SlideShare a Scribd company logo
YOUR BRIDGE TO NEWEST TECHNOLOGY
1
Micro Data Technology for Information
systems
Company Profile
TABLE OF CONTENTS
Part 1 Know MDTIS Page # 3
Part 2 Partners Page # 5
Part 3 Customers Page # 7
Part 4 Team Page # 9
Part 5 Solutions Page # 11
Part 6 Contacts Page # 17
2
KNOW MDTIS
3
PART 1
ABOUTMDTIS
Micro Data Technology for Information Systems has been in
technology and consultation business as a system integrator since
2001, operating in Egypt. Providing our clients with service in
highest level of quality and agility.
Our driver is “If you are not responding to changes quick enough,
you would become irrelevant”. At MDTIS, we recognize the speed
of business change and the necessity to respond to it.
We are convinced that innovation is the key to be business
excellence. We are highly regarded as a creative problem-solver
‘thinking out-of-the-box‘.
We have a strong company spirit and highly qualified staff focuses
on the specific features, benefits or functionality of Security,
Communication, Hardware, Software, Network and Consulting
Services combined with creating a complete portfolio.
4
PARTNERS
5
PART 2
PARTNERS
Service StrategyPartners
6Micro Data Technology
MDTIS has established a range of partnerships designed to fulfill the demand and to meet business needs of
our customer base
CUSTOMERS
7
PART 3
OURCUSTOMERS
Service StrategyOur Customers
8Micro Data Technology
MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of
industries, including ... -
OURCUSTOMERS
Service StrategyOur Customers
9Micro Data Technology
MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of
industries, including ... -
OURCUSTOMERS
Service StrategyOur Customers
10Micro Data Technology
MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of
industries, including ... -
PART 4
TEAM
11
TEAMQUALIFICATIONS
Service StrategyTeam Qualifications
12Micro Data Technology
SOLUTIONS
13
PART 5
SOLUTIONSSUMMARY
Service Strategy
 Data Security Solution:
 Anti-malware, Antivirus and Anti-spam
 Web filtering,
 Firewall, Intrusion Detection System and Intrusion Prevention System,
 Electronic Security Solution:
 CCTV (Camera System),
 Electronic access Door,
 Fire fighting solution.
 Unified Communication:
 Network Infrastructure (Wire and Wireless),
 Call manager & PBX,
 Video Conference.
 Data Centre and Operation:
 UPSs and related power infrastructure,
 Racks, servers, Blades , Storages, PCs, Printers and Scanners,
 Platforms and Virtualization,
 Fire fighting , detectors, Access door and CCTV.
 Disaster Recovery Solution:
 Back-up,
 Clustering,
 High Availability for physical & virtual environment,
 Business continuity solutions.
Summary
14
Brief for what we offer:
SOLUTIONS-DATASECURITYSOLUTION
Service Strategy
1. Information Security Solution:
Solutions (1 of 5)
15
Security Services Scope ‘Design, license, selling, implement and configure‘
 Network security solutions (Firewall, IPS and IDS),
 Internet “security, filtering and control” solution,
 Malicious preventive solutions (antivirus, anti-spam, etc…).
Other Security services
 Risk Assessment, Gap Analysis & Policy Development,
 Vulnerability assessment and Penetration Testing (Web Application & Infrastructure),
 Security Assessment (Network, System, Wireless, VoIP & Web applications),
 Information Security Awareness and Training.
Today, business require privacy of electronic data.
And because privacy is a very serious matter, MDTIS
integrates software and hardware components to
deliver all aspects of services. Security products
have been designed to easily configure for
information security and easily offering various
solutions and products that help control the flow of
traffic and maintain information Confidentiality and
