SlideShare a Scribd company logo
1
Company Overview
Company Profile
The Company
An ICT consulting company specialized in design and
implementation of complex application systems and complete
solutions in security and networking environments
Founded in 2004
Has always enjoyed steady growth in terms of revenue and
employees
Markets ranging from Government to Public Utilities, as well as
TLC operators.
Perfil Empresarial
Our offices
Roma
Cagliari
Napoli
Catanzaro
Headquarter: ROMA
Via dell’Archivio di Stato, 15
00144 Rome, Italy
info@consulthink.it
Genova
55 specialists covering
Engineering, Information
Tecnology, Process
management and
Information Security
Company Profile
Research and Development is the innovation engine that drives the company
and helps ensure real added value to our customers.
Design, analysis
and management of
Software Projects
Advanced Security
System design and
management
Technology
Integration
Skill Development
R&D
Consulthink invests about 20% of its revenues in the Research and
Development Unit, which cooperates with Universities to address advanced
ICT issues at the forefront of technological evolution.
Company Strategy
Company Profile
Company Approach
The company bases its approach to the customer on a thorough and deep understanding
of the business needs, corporate culture and operating methods of the customer.
Consulthink projects aims at creating a real added value for the customer: by its nature, it
is capable of a quick response to changes in customer needs by implementing efficient
and effective solutions in a short time
Company Profile
Company Offering
Skill Development
BPR & Application
Development
Technology
Integration
Security
Natural Language
Interpretation
Speech to Text
Translation
Social Network
Augmented
Reality
Semantic
Enterprise Search
Engines
Mobile Security
Georeferenced
Applications
Predictive
Analytics
Virtual Assistants
NFC Technology
Web 2.0 & 3.0
Company Offering
Company Offering Position
Offering & Business Lines
Skill
Development
Security
Technology
Integration
Application
Development Technology Hype Cycle 2014
Business Process Re-engineering and
Enterprise Application Development
Thorough rethinking of all business processes, job definitions,
management systems, organizational structure, work flow, and
underlying assumptions and beliefs.
To effect radical (not incremental) redesign of processes to
achieve dramatic improvements in critical areas (such as cost,
quality, service, and response time) through the in-depth use of
information technology.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
BPR and
Application
Development
Camunda BPM is a light-weight, open
source platform for Business Process
Management. It matches up perfectly with
Java development and provides powerful
business-IT-alignment based on BPMN 2.0.
Business Process Reingeneering and
Enterprise Application Development
Consulthink quickly develops Enterprise Applications and
solutions, starting from a comprehensive understanding of our
customers’ needs, using proven technologies such as Java,
.Net, Python as well Open Source software.
We adopt standard architecture such SOA and Web Services
Architecture with Agile methodology and Extreme
Programming, using Project Management integrated suites
which can be highly customized, with strong social features, to
improve products and processes.
We are constantly exploring cutting-edge themes such as
OpenData and Semantics, transferring the results into
advanced projects.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
BPR and
Application
Development
Mobile Application Development
Applications developed on mobile
platform (IOs and Android), for APPs
and specific use like VAS Services,
for example: Office localization with
georeferenced services
Mobile Augmented Reality:
georeferenced information
(indoor and outdoor) to
increase the set of useful
details provided to the user.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Spress: an application that
automatically generates a “press
review” and allows the user to
access, through a single Tablet-PC
interface, to a set of semantic
aggregated information and news.
BPR and
Application
Development
Enterprise & Semantic Search
Technology
Integration
Security
Skills
Management
Consulthink can boast extensive experience in search
engines and in applications involving Semantics
Classification Systems, having worked on these issues
with several of its most important customers, both through
the implementation of its own solutions and through the
customization of third-party solutions:
•SocReSys: a solution to improve document research
through the analysis of explicit and implicit feedback
expressed by users belonging to the same social group
work.
•Semantic Engine & Classification: a system developed
to support document classification research. It provides a
contextualized vision of the information present in a
document by the use of techniques for extracting
semantic information and automated reasoning.
Offering & Business Lines
BPR and
Application
Development
Document and workflow Management
Technology
Integration
Security
Skills
Management
Consulthink has an extensive experience in document
imaging, workflow and business process management
designing systems to help Customers gain a competitive
advantage
Among Document Management solutions on which the
company has acquired considerable experience, Alfresco
has an important role: an open source software for
enterprise document management, designed to offer
companies a cost-competitive choice compared to the older
proprietary solutions. Alfresco is available in 10 languages
and is based on an architecture allowing web access to
documents through a simple browser.
Offering & Business Lines
BPR and
Application
Development
Technology
Integration
Security
Skills
Management
Application
Development
Security Services and Solutions
Consulthink handles Security Governance with a
global approach, combining technological and
process expertise to:
Offering & Business Lines
Design, deliver and manage security and network
systems
Provide highly specialized services ranging from
Compliance assessment to Penetration Tests and
Vulnerability Assessment in both “traditional” and
Mobile Infrastructures
Provide solutions for Database security, Forensic,
Network Security, Event Management
Analysis & Testing to evaluate the security of a
perimeter from both technological and organizational
perspectives with proven methodologies.
Governance & Compliance to enhancs the security
management processes and ensure compliance to laws
and market regulationsTechnology
Integration
Security
Skills
Management
Application
Development
Security Services
Offering & Business Lines
Thanks to the expertise of our team of specialists with
proven and certified experience, Consulthink can provide
services for:
Consulthink Security Business Unit is ISO27001:2013
certified
Most of the professionals hold multiple certifications, both
product-related and vendor-agnostic ones; furthermore, a
significant part of the personnel is certified as ISO27001
Lead Auditor.
Technology
Integration
Security
Skills
Management
Application
Development
Mobile Security Services
Mobile Security Lab - A project focused exclusively
on all aspects of security involving mobile devices: are
provided technological services of high quality that
their foundations are based on a constant and careful
R & D.
Security Assessments:
Design
Platform
Applications
Services
Reporting
Security News
Attack Validation
Attack Analysis
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Data Security
