SlideShare a Scribd company logo
Next Generation Networks


    Company Profile
    November 2008
NGN Offices




EGS Business Park B1 Blok No.291   2009
Yeşilyurt - Istanbul / TURKEY
Telefon: +90 212 4656663




                                   2009
1st Smolensky lane.,
4/3, office 315 121099
Moscow/ Russia
Telefon: +7 495 241 0288
About Us
   About         Us ...

  NGN was established in 2005. The company originally focused on
providing IT consulting services, application development and the
provisioning of hardware and software products.


  NGN's mission is to provide businesses with a cost effective way to
get access to a wide range of technical specialists skills.


  Our unique technologies enable us to plan, install and manage
solutions in a more effective fashion. With them we build a future for
your business today.
NGN- Turkey& Russia Revenue




                              ≈12 Mio USD
Our Products

 Wintel                    Network
      Servers                  LAN
      PCs                      WAN
      Desktop Computers        Network Security
      Microsoft Products
      Printers
      Other Peripherals
 System and Storage
      Intel Servers
      Unix
      Storage
Our Solutions and Services

                                         Enterprise Risk Management
Enterprise Application Integration
                                              Security Policy
      Business Process Management
    Integration                               Compliancy Management Solutions
      Application-to-Application (A2A)        Corporate Identity Management
    Integration
      Business-to-Business (B2B)         Outsourcing
    Integration
                                              Business Continuity
      Portal Integration
                                              Hosting
      Wireless Integration
                                              Desktop Management
      Web Services
         • Application Development
                                         Collaboration Services
         • Content Management
                                              E-mail / Unified Messaging
                                              Mobile Communication (Value-Added
Microsoft Solutions                            Services)
     .NET Platform                            Workflow Management
     Desktop System Migration                 Document Sharing
     Digital Dashboard
     MS Applications
After Sales Support Services

 Multi vendor services
 Contract-based maintenance services
 5x8, 6x12, 7x24 support options
 Periodical preventive service
 Outsourcing services
 Warranty services
 Call center, training
 Installation, configuration, infrastructure services
 System management, storage, network management services
 Equipment and personnel hiring
Professional Security Services
                                                       Content Security Consulting
Enterprise Application Integration
      Project Execution, Design and                     Web Access (URL Filtering) Security
       Installation (FW, VPN, MPLS VPN,                 e-Mail Content Solutions
       IDS, IPS, IDP, Radius, Tacacs+,
                                                        Anti-Spam Solutions
       etc.)
      Eliminating Network-Based
       Weaknesses                                      Identity and Access Management (KEY)
                                                        Corporate Identity Management Consulting
Microsoft Solutions                                     Business Process Analysis
      Requirement Analysis and Project
                                                        Access Management Consulting
       Management (HIDS, HIPS, Access
                                                        Single Sign-On (SSO & Web-SSO)
       Control, etc.)
                                                         Solutions
      Database Security
                                                        Smart Card Integration
      Application Security
                                                        Biometric Identification and Integration
      Eliminating System Weaknesses
      Security Evaluation                               Retina Scan Solutions
      ISO 27001 / ISO 17799 Information                 Fingerprint Scan Solutions
       Security Control Enterprise Risk
                                                        Token / OTP Solutions
       Analysis
      Weakness Determination Consulting (Penetration
                                                       Managed Security Services
           Testing, Vulnerability Analysis)
      Security Policy                                   Managed IDS/IPS Service
      Enterprise Antivirus Solutions                    Managed FW Service
      Enterprise Anti-Spyware Solutions
      Personal Firewall Solutions
Our Business Partners
Major Certifications
References
Thank you for your time...

More Related Content

What's hot

Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
Khazret Sapenov
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Private Cloud
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Josh Tullo
 

What's hot (20)

Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
T'Lab
T'LabT'Lab
T'Lab
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Cloud ID
Cloud IDCloud ID
Cloud ID
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
2015 - Data Security Solutions @Dienas Bizness Exigen IBM - Business Data Pro...
 