Integrity.
SOLUTIONS-ELECTRONICSECURITYSOLUTION
Service Strategy
2. Electronic Security Solution:
Solutions (2 of 5)
16
Benefits
 Simplify management of your surveillance systems,
 Improve building security,
 Less impact on your organization’s IP network,
 Prevention of unauthorized and unmanaged access to buildings and assets,
 Simplify management of who is in your buildings and where they are,
 Help HR to monitor who is working in the building.
MDTIS offers a wide range of monitoring and alarm
solutions, starting with fire Fighting , passing by
surveillance system and ending with access control .
MDTIS provides electronic security that meet the
needs of different sectors and industries.
SOLUTIONS-UNIFIEDCOMMUNICATION
Service Strategy
3. Unified Communication:
Solutions (3 of 5)
17
Benefits from our Infrastructure, IP Telephone and Video Conference solutions
 Facilitates communication,
 Reduces time for data transfers,
 Improve internal communication & teamwork,
 Systems access 24*7 from anywhere,
 Reduce travel time,
 Reduce transportation and accommodation expenses
 Increase efficiency & productivity,
 Enable faster and better decisions.
MDTIS provides reliable networking solutions that
enable optimized communications.
IP Communication solutions leverage a single
network infrastructure to enhance organizational
and employee productivity, improve customer
service deliver significant ROI, and maintain
company’s distinctive advantages. Those solutions
include Infrastructure, IP telephony and IP-enabled
video.
SOLUTIONS-DATACENTER
Service Strategy
4. Data Centre:
Solutions (4 of 5)
18
MDTIS’s Data Centre Solutions include Plan, build, acquire, implement and configure Data Centre
components:
 Select Data Centre location based on good practices,
 UPSs and related power infrastructure,
 Racks, servers, Blades and Storages,
 Platforms and Virtualization,
 Fire fighting and detectors,
 Access door and CCTV.
As we are partner for RAYA Data Centre we provide the below services:
 Manage hosting (Dedicated or Shared hosting),
 Co-Location (Managed Co-locations, Secure Cadge service, Internet/MPLS/VPN) ,
 Out sourcing (User, Server and Network support).
MDTIS offers full Data Center solutions (Turnkey
Solutions) to provide customers with central
managed, utilized and best return of investment IT
infrastructure. We offer data Centre consolidation in
all terms of servers, storage, network, security, low
current infrastructure, and software and site
preparation.
SOLUTIONS-DISASTERRECOVERYSOLUTION
Service Strategy
5. Disaster Recovery Solution:
Solutions (5 of 5)
19
MDTIS’s Disaster recovery Solutions include
 Back-up,
 Clustering,
 High Availability for physical & virtual environment,
 Business continuity solutions.
Benefits
 Guarantee your system availability,
 Ensure your systems are up and running according to identified RTO & RPO,
 Safeguard your system valuable data from loss or failure,
 Ensure your company’s information is secure.
Today’s challenges in any business is how to secure
customers data and IT investment, and how fast you
can return back to business after any kind of failure
or disaster, therefore MDTIS offers a full Disaster
Recovery Solutions in terms of consultant, install
and operate. This guides us to meet the customer
decided Recovery Time Objective (RTO) and
Recovery Point Objective (RPO).
PART 6
CONTACT
20
CONTACTUS
Service StrategyContact US
21
Address : 5 Zaker Hussein St., Nasr City – Cairo - Egypt
Tel: +202 22 732 016
+202 22 722 147
+202 22 722 146
+20122 770 17 32
Fax: +202 22 731 042
E- mails: infor@microdata-tec.com
technical@microdata-tec.com
sales@microdata-tec.com
Web site: www.microdata-tec.com
22
Thanks

