AGC Networks Limited.
CYBER-i
Corporate Dossier
AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help
organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve
employee productivity by embedding Communications and securing their business processes.
AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests
in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With
a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica,
UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to
foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision,
global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger
client base for AGC.
2
FIREWALL
SPYWARE
PASSWORD
UPDATE
VIRUS
PHISING
HACKER
SPAM
IDENTITY
INTERNET
AGC
Quadrants
CORPORATE INFORMATION
● IP Communications
● Collaboration
● Contact Center
● Multimedia Integration
Unified Communications Network Infrastructure
& Data Center
● UC Applications
● IoT
● Digital Applications
● CRM & ERP Integration
Enterprise ApplicationsCyber Security ( )
● Switching & Routing
● Wireless & Mobility
● Virtualization
● Data Center
● Audit & Risk Assessment
● Certification
● Application & Data Security
● SIEM & SCADA Capability
3
CYBER-i Managed Security Services
Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are
looking to improve efficiency of compliance and security initiatives, we understand that business requirements
can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.
Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD,
social media, web applications and big data can pose risks as well as create inefficiencies if not properly
managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED
SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed
services designed to meet the unique demands of your business.
Do Security Your Way
AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install,
configure and tune your solutions so that it can be controlled internally or managing a complete program for your
organization.
Elevate Your Security Posture
Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your
managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like
threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware
and more.
Drive Intelligence
Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today.
Trustwave performs threat research and analysis that can help you better understand, detect and prevent security
breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global
Threat Database.
Expert Support
Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals.
All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also
holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE,
etc. All of our security analysts have real-world network security experience which they leverage to fully investigate
and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct
their duties with a singular purpose, to safeguard your IT environment. As part of
Get Sustainable
We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view
your programs in real-time, access all your managed services, make support requests, see event history, run reports
and manage your account, all through one easy-to use dashboard.
CUSTOM MANAGED SERVICES
CYBER-i helps augment your security strategy in key
areas to help you evolve processes, elevate data
protection or advance the way you manage threats.
With deep security expertise and unmatched global
threat intelligence, we can design a program that
supports your specific needs, while giving you
complete visibility and control.
PACKAGED MSS BUNDLES
Simplify your security program, operationalize your
expenses and keep your team focused on business
priorities. With packaged solution bundles, expert
management and automated tools, we remove the
day-to-day complexity of compliance and data
protection, so you can get back to what you’re
passionate about – your business.
MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES
SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident
Management Alert & Notification I CXO Report I Compliance Report
Security Solution
Monitoring
(On-site / Remote)
Policy Management I Change Management I Configuration Management I
Signature Updates Device Fine Tuning I Version Upgrade I Reporting
Security Solution
Management
(On-site / Remote)
Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature
Updates I Compliance Management Deviation Reporting I Uniform Policy
Management I Configuration Management
Managed Endpoint
Security Services
Web Application Malware Monitoring I Web Application Malware I
Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware
4
5
SERVICES PORTFOLIO
SOLUTION PORTFOLIO
CYBER-i
SOLUTIONS Portfolio
Data Security
• Advanced Threat
Protection
• Information Rights
Management
• Mobile Device
Management
• Vulnerability Management
Application
Security
• Web
Application
Firewall
• Database
Access
Management
Advance Security
• Network Immune
System
• ICS Security
Identity &
Access
• Two Factor
Authentication
• Privilege
Identity
Management
End Point
Security
• Antivirus, End
Point Protection
Network Security
• Firewall
• NG Firewall
• IPS
• UTM
• Enterprise Security
• IOT Security
• Cloud Security
Security
Monitoring
• SIEM
• Data Leakage
Protection
• Network Access
Control
Audit
• Vulnerability
Assessment
• Penetration
Testing
• Network
Audits
& Assessment,
Security Audit
• Application
Audits & Source
Code Review
• Internal Audits
• Digital
Forensics
Management
• Compliance Mgmt
• Security Operations
Center Management
• Vulnerability
Management
• Security Solutions
Implementation &
Management
• Staff Augmentation
Implementation
• SIEM
• APT
• DLP
• NAC
• Bandwidth
Management &
WAN Accelerator
• Wireless Security
• Risk Management
Compliance Tool
CYBER-i
SERVICES Portfolio
Compliance
• HIPAA
• SOC 2
• Data Privacy
• COBIT / ITIL
Framework
Certifications
• ISO 9001
• ISO 20000
• ISO 22301
• ISO 27001
• PCI DSS
• PA DSS
CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance,
Information Security Management, Service Management & Business Continuity Management, Product
Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking
assignments in the field of Security.
• Consultants possess the contemporary best industry recognized certifications such as:
- Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001,
20000, 22301 and 27001)
- Technical (CEGIT, CEH, OCSP)
- Various Vendor Certifications
- PMP©
• Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering,
Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises.