2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future2015 Data Security Solutions @SFK - Working and living in digital work of future
2015 Data Security Solutions @SFK - Working and living in digital work of future
 
Ms webfourm nettskyen okt2010
Ms webfourm   nettskyen okt2010Ms webfourm   nettskyen okt2010
Ms webfourm nettskyen okt2010
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security Playbook
 

Viewers also liked

BVH Het bureau voor succesvolle dienstverleners
BVH Het bureau voor succesvolle dienstverlenersBVH Het bureau voor succesvolle dienstverleners
BVH Het bureau voor succesvolle dienstverleners
Jeroen Kaal
 
Natureza Maravilhosa
Natureza MaravilhosaNatureza Maravilhosa
Natureza Maravilhosa
Anjovison .
 
Энергосберегающая ВЕНТИЛЯЦИЯ
Энергосберегающая ВЕНТИЛЯЦИЯЭнергосберегающая ВЕНТИЛЯЦИЯ
Энергосберегающая ВЕНТИЛЯЦИЯ
КОМПАСС Украина
 
Calendario niveaplaza
Calendario niveaplazaCalendario niveaplaza
Calendario niveaplaza
Roberto Sena
 
Podcasting
PodcastingPodcasting
Podcasting
brywoods
 
VLG Design Friendly, The Texas Way
VLG Design Friendly, The Texas WayVLG Design Friendly, The Texas Way
VLG Design Friendly, The Texas Way
sschroeder
 

Viewers also liked (18)

Moje poczatki-w-programie-partnerskim darmowy ebook pdf
Moje poczatki-w-programie-partnerskim darmowy ebook pdfMoje poczatki-w-programie-partnerskim darmowy ebook pdf
Moje poczatki-w-programie-partnerskim darmowy ebook pdf
 
BVH Het bureau voor succesvolle dienstverleners
BVH Het bureau voor succesvolle dienstverlenersBVH Het bureau voor succesvolle dienstverleners
BVH Het bureau voor succesvolle dienstverleners
 
Mattakuria
MattakuriaMattakuria
Mattakuria
 
Natureza Maravilhosa
Natureza MaravilhosaNatureza Maravilhosa
Natureza Maravilhosa
 
Энергосберегающая ВЕНТИЛЯЦИЯ
Энергосберегающая ВЕНТИЛЯЦИЯЭнергосберегающая ВЕНТИЛЯЦИЯ
Энергосберегающая ВЕНТИЛЯЦИЯ
 
Time of the day, may 5,13
Time of the day, may 5,13Time of the day, may 5,13
Time of the day, may 5,13
 
Calendario niveaplaza
Calendario niveaplazaCalendario niveaplaza
Calendario niveaplaza
 
Lesson 1 intro to mo
Lesson 1   intro to moLesson 1   intro to mo
Lesson 1 intro to mo
 
November 12 : (Education)
November 12 : (Education)November 12 : (Education)
November 12 : (Education)
 
June 2009 Veterans Affairs Program Management Accountability System
June 2009 Veterans Affairs Program Management Accountability SystemJune 2009 Veterans Affairs Program Management Accountability System
June 2009 Veterans Affairs Program Management Accountability System
 
Media practical production EVALUATION Cousin Kate
Media practical production EVALUATION Cousin KateMedia practical production EVALUATION Cousin Kate
Media practical production EVALUATION Cousin Kate
 
February 5 (child rights)
February 5 (child rights)February 5 (child rights)
February 5 (child rights)
 
Opikusonavara opatajatele keskaeg
Opikusonavara  opatajatele keskaegOpikusonavara  opatajatele keskaeg
Opikusonavara opatajatele keskaeg
 
Digipack drafts
Digipack draftsDigipack drafts
Digipack drafts
 
Creating Email Campaigns that Work: A Focus on Design Elements
Creating Email Campaigns that Work: A Focus on Design ElementsCreating Email Campaigns that Work: A Focus on Design Elements
Creating Email Campaigns that Work: A Focus on Design Elements
 
Podcasting
PodcastingPodcasting
Podcasting
 
7538-14320-2-PB
7538-14320-2-PB7538-14320-2-PB
7538-14320-2-PB
 
VLG Design Friendly, The Texas Way
VLG Design Friendly, The Texas WayVLG Design Friendly, The Texas Way
VLG Design Friendly, The Texas Way
 

Similar to NGN Company Profile November08

Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
Experis IT Brochure
Experis IT BrochureExperis IT Brochure
Experis IT Brochure
kkathrynlee
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
Rakesh Kumar
 
Open Sky Intro
Open Sky IntroOpen Sky Intro
Open Sky Intro
speloso
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus Infotech
Lyf Ffi
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
trickey270
 

