3. 25+ Employees
~ formed by a group of young well experienced technical engineers.
~ managed by well known management gurus with proven track records.
Strength
~ backed by business legends.
~ supported by market leading product vendors.
~ 200+ man years of experience
…So we are here… to make the real difference…
4. • 150 % increase in clients
• 125 % increase in revenue
• 70 % increase in profit
• 50 % increase in locations
• 40 % increase in manpower
growth
6. Solutions
Retail
Schools
Inventory Management Systems RFID Asset ManagementHealthcare
RFID Patient Tracking
RFID Security System for Guard Tours
Industrial Parking Management System
Construction
Vizbee produces comprehensive
RFID solutions and RTLS systems
for locating and tracking assets
and people, allowing rapid and
riskless deployment of projects in
various vertical markets.
Schoolchildren protection
Logistics
Security
RFID
7. Solutions
Retail
V-SHOP, Solutions for chain stores
.Inventory in a matter of minutes·
•Accurate location of products
•Controlling the content of closed cartons
•Boost sales
•Detection of misplaced items
•Audio assisted product searching
RFID
8. Solutions
Schools
V-SCHOOL School-children’s protection
* allows to track the children, their safety,
and the children on the school buses.
* perfect vector to communicate and ensure
the follow-up of the children's education
* online portal to communicate messages,
meetings, exams, notifications
RFID
10. Solutions
Logistics
RFID based warehouse management &
Logistics
Managing the warehouse’s stock in real-
time
Using intelligent handheld RFID readers
RFID
Did you ever find the Time & Cost for stock taking huge ?
12. Solutions
~ Over 80% of successful exploitation happens from the
inside, behind the firewall - SANS.ORG
~According to US-CERT (United States Computer Emergency
Readiness Team), 95% of downtime and IT related compliance
issues are a direct result of an exploit against a Common
Vulnerability and Exposure.
~ A firewall, IDS, IPS, anti-virus software and other counter
measures don’t look for or show how to remove CVEs. So
most companies are really only 5% secure
Network Access
Control
13. Solutions Network Access
Control
And you thought a
firewall was all
you needed?
Also you need BYOD
in Your Business
Remember, while firewalls protect networks from the outside-in,
over 80% of successful attacks come from the inside.
14. Solutions Network Access
Control
Inside-Out Network Security™ Appliances
Immediately control access by any and all types of devices – if you don’t want
them on the network, they don’t get on the network.
Identify network holes (CVE®s) on the
inside of your network and guide proactive
remediation process
Defend against malware through
automated detection and blocking
15. Solutions
Network Access
Control
The BYOD NACwall Appliance Awards
“NetClarity Picks Up Where Firewalls, Anti-
virus, Intrusion Detection Systems and
Intrusion Prevention Systems Leave Off”
John Gallant, President, Network World
“The Most Innovative NAC
Vendor in the World”
network Products Guide, Hot
Companies, 2009, 2010, 2011
16. Solutions Wi-Fi
Better Wi-Fi for All Enterprises
Simply Better Connections
Delivering the most consistent and
highest speed wireless performance
possible – anywhere, everywhere, all
the time
17. Industry’s Broadest Wi-Fi Portfolio
Entry level
802.11n
High-capacity
802.11n
Mid-range
dual band
MIDRANGEHIGH END
Enterprise
dual-band
LOW END
Entry-level
802.11g
Wi-Fi
wall switch
6 to 50 APs
SMB
50 to 500 APs
Mid-range
50 to 1000 APs
High end
Up to 10K APs
Carrier edge platform
Dual-band
802.11n
Strand mount
802.11n
Dual-band
sectorized
Dual-band
AC powered
Small cell + Wi-Fi Point to point and
multipoint bridges
INDOOR
MANAGEMENT
OUTDOOR
18. Solutions Wi-Fi
What’s the Big Difference?
THEM US
Fixed 1:1 relationship
between Wi-Fi radios
and antennas
Dynamic 1:many
relationship
between Wi-Fi
radios and antennas
Patented BeamFlex
Adaptive Antenna
Technology
19. Solutions Wi-Fi
Better transmission to devices
constantly changing their
orientation
Device orientation accounts
for up to 5x performance
differential among products
20. Solutions Wi-Fi
Critically Acclaimed Everywhere
2012 best breakthrough technology vendor
2011 fastest growing of top 5 WLAN vendors
2011 best performing wireless system
2011 top Wi-Fi channel company
2011 best mobile broadband technology
21. Solutions
Remote
Support
One Solution for Every Remote Support Need
secure remote support solutions that
enable technology support professionals to
access and fix any device, anywhere.
support a variety of mobile devices
- including Android, iPhone, iPad,
BlackBerry and Windows Mobile.
replace legacy remote access tools with a
complete solution designed for the needs of
security-conscious support organizations.