• Consultants have vast experience in implementing the management system frameworks, governance
frameworks & maturity models as well as auditing the same.
• Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of
which provides a thorough understanding of our clients’ needs.
• Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure
Software Development, Access Control, etc. which matters while assessing, discovering and providing
solutions.
• Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right
choice.
CORE COMPETENCIES
AGC CYBER-i SKILL MATRIX
6
ISO 27001
BS 25999
ISO 20000
SOX
COBIT
HIPAA
PCI DSS
SAS 70
Data Privacy
ISO 9001
ISO 38500
OHSAS 18001
ISO 14001
4%
22%
14%
18%
4%
2%
9%
9%
3%
9%
2%
2%
2%
CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational
requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading
partners include the following:
7
ASSOCIATIONS
OEM PARTNERSHIPS
• Vast experience of cross functional domains
• Experience to handle very complex and large projects
• Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the
relevant qualifications and industry experience
• An ISO 9001, SOC2 Type I and ISO 27001 certified company
• Close association with the ISACA (USA) Pune and Mumbai chapters
• Strong association with DSCI (Data Security Council of India)
• Work closely with international management system certification bodies such as TUV (Germany), DNV
(Norway) and BSI (UK)
• Empaneled with Computer Emergency Response Team (India) as information security auditing organization
OUR DIFFERENTIATORS
8
GLOBAL CLIENTELE
DOMESTIC CLIENTELE
9
This is confidential and proprietary information of AGC Networks Ltd.
Contact Us
AGC Networks Ltd.
Equinox Business Park, Tower 1,
Off BKC, LBS Marg, Kurla (West),
Mumbai - 400 070, Maharashtra, India
T: +91 22 66617272
Ketal Sheth
Cyber Security - Solution Architect
ketal.sheth@agcnetworks.com
T: +91 9833537390
E: info@agcnetworks.com | W: www.agcnetworks.com
GLOBAL FOOTPRINT
ABOUT AGC
Global & India HQ
US HQ
AUSTRALIA
- Melbourne
- Sydney
NORTH AMERICA
Dallas
- Florida
- Minneapolis
- Philadelphia
KENYA
- Nairobi
ETHIOPIA
RWANDA
NIGERIA
SOUTH AFRICA
PHILIPPINES
- Manila
NEW ZEALAND
- Auckland
SAUDI ARABIA
- Riyadh
UAE
- Dubai
INDIA
> Mumbai
- Bangalore
- Chennai
- Gandhinagar
- Gurgaon
- Hyderabad
- Kolkata
- Pune
SINGAPORE
UK
- London
AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified
Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise
Applications to evolve the customer’s digital landscape.
AGC’s ability to tailor solutions across quadrants is strengthened through delivery of
seamless customer support services.
A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North
America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers.
In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and
Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating
customers’ business.

CYBER-i Corporate Dossier

  • 1.
  • 2.
    AGC Networks isa leading Global Solution Integrator. AGC delivers customized business solutions that help organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve employee productivity by embedding Communications and securing their business processes. AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica, UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision, global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger client base for AGC. 2 FIREWALL SPYWARE PASSWORD UPDATE VIRUS PHISING HACKER SPAM IDENTITY INTERNET AGC Quadrants CORPORATE INFORMATION ● IP Communications ● Collaboration ● Contact Center ● Multimedia Integration Unified Communications Network Infrastructure & Data Center ● UC Applications ● IoT ● Digital Applications ● CRM & ERP Integration Enterprise ApplicationsCyber Security ( ) ● Switching & Routing ● Wireless & Mobility ● Virtualization ● Data Center ● Audit & Risk Assessment ● Certification ● Application & Data Security ● SIEM & SCADA Capability
  • 3.
    3 CYBER-i Managed SecurityServices Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable. Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business. Do Security Your Way AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install, configure and tune your solutions so that it can be controlled internally or managing a complete program for your organization. Elevate Your Security Posture Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware and more. Drive Intelligence Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today. Trustwave performs threat research and analysis that can help you better understand, detect and prevent security breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global Threat Database. Expert Support Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals. All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE, etc. All of our security analysts have real-world network security experience which they leverage to fully investigate and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct their duties with a singular purpose, to safeguard your IT environment. As part of Get Sustainable We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view your programs in real-time, access all your managed services, make support requests, see event history, run reports and manage your account, all through one easy-to use dashboard. CUSTOM MANAGED SERVICES CYBER-i helps augment your security strategy in key areas to help you evolve processes, elevate data protection or advance the way you manage threats. With deep security expertise and unmatched global threat intelligence, we can design a program that supports your specific needs, while giving you complete visibility and control. PACKAGED MSS BUNDLES Simplify your security program, operationalize your expenses and keep your team focused on business priorities. With packaged solution bundles, expert management and automated tools, we remove the day-to-day complexity of compliance and data protection, so you can get back to what you’re passionate about – your business.
  • 4.