Consulthink designs, develops and integrates
complete solutions to enforce and monitor data security
policies, such as:
Web Application Firewalls
Database Firewalls
Data Loss prevention systems.
Market leading products, such as the award winning
Imperva Secure Sphere platform, are used in
demanding deployment scenarios to deliver top notch
performance.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Perimeter Security
Consulthink perimeter security solutions satisfy even the
most stringent requirements with requirement driven
design, integration with other platforms and full support to
the customer.
McAfee, Fortinet, Ixia, are only some
of the brands we rely on to deliver high
quality solutions.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Log and Event Management
Building upon world-class products like RSA enVision
and Arcsight, Consulthink offers its vast experience in
designing and providing solutions for collection and
analysis of log data and alerting, enabling organizations
to simplify compliance and quickly respond to high-risk
security events
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Security Analytics
Advanced solutions to effectively address threats such as:
 Application layer attacks
 Botnets
 Malware zero-day
 Covert Communication channels
 Data leakage scenarios
Consulthink’s professional team assists the client in the
most demanding scenarios investigation. Best-of-breed
products, such as RSA Security Analytics, are used as
an aid for obtaining optimal performance in various
contexts of intervention.
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Threath Prevention Platforms
Forensics
By leveraging its partnership with FireEye, Consulthink
offers its customers leading-edge solutions in the
prevention and containment of advanced persistent
threats (APT). The FireEye technology allows to:
 Detect new cyber threats in minutes
 Prevent and curb complex attacks
 Help assess the magnitude and the impact of the
attack
 Reduce the time of incident Response
The Consulthink team provides all the skills and
experiences needed to support the client in obtaining an
adequate safety level
Offering & Business Lines
Technology
Integration
Security
Skills
Management
Application
Development
Offering & Business Lines
The complete security
Tracks the digital
signing operation
Permits multiple
signatures in co-signing
and countersigning
Integrates
with any CA for
affixing Time Stamp
to PDF
Allows you to create
and verify the digital signature
in P7M format.
Centralizes
management of
applications that use
CoSign for Digital
Signatures
Digital Signature System
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
The platform KMS (Knowledge Mining System) enables the
collection and automatic interpretation in terms Quantitative,
Qualitative and Sentiment of web comments.
KMS runs:
• Grammatical analysis
• Logical Analysis
• Semantic Analysis
• Classification Semantics.
KMS allows you to:
• Identify the issues to enhance a product / service or
• Improve the perception of the product / service
The Enhancement of knowledge:
Monitoring Web
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
Grouping
by Source
Conceptual
Cloud
Maturities for concepts
of Concept Cloud
Evidence and Popularity The conceptual network
and navigation detail
The enhancement of Knowledge:
Monitoring Web
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
The enhancement of Knowledge:
Predictive analysis
Predictive analytics enables organizations to anticipate,
with some certainty, what will happen in the future in
order to plan and carry out strategies to support and
improve the decision-making process.
By applying predictive analytics solutions to the
organization's data, both structured and not, you can
discover trends and associations, supporting strategic
decision-making.
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
The enhancement of knowledge:
Predictive Analytics - some experiences
• Clustering of customers based on their needs related to mobile
phone to customize offers and promotions based on projections of
the effects
• Clustering behavior of customers and anticipation of the
propensity to banking products, particularly credit cards and
financial products to drive their marketing efforts
• Forecast abandonment of the bank by customers
• Combat fraud in real time with predictive scientific analysis (Fraud
Management)
Clustering
QR Smart associates
Intelligent Glyphs with
the signed file, which
contains the authentic
image of the file and the
signature data.
The signature
information is then
always available in
augmented reality, to
verify authenticity.
Conventional digital
signature systems become
less reliable when the file is
printed, as it can be further
manipulated.
Paperwork Security
GENUINE
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
Multimedia Solutions
Technology
Integration
Security
Application
Development
Skills
Management
Offering & Business Lines
MCD - Multimedia Content
Delivery: Our solution for a Digital
Signage complete and flexible, able
to increase the effectiveness of the
information transmitted. Consulthink
also provides a turnkey solution for
IPTV
MIK - Multimedia Interactive
Kiosk: an advanced and interactive
management information and
services payable by kiosks both
type indoors and outdoors.
Mobile
Security
Skills
Management
Application
Development
Eucip services
Consulthink is an e-CF (European eCompetence Framework)
and EUCIP (European Certification of Informatics
Professionals), Business Competence Center of AICA, unique
distributor of this framework in Italy. Measuring, evaluating and
further developing professional skills are the main objectives in
this area by means of Assessment, Qualification, Certification
and Training.
Skill Assessment
Measures the level of knowledge and competence of ICT
resources, highlights the strengths and weaknesses, and
provides an in-depth, detailed picture of the employees’
knowledge and skills in the ICT field (Skill Inventory).
Skill Qualification
Aimed at obtaining a certificate from a third party, issued by
AICA, demonstrating the ability of the person to perform the role
described by one of the 21 professional EUCIP. Profiles.
Offering & Business Lines
Mobile
Security
Skills
Management
Application
Development
Eucip Certification
Certification of Competencies
As a further service in this area, Consulthink offers the
opportunity to achieve a EUCIP certification of ICT
competencies. The tests are defined and unique all over
Europe. EUCIP includes the following certifications:
EUCIP Core, for the certification of key knowledge
required for all professionals related to the basic skills;
EUCIP Professional Level, for the certification of
skills and experience related to specific jobs,
corresponding to 21 different ICT profiles;
EUCIP IT Administrator for the
certification of skills
characteristic of the IT
infrastructure managers in
SMEs and local offices of large
organizations
Offering & Business Lines
Mobile
Security
Skills
Management
Application
Development
Training
In addition to the Qualification and Certification of
skills, Consulthink is capable of delivering training
courses designed and tailored to address specific
requests, in the ICT context:
• Application Development
• Security
• Networking
Consulthink offers a
portfolio of courses
constantly updated in line
with technological
developments and market
demand
Offering & Business Lines
33
Thank you for your attention
Our Contacts
Web: www.consulthink.it
Mail: info@consulthink.it
Phone:+39-06 4549 2416
Fax:+39-06 4549 2454