Similar to NGN Company Profile November08 (20)

Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
 
KNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILEKNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILE
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Microsoft-365-Overview.pdf
Microsoft-365-Overview.pdfMicrosoft-365-Overview.pdf
Microsoft-365-Overview.pdf
 
Experis it overview-brochure
Experis it overview-brochureExperis it overview-brochure
Experis it overview-brochure
 
Experis IT Brochure
Experis IT BrochureExperis IT Brochure
Experis IT Brochure
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009
 
FFI PPT
FFI PPT FFI PPT
FFI PPT
 
Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)Veeras_Infotek_Corporate (2)
Veeras_Infotek_Corporate (2)
 
Open Sky Intro
Open Sky IntroOpen Sky Intro
Open Sky Intro
 
IDBI Intech Limited
IDBI Intech LimitedIDBI Intech Limited
IDBI Intech Limited
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Future Focus Infotech
Future Focus InfotechFuture Focus Infotech
Future Focus Infotech
 
Micro Strategies Overview
Micro Strategies OverviewMicro Strategies Overview
Micro Strategies Overview
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
IBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomesIBM Software Day 2013. Turning opportunities into outcomes
IBM Software Day 2013. Turning opportunities into outcomes
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

NGN Company Profile November08

  • 1. Next Generation Networks Company Profile November 2008
  • 2. NGN Offices EGS Business Park B1 Blok No.291 2009 Yeşilyurt - Istanbul / TURKEY Telefon: +90 212 4656663 2009 1st Smolensky lane., 4/3, office 315 121099 Moscow/ Russia Telefon: +7 495 241 0288
  • 3. About Us About Us ... NGN was established in 2005. The company originally focused on providing IT consulting services, application development and the provisioning of hardware and software products. NGN's mission is to provide businesses with a cost effective way to get access to a wide range of technical specialists skills. Our unique technologies enable us to plan, install and manage solutions in a more effective fashion. With them we build a future for your business today.
  • 4. NGN- Turkey& Russia Revenue ≈12 Mio USD
  • 5. Our Products Wintel Network Servers LAN PCs WAN Desktop Computers Network Security Microsoft Products Printers Other Peripherals System and Storage Intel Servers Unix Storage
  • 6. Our Solutions and Services Enterprise Risk Management Enterprise Application Integration Security Policy Business Process Management Integration Compliancy Management Solutions Application-to-Application (A2A) Corporate Identity Management Integration Business-to-Business (B2B) Outsourcing Integration Business Continuity Portal Integration Hosting Wireless Integration Desktop Management Web Services • Application Development Collaboration Services • Content Management E-mail / Unified Messaging Mobile Communication (Value-Added Microsoft Solutions Services) .NET Platform Workflow Management Desktop System Migration Document Sharing Digital Dashboard MS Applications
  • 7. After Sales Support Services Multi vendor services Contract-based maintenance services 5x8, 6x12, 7x24 support options Periodical preventive service Outsourcing services Warranty services Call center, training Installation, configuration, infrastructure services System management, storage, network management services Equipment and personnel hiring
  • 8. Professional Security Services Content Security Consulting Enterprise Application Integration Project Execution, Design and Web Access (URL Filtering) Security Installation (FW, VPN, MPLS VPN, e-Mail Content Solutions IDS, IPS, IDP, Radius, Tacacs+, Anti-Spam Solutions etc.) Eliminating Network-Based Weaknesses Identity and Access Management (KEY) Corporate Identity Management Consulting Microsoft Solutions Business Process Analysis Requirement Analysis and Project Access Management Consulting Management (HIDS, HIPS, Access Single Sign-On (SSO & Web-SSO) Control, etc.) Solutions Database Security Smart Card Integration Application Security Biometric Identification and Integration Eliminating System Weaknesses Security Evaluation Retina Scan Solutions ISO 27001 / ISO 17799 Information Fingerprint Scan Solutions Security Control Enterprise Risk Token / OTP Solutions Analysis Weakness Determination Consulting (Penetration Managed Security Services Testing, Vulnerability Analysis) Security Policy Managed IDS/IPS Service Enterprise Antivirus Solutions Managed FW Service Enterprise Anti-Spyware Solutions Personal Firewall Solutions
  • 12. Thank you for your time...