More Related Content

What's hot

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
Ideba
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Miriam L
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
Anna Landolfi
 
Bigradap Digital Profile
Bigradap Digital ProfileBigradap Digital Profile
Bigradap Digital Profile
Bigradap Group Technologies (Pty)Ltd
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009
Jason Edelstein
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
finance40
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
Canon Business CEE
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
SafeNet
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
Trend Micro
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Josh Tullo
 
Hyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers PresentationHyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers Presentation
Sara Thomason
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
Sara Thomason
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
Graham Mann
 
Ims at mindtree key concepts and paradigms
Ims at mindtree   key concepts and paradigmsIms at mindtree   key concepts and paradigms
Ims at mindtree key concepts and paradigms
Koushik Ramani
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
Ronan Martin
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
Open Access Systems Corporation
 

What's hot (20)

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Bigradap Digital Profile
Bigradap Digital ProfileBigradap Digital Profile
Bigradap Digital Profile
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
 
Hyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers PresentationHyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers Presentation
 
Combatting Insider Threats Presentation
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
Ims at mindtree key concepts and paradigms
Ims at mindtree   key concepts and paradigmsIms at mindtree   key concepts and paradigms
Ims at mindtree key concepts and paradigms
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 

Viewers also liked

Jugando en familia powe
Jugando en familia poweJugando en familia powe
Jugando en familia powe
miriam urrutia
 
Ropa
RopaRopa
Ropa 2
Ropa 2Ropa 2
Ropa 2
ropatattos
 
zenius id card printer - evolisindia
zenius id card printer - evolisindiazenius id card printer - evolisindia
zenius id card printer - evolisindia
Evolis India
 
AW Profile
AW ProfileAW Profile
AW Profile
Nervan Harwani
 
Que definan la teoría de sistemas
Que definan la teoría de sistemasQue definan la teoría de sistemas
Que definan la teoría de sistemas
daniel cisneros
 
GRAND-Telekom
GRAND-Telekom GRAND-Telekom
GRAND-Telekom
Alex Smirnov
 
Presentación moodle modelo-4p
Presentación moodle modelo-4pPresentación moodle modelo-4p
Presentación moodle modelo-4p
Fernando Martinez Rodriguez
 

Viewers also liked (10)

Jugando en familia powe
Jugando en familia poweJugando en familia powe
Jugando en familia powe
 
Ropa
RopaRopa
Ropa
 
trancript
trancripttrancript
trancript
 
Ropa 2
Ropa 2Ropa 2
Ropa 2
 
COMPER-Informacja
COMPER-InformacjaCOMPER-Informacja
COMPER-Informacja
 
zenius id card printer - evolisindia
zenius id card printer - evolisindiazenius id card printer - evolisindia
zenius id card printer - evolisindia
 
AW Profile
AW ProfileAW Profile
AW Profile
 
Que definan la teoría de sistemas
Que definan la teoría de sistemasQue definan la teoría de sistemas
Que definan la teoría de sistemas
 
GRAND-Telekom
GRAND-Telekom GRAND-Telekom
GRAND-Telekom
 
Presentación moodle modelo-4p
Presentación moodle modelo-4pPresentación moodle modelo-4p
Presentación moodle modelo-4p
 

Similar to Company Profile 2016_1

Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
hendrik441443
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
sabrodiesel2000
 
NINE9
NINE9NINE9
Solutions Middle East Company Profile
Solutions Middle East   Company ProfileSolutions Middle East   Company Profile
Solutions Middle East Company Profile
fazal_000
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
Tech IT Cloud
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
Olufolahan Sogbesan
 
Mega_Speed_Profile1
Mega_Speed_Profile1Mega_Speed_Profile1
Mega_Speed_Profile1
fahad vaniyadathil
 
JUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILEJUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILE
Ashish Tyagi
 
Atlantic Digital - Corporate Overview
Atlantic Digital - Corporate OverviewAtlantic Digital - Corporate Overview
Atlantic Digital - Corporate Overview
Marc Shen
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
Zaza Metaplishvili
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
ssuser41d278
 
Online
OnlineOnline
Online
Kelvin Lim
 
Mark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum VitaeMark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum Vitae
MarkSudan1
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
jaymieann
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
LolaHel
 
Special Engineering Services Company Profile
Special Engineering Services Company ProfileSpecial Engineering Services Company Profile
Special Engineering Services Company Profile
Khalid Aljashmi
 
Omzig
OmzigOmzig
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
Tina Dominguez
 
Mti holding pres
Mti holding presMti holding pres
Mti holding pres
MohamedAbdullah_MD
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra english
SENTRA A.S.
 