Appliance-based remote support
software is more secure than
software-as-a-service or point-to-
point remote control tools
22. Solutions
Remote
Support
Access remote desktops, laptops, POS
systems, kiosks and servers, even if
no one is present to give you control.
Reboot the remote desktop without
losing your connection to the support
session. Reboot into safe mode with
networking and request automatic
logon credentials at reboot.
Limit screen sharing and remote control
to specific applications. Allow reps to
control which applications they share in
presentations, and let customers control
which applications you see.
Chat with customers through a secure,
customizable chat window during both
support and training sessions
Dashboard lets you oversee
support teams, transfer or take
over support sessions and monitor
reps' remote desktops
23. Bomgar the Box That’s Revolutionizing Remote
Support …
Solutions
Remote
Support
Reboot Application Sharing
Command Shell
File Transfer
Screen-Sharing
System Information
Collaborative Browser Sharing
Session Recording
24. Solutions
Change
Management
Ever failed to meet the objectives of a project
implementation ?
A great solution
+ Change Management
Looking for a way to track changes on your network ?
Lost control over the number of assets and configurations ?
= Project success+ Effective project management
A Myth about
Project success…..
CHANGE MANAGEMENT SYTEM
25. Solutions
fully integrated Service Management
platform that caters for all ITIL processes
all of your change and incident management
directly references the underlying assets
No Help Desk should be without an integrated CMDB
supports a wide variety of
customizable Configuration Items
(CIs), to enable you to map your
infrastructure at physical and logical
levels.
The CI relationships can be viewed
from multiple angles giving you the
immediate ability to see dependencies
between items and the impact of an
outage.
Improve your IT quality of service through the effective
and efficient management of your infrastructure.
Change
Management
26. Identify problematic infrastructure
components
Identify the impact of change and loss of
service to your business
Avoid unnecessary purchase of
infrastructure
Manage the movement and assignment of
I.T. assets
Identify and avoid conflicting changes
Identify unauthorized changes to your
infrastructure
Centralize operational documentation
Track what infrastructure your projects are
dependent on
Reduce dependency on staff undocumented knowledge
Improve the efficiency and effectiveness of your
Service Desk
Conduct forward-planning of change, warranty expiry
and other date driven events
Monitor the cost of incidents and downtime to your
business, and performance against SLAs
Track software licensing
Maintain an audit trail of all infrastructure changes
Improve your Change Request review and approval
process to increase your implementation success ratio
Meet the compliance requirements of ISO 20000
Align yourself with industry and ITIL best practices
Change
Management
Solutions
How you
benefit…
27. Email Phishing Protection and Management Filter
Spam Detection
Enterprise Email Virus Protection
Dynamic Email Reputation Services with Global Visibility
Zero-Hour Threat Detection
Email Firewall
Email Quarantine Folders by Threat
Smart Search: Real-Time Message Tracing
Enterprise Protection for Microsoft Office 365
Big Data Platform
Cloud OR Appliance Infrastructure
Virtual Appliance Deployment Options
Solutions
Email
Security
Protect and Govern Your Most Sensitive Data with Powerful
Email Solutions
28. Solutions
Email
Security
Gartner, Inc. positions Proofpoint
in the Leaders Quadrant in its2012
Magic Quadrant for Secure Email
Gateways
Proofpoint has the strongest DLP
capabilities – The Forrester Wave:
Email Content Security, Q4 2012
Proofpoint has been awarded
the 2012 Product
Differentiation Excellence
Award for Email Content
Security by Frost & Sullivan.
29. Solutions
IPAM
Global IP Address Management solution
Global visibility
Global IPAM Policies: Enforce your RulesAutomate your naming conventions
Global IPAM Management
Manage DNS-DHCP services at the architecture level
Automate IPAM-DNS-DHCP administration tasks
Multi-Vendor DNS-DHCP services Management
Mass reconfiguration
Simplify your migration processes
Global IPAM Control to Improve Your SLA
Discover unauthorized devices on the network
Reclaim unused IP addresses
Reclaim unused ports
Built-in Work Flow
30. Solutions
IPAM
Built-in zero administration database:
No Data Corruption, Errors, or Loss.