More Related Content

What's hot

MachNation - Davra Whitepaper
MachNation - Davra WhitepaperMachNation - Davra Whitepaper
MachNation - Davra WhitepaperJoe Quinn
 
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Prolifics
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
Tamim Rahman
 
Soa 2013
Soa 2013Soa 2013
Deloitte Software As A Service Deloitte Seminar
Deloitte Software As A Service   Deloitte SeminarDeloitte Software As A Service   Deloitte Seminar
Deloitte Software As A Service Deloitte Seminar
Theo Slaats
 
LinkState Company Profile V3
LinkState Company Profile V3LinkState Company Profile V3
LinkState Company Profile V3Chris Hendrikz
 
IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544ypai
 
Airport IT Strategy
Airport IT Strategy Airport IT Strategy
Airport IT Strategy
Sarmad Ibrahim
 
CRMIT Solutions | Global Salesforce Consulting Partners
CRMIT Solutions | Global Salesforce Consulting PartnersCRMIT Solutions | Global Salesforce Consulting Partners
CRMIT Solutions | Global Salesforce Consulting Partners
Marketing Team
 
Edward Draiss Resume 052611
Edward Draiss Resume 052611Edward Draiss Resume 052611
Edward Draiss Resume 052611draiss
 
Ndc Temenos Building New Beginnings
Ndc Temenos Building New BeginningsNdc Temenos Building New Beginnings
Ndc Temenos Building New Beginnings
ahmedzafar
 
Alexandr Golyak, Nikolay Chertkov "Automotive Testing vs Test Automatio"
Alexandr Golyak, Nikolay Chertkov  "Automotive Testing vs Test Automatio"Alexandr Golyak, Nikolay Chertkov  "Automotive Testing vs Test Automatio"
Alexandr Golyak, Nikolay Chertkov "Automotive Testing vs Test Automatio"
LogeekNightUkraine
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
Tekpros
 
How to Keep SAP Projects on Schedule with B2B Managed Services
How to Keep SAP Projects on Schedule with B2B Managed Services How to Keep SAP Projects on Schedule with B2B Managed Services
How to Keep SAP Projects on Schedule with B2B Managed Services
Mark Morley, MBA
 
Learning and Performance System Integration: A Competitive Edge on the World
Learning and Performance System Integration: A Competitive Edge on the WorldLearning and Performance System Integration: A Competitive Edge on the World
Learning and Performance System Integration: A Competitive Edge on the World
Tribridge
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kappa Data
 
Plat4mation - Your ServiceNow Partner
Plat4mation - Your ServiceNow PartnerPlat4mation - Your ServiceNow Partner
Plat4mation - Your ServiceNow Partner
Gerry Appeltants
 
G10.2013 Application Delivery Controllers
G10.2013   Application Delivery ControllersG10.2013   Application Delivery Controllers
G10.2013 Application Delivery Controllers
Satya Harish
 

What's hot (19)

MachNation - Davra Whitepaper
MachNation - Davra WhitepaperMachNation - Davra Whitepaper
MachNation - Davra Whitepaper
 