Similar to Company Profile 2016_1 (20)

Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
 
NINE9
NINE9NINE9
NINE9
 
Solutions Middle East Company Profile
Solutions Middle East   Company ProfileSolutions Middle East   Company Profile
Solutions Middle East Company Profile
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
Mega_Speed_Profile1
Mega_Speed_Profile1Mega_Speed_Profile1
Mega_Speed_Profile1
 
JUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILEJUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILE
 
Atlantic Digital - Corporate Overview
Atlantic Digital - Corporate OverviewAtlantic Digital - Corporate Overview
Atlantic Digital - Corporate Overview
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
 
Online
OnlineOnline
Online
 
Mark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum VitaeMark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum Vitae
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Special Engineering Services Company Profile
Special Engineering Services Company ProfileSpecial Engineering Services Company Profile
Special Engineering Services Company Profile
 
Omzig
OmzigOmzig
Omzig
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
Mti holding pres
Mti holding presMti holding pres
Mti holding pres
 
Company profile sentra english
Company profile sentra englishCompany profile sentra english
Company profile sentra english
 

Company Profile 2016_1

  • 1. YOUR BRIDGE TO NEWEST TECHNOLOGY 1 Micro Data Technology for Information systems Company Profile
  • 2. TABLE OF CONTENTS Part 1 Know MDTIS Page # 3 Part 2 Partners Page # 5 Part 3 Customers Page # 7 Part 4 Team Page # 9 Part 5 Solutions Page # 11 Part 6 Contacts Page # 17 2
  • 4. ABOUTMDTIS Micro Data Technology for Information Systems has been in technology and consultation business as a system integrator since 2001, operating in Egypt. Providing our clients with service in highest level of quality and agility. Our driver is “If you are not responding to changes quick enough, you would become irrelevant”. At MDTIS, we recognize the speed of business change and the necessity to respond to it. We are convinced that innovation is the key to be business excellence. We are highly regarded as a creative problem-solver ‘thinking out-of-the-box‘. We have a strong company spirit and highly qualified staff focuses on the specific features, benefits or functionality of Security, Communication, Hardware, Software, Network and Consulting Services combined with creating a complete portfolio. 4
  • 6. PARTNERS Service StrategyPartners 6Micro Data Technology MDTIS has established a range of partnerships designed to fulfill the demand and to meet business needs of our customer base
  • 8. OURCUSTOMERS Service StrategyOur Customers 8Micro Data Technology MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of industries, including ... -
  • 9. OURCUSTOMERS Service StrategyOur Customers 9Micro Data Technology MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of industries, including ... -
  • 10. OURCUSTOMERS Service StrategyOur Customers 10Micro Data Technology MDTIS is honored to be serving the most distinguished corporations in Egypt, working across a wide range of industries, including ... -
  • 14. SOLUTIONSSUMMARY Service Strategy  Data Security Solution:  Anti-malware, Antivirus and Anti-spam  Web filtering,  Firewall, Intrusion Detection System and Intrusion Prevention System,  Electronic Security Solution:  CCTV (Camera System),  Electronic access Door,  Fire fighting solution.  Unified Communication:  Network Infrastructure (Wire and Wireless),  Call manager & PBX,  Video Conference.  Data Centre and Operation:  UPSs and related power infrastructure,  Racks, servers, Blades , Storages, PCs, Printers and Scanners,  Platforms and Virtualization,  Fire fighting , detectors, Access door and CCTV.  Disaster Recovery Solution:  Back-up,  Clustering,  High Availability for physical & virtual environment,  Business continuity solutions. Summary 14 Brief for what we offer:
  • 15. SOLUTIONS-DATASECURITYSOLUTION Service Strategy 1. Information Security Solution: Solutions (1 of 5) 15 Security Services Scope ‘Design, license, selling, implement and configure‘  Network security solutions (Firewall, IPS and IDS),  Internet “security, filtering and control” solution,  Malicious preventive solutions (antivirus, anti-spam, etc…). Other Security services  Risk Assessment, Gap Analysis & Policy Development,  Vulnerability assessment and Penetration Testing (Web Application & Infrastructure),  Security Assessment (Network, System, Wireless, VoIP & Web applications),  Information Security Awareness and Training. Today, business require privacy of electronic data. And because privacy is a very serious matter, MDTIS integrates software and hardware components to deliver all aspects of services. Security products have been designed to easily configure for information security and easily offering various solutions and products that help control the flow of traffic and maintain information Confidentiality and Integrity.
  • 16. SOLUTIONS-ELECTRONICSECURITYSOLUTION Service Strategy 2. Electronic Security Solution: Solutions (2 of 5) 16 Benefits  Simplify management of your surveillance systems,  Improve building security,  Less impact on your organization’s IP network,  Prevention of unauthorized and unmanaged access to buildings and assets,  Simplify management of who is in your buildings and where they are,  Help HR to monitor who is working in the building. MDTIS offers a wide range of monitoring and alarm solutions, starting with fire Fighting , passing by surveillance system and ending with access control . MDTIS provides electronic security that meet the needs of different sectors and industries.
  • 17. SOLUTIONS-UNIFIEDCOMMUNICATION Service Strategy 3. Unified Communication: Solutions (3 of 5) 17 Benefits from our Infrastructure, IP Telephone and Video Conference solutions  Facilitates communication,  Reduces time for data transfers,  Improve internal communication & teamwork,  Systems access 24*7 from anywhere,  Reduce travel time,  Reduce transportation and accommodation expenses  Increase efficiency & productivity,  Enable faster and better decisions. MDTIS provides reliable networking solutions that enable optimized communications. IP Communication solutions leverage a single network infrastructure to enhance organizational and employee productivity, improve customer service deliver significant ROI, and maintain company’s distinctive advantages. Those solutions include Infrastructure, IP telephony and IP-enabled video.
  • 18. SOLUTIONS-DATACENTER Service Strategy 4. Data Centre: Solutions (4 of 5) 18 MDTIS’s Data Centre Solutions include Plan, build, acquire, implement and configure Data Centre components:  Select Data Centre location based on good practices,  UPSs and related power infrastructure,  Racks, servers, Blades and Storages,  Platforms and Virtualization,  Fire fighting and detectors,  Access door and CCTV. As we are partner for RAYA Data Centre we provide the below services:  Manage hosting (Dedicated or Shared hosting),  Co-Location (Managed Co-locations, Secure Cadge service, Internet/MPLS/VPN) ,  Out sourcing (User, Server and Network support). MDTIS offers full Data Center solutions (Turnkey Solutions) to provide customers with central managed, utilized and best return of investment IT infrastructure. We offer data Centre consolidation in all terms of servers, storage, network, security, low current infrastructure, and software and site preparation.
  • 19. SOLUTIONS-DISASTERRECOVERYSOLUTION Service Strategy 5. Disaster Recovery Solution: Solutions (5 of 5) 19 MDTIS’s Disaster recovery Solutions include  Back-up,  Clustering,  High Availability for physical & virtual environment,  Business continuity solutions. Benefits  Guarantee your system availability,  Ensure your systems are up and running according to identified RTO & RPO,  Safeguard your system valuable data from loss or failure,  Ensure your company’s information is secure. Today’s challenges in any business is how to secure customers data and IT investment, and how fast you can return back to business after any kind of failure or disaster, therefore MDTIS offers a full Disaster Recovery Solutions in terms of consultant, install and operate. This guides us to meet the customer decided Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
  • 21. CONTACTUS Service StrategyContact US 21 Address : 5 Zaker Hussein St., Nasr City – Cairo - Egypt Tel: +202 22 732 016 +202 22 722 147 +202 22 722 146 +20122 770 17 32 Fax: +202 22 731 042 E- mails: infor@microdata-tec.com technical@microdata-tec.com sales@microdata-tec.com Web site: www.microdata-tec.com