    MANAGED SECURITY SERVICESMANAGEDSECURITY SERVICES SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident Management Alert & Notification I CXO Report I Compliance Report Security Solution Monitoring (On-site / Remote) Policy Management I Change Management I Configuration Management I Signature Updates Device Fine Tuning I Version Upgrade I Reporting Security Solution Management (On-site / Remote) Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature Updates I Compliance Management Deviation Reporting I Uniform Policy Management I Configuration Management Managed Endpoint Security Services Web Application Malware Monitoring I Web Application Malware I Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware 4
  • 5.
    5 SERVICES PORTFOLIO SOLUTION PORTFOLIO CYBER-i SOLUTIONSPortfolio Data Security • Advanced Threat Protection • Information Rights Management • Mobile Device Management • Vulnerability Management Application Security • Web Application Firewall • Database Access Management Advance Security • Network Immune System • ICS Security Identity & Access • Two Factor Authentication • Privilege Identity Management End Point Security • Antivirus, End Point Protection Network Security • Firewall • NG Firewall • IPS • UTM • Enterprise Security • IOT Security • Cloud Security Security Monitoring • SIEM • Data Leakage Protection • Network Access Control Audit • Vulnerability Assessment • Penetration Testing • Network Audits & Assessment, Security Audit • Application Audits & Source Code Review • Internal Audits • Digital Forensics Management • Compliance Mgmt • Security Operations Center Management • Vulnerability Management • Security Solutions Implementation & Management • Staff Augmentation Implementation • SIEM • APT • DLP • NAC • Bandwidth Management & WAN Accelerator • Wireless Security • Risk Management Compliance Tool CYBER-i SERVICES Portfolio Compliance • HIPAA • SOC 2 • Data Privacy • COBIT / ITIL Framework Certifications • ISO 9001 • ISO 20000 • ISO 22301 • ISO 27001 • PCI DSS • PA DSS
  • 6.
    CYBER-i has apool of competent consultants in each of the areas of Governance, Risk and Compliance, Information Security Management, Service Management & Business Continuity Management, Product Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking assignments in the field of Security. • Consultants possess the contemporary best industry recognized certifications such as: - Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001, 20000, 22301 and 27001) - Technical (CEGIT, CEH, OCSP) - Various Vendor Certifications - PMP© • Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering, Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises. • Consultants have vast experience in implementing the management system frameworks, governance frameworks & maturity models as well as auditing the same. • Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of which provides a thorough understanding of our clients’ needs. • Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure Software Development, Access Control, etc. which matters while assessing, discovering and providing solutions. • Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right choice. CORE COMPETENCIES AGC CYBER-i SKILL MATRIX 6 ISO 27001 BS 25999 ISO 20000 SOX COBIT HIPAA PCI DSS SAS 70 Data Privacy ISO 9001 ISO 38500 OHSAS 18001 ISO 14001 4% 22% 14% 18% 4% 2% 9% 9% 3% 9% 2% 2% 2%
  • 7.
    CYBER-i strives tobe a vendor agonistic security partner for our clients. However, to meet the operational requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading partners include the following: 7 ASSOCIATIONS OEM PARTNERSHIPS • Vast experience of cross functional domains • Experience to handle very complex and large projects • Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the relevant qualifications and industry experience • An ISO 9001, SOC2 Type I and ISO 27001 certified company • Close association with the ISACA (USA) Pune and Mumbai chapters • Strong association with DSCI (Data Security Council of India) • Work closely with international management system certification bodies such as TUV (Germany), DNV (Norway) and BSI (UK) • Empaneled with Computer Emergency Response Team (India) as information security auditing organization OUR DIFFERENTIATORS
  • 8.
  • 9.
    9 This is confidentialand proprietary information of AGC Networks Ltd. Contact Us AGC Networks Ltd. Equinox Business Park, Tower 1, Off BKC, LBS Marg, Kurla (West), Mumbai - 400 070, Maharashtra, India T: +91 22 66617272 Ketal Sheth Cyber Security - Solution Architect ketal.sheth@agcnetworks.com T: +91 9833537390 E: info@agcnetworks.com | W: www.agcnetworks.com GLOBAL FOOTPRINT ABOUT AGC Global & India HQ US HQ AUSTRALIA - Melbourne - Sydney NORTH AMERICA Dallas - Florida - Minneapolis - Philadelphia KENYA - Nairobi ETHIOPIA RWANDA NIGERIA SOUTH AFRICA PHILIPPINES - Manila NEW ZEALAND - Auckland SAUDI ARABIA - Riyadh UAE - Dubai INDIA > Mumbai - Bangalore - Chennai - Gandhinagar - Gurgaon - Hyderabad - Kolkata - Pune SINGAPORE UK - London AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise Applications to evolve the customer’s digital landscape. AGC’s ability to tailor solutions across quadrants is strengthened through delivery of seamless customer support services. A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers. In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating customers’ business.