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
 
Soa 2013
Soa 2013Soa 2013
Soa 2013
 
Deloitte Software As A Service Deloitte Seminar
Deloitte Software As A Service   Deloitte SeminarDeloitte Software As A Service   Deloitte Seminar
Deloitte Software As A Service Deloitte Seminar
 
LinkState Company Profile V3
LinkState Company Profile V3LinkState Company Profile V3
LinkState Company Profile V3
 
IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544
 
Airport IT Strategy
Airport IT Strategy Airport IT Strategy
Airport IT Strategy
 
CRMIT Solutions | Global Salesforce Consulting Partners
CRMIT Solutions | Global Salesforce Consulting PartnersCRMIT Solutions | Global Salesforce Consulting Partners
CRMIT Solutions | Global Salesforce Consulting Partners
 
Edward Draiss Resume 052611
Edward Draiss Resume 052611Edward Draiss Resume 052611
Edward Draiss Resume 052611
 
Ndc Temenos Building New Beginnings
Ndc Temenos Building New BeginningsNdc Temenos Building New Beginnings
Ndc Temenos Building New Beginnings
 
Alexandr Golyak, Nikolay Chertkov "Automotive Testing vs Test Automatio"
Alexandr Golyak, Nikolay Chertkov  "Automotive Testing vs Test Automatio"Alexandr Golyak, Nikolay Chertkov  "Automotive Testing vs Test Automatio"
Alexandr Golyak, Nikolay Chertkov "Automotive Testing vs Test Automatio"
 
Dhiraj_Kalra
Dhiraj_KalraDhiraj_Kalra
Dhiraj_Kalra
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
 
How to Keep SAP Projects on Schedule with B2B Managed Services
How to Keep SAP Projects on Schedule with B2B Managed Services How to Keep SAP Projects on Schedule with B2B Managed Services
How to Keep SAP Projects on Schedule with B2B Managed Services
 
Learning and Performance System Integration: A Competitive Edge on the World
Learning and Performance System Integration: A Competitive Edge on the WorldLearning and Performance System Integration: A Competitive Edge on the World
Learning and Performance System Integration: A Competitive Edge on the World
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
 
Plat4mation - Your ServiceNow Partner
Plat4mation - Your ServiceNow PartnerPlat4mation - Your ServiceNow Partner
Plat4mation - Your ServiceNow Partner
 
G10.2013 Application Delivery Controllers
G10.2013   Application Delivery ControllersG10.2013   Application Delivery Controllers
G10.2013 Application Delivery Controllers
 

Viewers also liked

Win New Consulting Business: The Four Keys to Writing a Successful Proposal
Win New Consulting Business: The Four Keys to Writing a Successful ProposalWin New Consulting Business: The Four Keys to Writing a Successful Proposal
Win New Consulting Business: The Four Keys to Writing a Successful ProposalMBO Partners
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Consulthinkspa
 
GoOpen 2010: Jan Rasmus Sulebak
GoOpen 2010: Jan Rasmus SulebakGoOpen 2010: Jan Rasmus Sulebak
GoOpen 2010: Jan Rasmus SulebakFriprogsenteret
 
Senior ICT Consulting Sales and Market Development Leader
Senior ICT Consulting Sales and Market Development LeaderSenior ICT Consulting Sales and Market Development Leader
Senior ICT Consulting Sales and Market Development LeaderVigneault
 
Hodgson Consulting Scope of Solutions
Hodgson Consulting Scope of SolutionsHodgson Consulting Scope of Solutions
Hodgson Consulting Scope of Solutions
tmurad
 
Consulting Etiquette
Consulting EtiquetteConsulting Etiquette
Consulting Etiquette
Vaco Seattle
 
Company Profile Sample
Company Profile SampleCompany Profile Sample
Company Profile Samplensijaji1
 
Organizational maturity model pcmm
Organizational maturity model pcmmOrganizational maturity model pcmm
Organizational maturity model pcmm
Daniel Oskooei
 
Managing the Consulting Engagement
Managing the Consulting EngagementManaging the Consulting Engagement
Managing the Consulting EngagementSaumya Ganguly
 
Management Consulting Resume Sample
Management Consulting Resume SampleManagement Consulting Resume Sample
Management Consulting Resume Sample
ConsultingFact.com
 
Ppt of company profile in project
Ppt of company profile in projectPpt of company profile in project
Ppt of company profile in projectshivakumaranupama
 
Company Overview Presentation
Company Overview PresentationCompany Overview Presentation
Company Overview Presentation
Zenith Technologies
 
Company Profile Sample
Company Profile SampleCompany Profile Sample
Company Profile Sample
Yagika Madan
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
Shelly Sanchez Terrell
 

Viewers also liked (14)

Win New Consulting Business: The Four Keys to Writing a Successful Proposal
Win New Consulting Business: The Four Keys to Writing a Successful ProposalWin New Consulting Business: The Four Keys to Writing a Successful Proposal
Win New Consulting Business: The Four Keys to Writing a Successful Proposal
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
 