Hardened Operating System.
Built-In Data Replication Mechanisms for
Backup, Restore and Disaster Recovery
Plan
100% Web Based GUI
Unified and Automated IPAM-DNS-
DHCP Management
Global High Availability for Absolute
Service Continuity and Management
31. Solutions
MDM
Mobile Device Control for the Way You Work
Mobile Security
Mobile Device Management
Mobile Application Management
Mobile Content Management
Mobile Email Management
•Bring Your Own Device (BYOD)
32. Solutions MDM
Secure Your Mobile Deployment from End-to-End
User Security: manage user access to corporate resources
Device Security: enables administrators to prevent device enrollment
Application Security: corporate data stored in applications are secure.
Manage a Diverse Fleet of Devices in Your Enterprise
33. Solutions MDM
The largest enterprise mobility
Management Provider in the World
Recognized as a leader in the 2013 Gartner Magic
Quadrant Report For the 3rd consecutive Year
7000+ Customers 150+ countries 18 Languages
Simplify Enterprise Mobility
34. Solutions Back up
Redefining Backup Solutions
• Maximized Data efficiency and protection
• Mix SATA, SAS, and SSD drives in the same chassis to customize
performance and capacity
• JBOD and RAID levels 0, 1, 5, 6, 10 are supported with multiple
automatic global spares
• Disk failures with a RAID LUN are automatically repaired using
an available spare disk within the chassis
35. Solutions Back up
Redefining Backup Architecture
connects servers and storage directly
across Layer 2 Ethernet for
maximum scalability and
performance
Ethernet Storage: The future
of storage area networking
CorOS™: A distributed storage
operating system with a shared
global namespace.
Policy-based automation
36. Solutions Back up
Visionary vendor in Gartner’s 2013 Magic Quadrant
Awards & Recognition
In 45+ countries1700+ Customers
37. Solutions IT Security
Rethink IT Security
Do you have an automated system to manage guests on your network?
Do you have a mobile security strategy?
You’ve secured your endpoint systems, right? But are there gaps?
You’ve secured your network perimeter, right? But how about the inside?
Are your regulatory compliance and inventory reports automated?
There is good news...
38. Solutions IT Security
The security you need. The automation you want
Automated Security Control
Solutions from:
.One box, one day to install.. works with what you have.
. No software.
. Non-disruptive.
. 3rd-generation.
40. Solutions IT Security
Managed Security Services
Security Scanning Services
Outsourced IT & Consulting
Penetration Testing Service
Network Forensics
Social Engineering
Phishing Techniques
41. Solutions IT Security
Port Scanning
System Fingerprinting
Service Probing
Vulnerability testing and verification
OS Configuration Verification
Application Layer Testing
Firewall and ACL Testing
Administrator and Root Privilege Testing
Password Aging and Strength
Network Security Control Testing
Database Security Flaw Testing
Third-Party/Vendor Security Configuration Testing
Hardened Server/Device Configuration Testing
Vulnerability Exploitation
Under the license and guidance from.
42. Solutions IT Security
Unified Threat Management (UTM)
From:
Consolidated Network Security Platform
Unmatched Performance
Broad Range of Technologies
Visibility and Control of Applications
the fastest firewall technology on the market.
Firewall Security Solutions
43. Solutions IT Security
• Database Security
• Intrusion Prevention System
• IPv6 Security Solution
• Distributed Enterprise Solutions
• Firewall Security Solutions
• Endpoint Protection
• DDoS Defense Technology
• Next Generation Firewalls (NGFW)
• Virtual Private Network (VPN)
• Virtual Security
• Vulnerability and Compliance Management
• WAN Optimization
• Web Filtering
• Web Application Security
• Secure WLAN
• Unified Threat Management (UTM)
• Anti-Spam Security Solutions
• Antivirus/Anti-Spyware
• Application Control
• BYOD Solutions
• Data Center
• Cloud Management
• Data Loss Prevention (DLP)
46. BEKA TECHNOLOGY
We Sincerely
Thank you
PresentationOur Interactive
For Watching
BEKA TECHNOLOGY
P O BOX 126603
ABU DHABI
UNITED ARAB EMIRATES
PH: +971 2 44 1111 4
Fax:+971 2 44 11 55 0
info@bekatechnology.com
www.bekatechnology.com