoid this from happening again? Have we been breached? 2. Detection Gap Time between actual breach and discovery How bad is it? 3. Response Gap Time between discovery to remediation to limit damage
  7. 7. Customers Need a range of Capabilities Email Security Secure Web Gateway Server Security Mobile Security Advanced Endpoint Protection Encryption Advanced Threat Protection Application Control DLP
  8. 8. Technology Solutions ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION MANAGED SERVICES ENDPOINTPROTECTION NETWORKPR OTECTION DETECT AND RESPONS E DDI SOAR
  9. 9. Sentinel One Autonomous Endpoint Protection TrendMicro - Optimizing Cybersecurity Carbon Black Transforming Endpoint Security Ivanti - Power of Unified IT Zimperium 1st Choice for Mobile Security MCAfee Comprehensive Cyber Security Endpoint Protection ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION NETWORKPR OTECTION DETECT AND RESPONS E Forensics MANAGED SERVICES ENDPOINTPROTECTION DDI SOAR
  10. 10. Tripwire Cyber Security for Enterprise LogRhythm Security Intelligence and Analytics Skybox Security Cybersecurity Analytics in Action ForeScout IBM Security Detect and Response ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION NETWORKPR OTECTION DETECT AND RESPONS E MANAGED SERVICES ENDPOINTPROTECTION DDI SOAR
  11. 11. PaloAlto Empowering Security Operating Platform Checkpoint Advanced Network Threat Prevention Fortinet - Enhancing the security Fabric Barracuda - Complete Email Security FireEye - Leaders in Threat Intelligence vmware - Modern approach to Security Forescout Agentless Visibility and Control Network Protection ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION NETWORKPR OTECTION DETECT AND RESPONS E MANAGED SERVICES ENDPOINTPROTECTION DDI SOAR
  12. 12. Sailpoint Leaders in Identity Governance Centrify - Zero Trust Security Platform Gemalto Secured Digital Identity Revolution Forcepoint - Risk Adaptive Protection Boldon James Leaders in Data Classification Seclore - Datacentric Security in Action Identity and Data Governance ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION MANAGED SERVICES ENDPOINTPROTECTION NETWORKPR OTECTION DETECT AND RESPONS E DDI SOAR
  13. 13. Alienvault Award-Winning Threat Detection Forgerock Intelligent Authentication Gigamon Eseential Element Of Your Security Solarwinds IT Management and Monitoring Managed Services ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION MANAGED SERVICES ENDPOINTPROTECTION NETWORKPR OTECTION DETECT AND RESPONS E DDI SOAR
  14. 14. Technology Partners ISO Consultancy Web Application Testing Resource Outsourcing Staff Augmentation SOC Encryption MDM Patch Management 2FA SSO IAM IRM DLP Data Classification PIM/PAM Network APT NG Firewall Web Wireless NAC DDI Email WAF Proxy LB Threat Intelligence Incident Response Security Analytics Forensics FIM SIEM SOAR DAM App White Listing End Point APT MTP Advanced End point Risk & Compliance PT VA IDENTITY&DATAPROTE CTION MANAGED SERVICES ENDPOINTPROTECTION NETWORKPR OTECTION DETECT AND RESPONS E MANAGED SERVICES ENDPOINTPROTECTION
  15. 15. Customer References - Government
  16. 16. Customer References – BFSI
  17. 17. Customer References - Enterprise
  18. 18. RNS Strength’s Ethics Do the right thing at the right time Excellence Deliver the Highest Quality Can do Attitude Face and Overcome Challenges Trust Provide Transparency and Protection Passion Love what We Do Service Benefit our Customers, our Employees and our Society
  19. 19. Our Awards 1. GEC AWARDS 2. SONIC WALL 4. SONIC WALL 3. Centrify
  20. 20. 2019 Timeline 2015 15 Customers 1 Bank 1 Govt Network Security + End Point Security. Employees Increased by 5% 2016 50 Customers 5 Govt 4 Banks Network Security + End Point Security, Ethical Hacking, SIEM, MDM, DLP. Employees Increased by 9% 2017 2018 120 Customers Top 10 Banks 25 Govt Dept 10 Ministries 220 Customers Network Security + End Point Security, Ethical Hacking, SIEM, MDM, DLP App Security, MTP, Outsourcing. Network Security + End Point Security, Ethical Hacking, SIEM,MDM,DLP App Security, MTP, Outsourcing, IAM, SSO, MS, Threat Hunting. Employees Increased by 14% Employees Increased by 22%
  21. 21. Our Locations Jumeirah Lake Towers, Dubai, United Arab Emirates Sector 39, Mussafah, Abu Dhabi, United Arab Emirates Branch Office #08-03 SGX Centre 2, 4 Shenton Way, Singapore Pune, India Pune
  22. 22. Thank You www.rnstechnology.com

×