GoOpen 2010: Jan Rasmus Sulebak
GoOpen 2010: Jan Rasmus SulebakGoOpen 2010: Jan Rasmus Sulebak
GoOpen 2010: Jan Rasmus Sulebak
 
Senior ICT Consulting Sales and Market Development Leader
Senior ICT Consulting Sales and Market Development LeaderSenior ICT Consulting Sales and Market Development Leader
Senior ICT Consulting Sales and Market Development Leader
 
Hodgson Consulting Scope of Solutions
Hodgson Consulting Scope of SolutionsHodgson Consulting Scope of Solutions
Hodgson Consulting Scope of Solutions
 
Consulting Etiquette
Consulting EtiquetteConsulting Etiquette
Consulting Etiquette
 
Company Profile Sample
Company Profile SampleCompany Profile Sample
Company Profile Sample
 
Organizational maturity model pcmm
Organizational maturity model pcmmOrganizational maturity model pcmm
Organizational maturity model pcmm
 
Managing the Consulting Engagement
Managing the Consulting EngagementManaging the Consulting Engagement
Managing the Consulting Engagement
 
Management Consulting Resume Sample
Management Consulting Resume SampleManagement Consulting Resume Sample
Management Consulting Resume Sample
 
Ppt of company profile in project
Ppt of company profile in projectPpt of company profile in project
Ppt of company profile in project
 
Company Overview Presentation
Company Overview PresentationCompany Overview Presentation
Company Overview Presentation
 
Company Profile Sample
Company Profile SampleCompany Profile Sample
Company Profile Sample
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 

Similar to Consulthink Overview

Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbai
olatechsolutionsltd
 
Conquerors Software Technologies 2 (1).pptx
Conquerors Software Technologies 2 (1).pptxConquerors Software Technologies 2 (1).pptx
Conquerors Software Technologies 2 (1).pptx
parasapravali
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
hendrik441443
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
kiranmaim1
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
kiranmaim1
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
kaveriv2
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
kiranmaim1
 
Conquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptxConquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptx
kiranmaim1
 
Conquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptxConquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptx
kiranmaim1
 
Conquerors Software Technologies 33 (2).pptx
Conquerors Software Technologies 33 (2).pptxConquerors Software Technologies 33 (2).pptx
Conquerors Software Technologies 33 (2).pptx
kiranmaim1
 
Advantix corporate presentation for marketing
Advantix corporate presentation for marketingAdvantix corporate presentation for marketing
Advantix corporate presentation for marketingAdvantix Technologies
 
Software Application Development - Advantix Technolgoies
Software Application Development - Advantix TechnolgoiesSoftware Application Development - Advantix Technolgoies
Software Application Development - Advantix Technolgoies
Manojkumar Govindasamy
 
Conquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptxConquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptx
HoneyBuji1
 
Conquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptxConquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptx
kiranmaim1
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
kaveriv2
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
kiranmaim1
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
kiranmaim1
 

Similar to Consulthink Overview (20)

Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbai
 
Conquerors Software Technologies 2 (1).pptx
Conquerors Software Technologies 2 (1).pptxConquerors Software Technologies 2 (1).pptx
Conquerors Software Technologies 2 (1).pptx
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
 
Conquerors Software Technologies.pptx
Conquerors Software Technologies.pptxConquerors Software Technologies.pptx
Conquerors Software Technologies.pptx
 
Conquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptxConquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptx
 
Conquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptxConquerors Software Technologies 3.pptx
Conquerors Software Technologies 3.pptx
 
Conquerors Software Technologies 33 (2).pptx
Conquerors Software Technologies 33 (2).pptxConquerors Software Technologies 33 (2).pptx
Conquerors Software Technologies 33 (2).pptx
 
AVANI-Capabilities-Statement
AVANI-Capabilities-StatementAVANI-Capabilities-Statement
AVANI-Capabilities-Statement
 
Advantix corporate presentation for marketing
Advantix corporate presentation for marketingAdvantix corporate presentation for marketing
Advantix corporate presentation for marketing
 
Software Application Development - Advantix Technolgoies
Software Application Development - Advantix TechnolgoiesSoftware Application Development - Advantix Technolgoies
Software Application Development - Advantix Technolgoies
 
Conquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptxConquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptx
 
Conquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptxConquerors Software Technologies 2.pptx
Conquerors Software Technologies 2.pptx
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
 
Conquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptxConquerors Software Technologies 5.pptx
Conquerors Software Technologies 5.pptx
 
BST_Exec
BST_ExecBST_Exec
BST_Exec
 
ElcoSoft
ElcoSoftElcoSoft
ElcoSoft
 

More from Consulthinkspa

GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei DatiGDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
Consulthinkspa
 
Big Data Vs. Open Data
Big Data Vs.  Open Data Big Data Vs.  Open Data
Big Data Vs. Open Data
Consulthinkspa
 
Data Science
Data ScienceData Science
Data Science
Consulthinkspa
 
Hot trend 2017
Hot trend 2017Hot trend 2017
Hot trend 2017
Consulthinkspa
 
Pensiero Analogico e Microservizi
Pensiero Analogico  e MicroserviziPensiero Analogico  e Microservizi
Pensiero Analogico e Microservizi
Consulthinkspa
 
DevOps - Come diventare un buon DevOpper
DevOps -  Come diventare un buon DevOpperDevOps -  Come diventare un buon DevOpper
DevOps - Come diventare un buon DevOpper
Consulthinkspa
 
Scenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in AziendaScenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in Azienda
Consulthinkspa
 
Droidcon it 2015: Android Lollipop for Enterprise
Droidcon it 2015: Android Lollipop for EnterpriseDroidcon it 2015: Android Lollipop for Enterprise
Droidcon it 2015: Android Lollipop for Enterprise
Consulthinkspa
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
Consulthinkspa
 
IPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtàIPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtà
Consulthinkspa
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
Consulthinkspa
 
Big data - stack tecnologico
Big data -  stack tecnologicoBig data -  stack tecnologico
Big data - stack tecnologico
Consulthinkspa
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycle
Consulthinkspa
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013 Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013
Consulthinkspa
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Consulthinkspa
 

More from Consulthinkspa (16)

GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei DatiGDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
GDPR - Il Nuovo Regolamento Generale sulla Protezione dei Dati
 
Big Data Vs. Open Data
Big Data Vs.  Open Data Big Data Vs.  Open Data
Big Data Vs. Open Data
 
Data Science
Data ScienceData Science
Data Science
 
Hot trend 2017
Hot trend 2017Hot trend 2017
Hot trend 2017
 
Pensiero Analogico e Microservizi
Pensiero Analogico  e MicroserviziPensiero Analogico  e Microservizi
Pensiero Analogico e Microservizi
 
DevOps - Come diventare un buon DevOpper
DevOps -  Come diventare un buon DevOpperDevOps -  Come diventare un buon DevOpper
DevOps - Come diventare un buon DevOpper
 
Scenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in AziendaScenari introduzione Application Service Governance in Azienda
Scenari introduzione Application Service Governance in Azienda
 
Droidcon it 2015: Android Lollipop for Enterprise
Droidcon it 2015: Android Lollipop for EnterpriseDroidcon it 2015: Android Lollipop for Enterprise
Droidcon it 2015: Android Lollipop for Enterprise
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 
IPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtàIPv6 - Breve panoramica tra mito e realtà
IPv6 - Breve panoramica tra mito e realtà
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
 
Big data - stack tecnologico
Big data -  stack tecnologicoBig data -  stack tecnologico
Big data - stack tecnologico
 
Quality Software Development LifeCycle
Quality Software Development LifeCycleQuality Software Development LifeCycle
Quality Software Development LifeCycle
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013 Android Security - Key Management at GDG DevFest Rome 2013
Android Security - Key Management at GDG DevFest Rome 2013
 
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendaliPrevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
Prevenzione degli attacchi informatici che coinvolgono dati sensibili aziendali
 

Recently uploaded

Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 

Recently uploaded (16)

Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 

Consulthink Overview

  • 2. Company Profile The Company An ICT consulting company specialized in design and implementation of complex application systems and complete solutions in security and networking environments Founded in 2004 Has always enjoyed steady growth in terms of revenue and employees Markets ranging from Government to Public Utilities, as well as TLC operators.
  • 3. Perfil Empresarial Our offices Roma Cagliari Napoli Catanzaro Headquarter: ROMA Via dell’Archivio di Stato, 15 00144 Rome, Italy info@consulthink.it Genova 55 specialists covering Engineering, Information Tecnology, Process management and Information Security
  • 4. Company Profile Research and Development is the innovation engine that drives the company and helps ensure real added value to our customers. Design, analysis and management of Software Projects Advanced Security System design and management Technology Integration Skill Development R&D Consulthink invests about 20% of its revenues in the Research and Development Unit, which cooperates with Universities to address advanced ICT issues at the forefront of technological evolution. Company Strategy
  • 5. Company Profile Company Approach The company bases its approach to the customer on a thorough and deep understanding of the business needs, corporate culture and operating methods of the customer. Consulthink projects aims at creating a real added value for the customer: by its nature, it is capable of a quick response to changes in customer needs by implementing efficient and effective solutions in a short time
  • 7. Company Offering Skill Development BPR & Application Development Technology Integration Security Natural Language Interpretation Speech to Text Translation Social Network Augmented Reality Semantic Enterprise Search Engines Mobile Security Georeferenced Applications Predictive Analytics Virtual Assistants NFC Technology Web 2.0 & 3.0 Company Offering
  • 8. Company Offering Position Offering & Business Lines Skill Development Security Technology Integration Application Development Technology Hype Cycle 2014
  • 9. Business Process Re-engineering and Enterprise Application Development Thorough rethinking of all business processes, job definitions, management systems, organizational structure, work flow, and underlying assumptions and beliefs. To effect radical (not incremental) redesign of processes to achieve dramatic improvements in critical areas (such as cost, quality, service, and response time) through the in-depth use of information technology. Offering & Business Lines Technology Integration Security Skills Management BPR and Application Development Camunda BPM is a light-weight, open source platform for Business Process Management. It matches up perfectly with Java development and provides powerful business-IT-alignment based on BPMN 2.0.
  • 10. Business Process Reingeneering and Enterprise Application Development Consulthink quickly develops Enterprise Applications and solutions, starting from a comprehensive understanding of our customers’ needs, using proven technologies such as Java, .Net, Python as well Open Source software. We adopt standard architecture such SOA and Web Services Architecture with Agile methodology and Extreme Programming, using Project Management integrated suites which can be highly customized, with strong social features, to improve products and processes. We are constantly exploring cutting-edge themes such as OpenData and Semantics, transferring the results into advanced projects. Offering & Business Lines Technology Integration Security Skills Management BPR and Application Development
  • 11. Mobile Application Development Applications developed on mobile platform (IOs and Android), for APPs and specific use like VAS Services, for example: Office localization with georeferenced services Mobile Augmented Reality: georeferenced information (indoor and outdoor) to increase the set of useful details provided to the user. Offering & Business Lines Technology Integration Security Skills Management Spress: an application that automatically generates a “press review” and allows the user to access, through a single Tablet-PC interface, to a set of semantic aggregated information and news. BPR and Application Development
  • 12. Enterprise & Semantic Search Technology Integration Security Skills Management Consulthink can boast extensive experience in search engines and in applications involving Semantics Classification Systems, having worked on these issues with several of its most important customers, both through the implementation of its own solutions and through the customization of third-party solutions: •SocReSys: a solution to improve document research through the analysis of explicit and implicit feedback expressed by users belonging to the same social group work. •Semantic Engine & Classification: a system developed to support document classification research. It provides a contextualized vision of the information present in a document by the use of techniques for extracting semantic information and automated reasoning. Offering & Business Lines BPR and Application Development
  • 13. Document and workflow Management Technology Integration Security Skills Management Consulthink has an extensive experience in document imaging, workflow and business process management designing systems to help Customers gain a competitive advantage Among Document Management solutions on which the company has acquired considerable experience, Alfresco has an important role: an open source software for enterprise document management, designed to offer companies a cost-competitive choice compared to the older proprietary solutions. Alfresco is available in 10 languages and is based on an architecture allowing web access to documents through a simple browser. Offering & Business Lines BPR and Application Development
  • 14. Technology Integration Security Skills Management Application Development Security Services and Solutions Consulthink handles Security Governance with a global approach, combining technological and process expertise to: Offering & Business Lines Design, deliver and manage security and network systems Provide highly specialized services ranging from Compliance assessment to Penetration Tests and Vulnerability Assessment in both “traditional” and Mobile Infrastructures Provide solutions for Database security, Forensic, Network Security, Event Management
  • 15. Analysis & Testing to evaluate the security of a perimeter from both technological and organizational perspectives with proven methodologies. Governance & Compliance to enhancs the security management processes and ensure compliance to laws and market regulationsTechnology Integration Security Skills Management Application Development Security Services Offering & Business Lines Thanks to the expertise of our team of specialists with proven and certified experience, Consulthink can provide services for: Consulthink Security Business Unit is ISO27001:2013 certified Most of the professionals hold multiple certifications, both product-related and vendor-agnostic ones; furthermore, a significant part of the personnel is certified as ISO27001 Lead Auditor.
  • 16. Technology Integration Security Skills Management Application Development Mobile Security Services Mobile Security Lab - A project focused exclusively on all aspects of security involving mobile devices: are provided technological services of high quality that their foundations are based on a constant and careful R & D. Security Assessments: Design Platform Applications Services Reporting Security News Attack Validation Attack Analysis Offering & Business Lines
  • 17. Technology Integration Security Skills Management Application Development Data Security Consulthink designs, develops and integrates complete solutions to enforce and monitor data security policies, such as: Web Application Firewalls Database Firewalls Data Loss prevention systems. Market leading products, such as the award winning Imperva Secure Sphere platform, are used in demanding deployment scenarios to deliver top notch performance. Offering & Business Lines
  • 18. Technology Integration Security Skills Management Application Development Perimeter Security Consulthink perimeter security solutions satisfy even the most stringent requirements with requirement driven design, integration with other platforms and full support to the customer. McAfee, Fortinet, Ixia, are only some of the brands we rely on to deliver high quality solutions. Offering & Business Lines
  • 19. Technology Integration Security Skills Management Application Development Log and Event Management Building upon world-class products like RSA enVision and Arcsight, Consulthink offers its vast experience in designing and providing solutions for collection and analysis of log data and alerting, enabling organizations to simplify compliance and quickly respond to high-risk security events Offering & Business Lines
  • 20. Technology Integration Security Skills Management Application Development Security Analytics Advanced solutions to effectively address threats such as:  Application layer attacks  Botnets  Malware zero-day  Covert Communication channels  Data leakage scenarios Consulthink’s professional team assists the client in the most demanding scenarios investigation. Best-of-breed products, such as RSA Security Analytics, are used as an aid for obtaining optimal performance in various contexts of intervention. Offering & Business Lines
  • 21. Technology Integration Security Skills Management Application Development Threath Prevention Platforms Forensics By leveraging its partnership with FireEye, Consulthink offers its customers leading-edge solutions in the prevention and containment of advanced persistent threats (APT). The FireEye technology allows to:  Detect new cyber threats in minutes  Prevent and curb complex attacks  Help assess the magnitude and the impact of the attack  Reduce the time of incident Response The Consulthink team provides all the skills and experiences needed to support the client in obtaining an adequate safety level Offering & Business Lines
  • 23. Tracks the digital signing operation Permits multiple signatures in co-signing and countersigning Integrates with any CA for affixing Time Stamp to PDF Allows you to create and verify the digital signature in P7M format. Centralizes management of applications that use CoSign for Digital Signatures Digital Signature System Technology Integration Security Application Development Skills Management Offering & Business Lines
  • 24. Technology Integration Security Application Development Skills Management Offering & Business Lines The platform KMS (Knowledge Mining System) enables the collection and automatic interpretation in terms Quantitative, Qualitative and Sentiment of web comments. KMS runs: • Grammatical analysis • Logical Analysis • Semantic Analysis • Classification Semantics. KMS allows you to: • Identify the issues to enhance a product / service or • Improve the perception of the product / service The Enhancement of knowledge: Monitoring Web
  • 25. Technology Integration Security Application Development Skills Management Offering & Business Lines Grouping by Source Conceptual Cloud Maturities for concepts of Concept Cloud Evidence and Popularity The conceptual network and navigation detail The enhancement of Knowledge: Monitoring Web
  • 26. Technology Integration Security Application Development Skills Management Offering & Business Lines The enhancement of Knowledge: Predictive analysis Predictive analytics enables organizations to anticipate, with some certainty, what will happen in the future in order to plan and carry out strategies to support and improve the decision-making process. By applying predictive analytics solutions to the organization's data, both structured and not, you can discover trends and associations, supporting strategic decision-making.
  • 27. Technology Integration Security Application Development Skills Management Offering & Business Lines The enhancement of knowledge: Predictive Analytics - some experiences • Clustering of customers based on their needs related to mobile phone to customize offers and promotions based on projections of the effects • Clustering behavior of customers and anticipation of the propensity to banking products, particularly credit cards and financial products to drive their marketing efforts • Forecast abandonment of the bank by customers • Combat fraud in real time with predictive scientific analysis (Fraud Management) Clustering
  • 28. QR Smart associates Intelligent Glyphs with the signed file, which contains the authentic image of the file and the signature data. The signature information is then always available in augmented reality, to verify authenticity. Conventional digital signature systems become less reliable when the file is printed, as it can be further manipulated. Paperwork Security GENUINE Technology Integration Security Application Development Skills Management Offering & Business Lines
  • 29. Multimedia Solutions Technology Integration Security Application Development Skills Management Offering & Business Lines MCD - Multimedia Content Delivery: Our solution for a Digital Signage complete and flexible, able to increase the effectiveness of the information transmitted. Consulthink also provides a turnkey solution for IPTV MIK - Multimedia Interactive Kiosk: an advanced and interactive management information and services payable by kiosks both type indoors and outdoors.
  • 30. Mobile Security Skills Management Application Development Eucip services Consulthink is an e-CF (European eCompetence Framework) and EUCIP (European Certification of Informatics Professionals), Business Competence Center of AICA, unique distributor of this framework in Italy. Measuring, evaluating and further developing professional skills are the main objectives in this area by means of Assessment, Qualification, Certification and Training. Skill Assessment Measures the level of knowledge and competence of ICT resources, highlights the strengths and weaknesses, and provides an in-depth, detailed picture of the employees’ knowledge and skills in the ICT field (Skill Inventory). Skill Qualification Aimed at obtaining a certificate from a third party, issued by AICA, demonstrating the ability of the person to perform the role described by one of the 21 professional EUCIP. Profiles. Offering & Business Lines
  • 31. Mobile Security Skills Management Application Development Eucip Certification Certification of Competencies As a further service in this area, Consulthink offers the opportunity to achieve a EUCIP certification of ICT competencies. The tests are defined and unique all over Europe. EUCIP includes the following certifications: EUCIP Core, for the certification of key knowledge required for all professionals related to the basic skills; EUCIP Professional Level, for the certification of skills and experience related to specific jobs, corresponding to 21 different ICT profiles; EUCIP IT Administrator for the certification of skills characteristic of the IT infrastructure managers in SMEs and local offices of large organizations Offering & Business Lines
  • 32. Mobile Security Skills Management Application Development Training In addition to the Qualification and Certification of skills, Consulthink is capable of delivering training courses designed and tailored to address specific requests, in the ICT context: • Application Development • Security • Networking Consulthink offers a portfolio of courses constantly updated in line with technological developments and market demand Offering & Business Lines
  • 33. 33 Thank you for your attention Our Contacts Web: www.consulthink.it Mail: info@consulthink.it Phone:+39-06 4549 2416 Fax:+39-06 4549 2454