SlideShare a Scribd company logo
www.nexagate.com
Company Profile
PUBLIC
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Introduction
Company Background
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Risk & Compliance
Establish & Improve
Security Processes
Audit & Testing
Assess & Test
against
Cyber Threats
Managed Protection
Defend & Protect
Against Cyber Threats
Project Secured
400+
Client Base
300+
Excellence in end to end
Cyber Security solution
Established Since
2010
10 years and growing
strong
Manpower
50
Members and
growing
Global Certification
ISO/IEC 27001
CREST
Critical projects
secured & delivered
Singapore
Indonesia
Malaysia
Laos
Meet Nexagate
Your Trusted Cybersecurity Partner
Philippines
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Leadership Team
Khairil Effendy
Managing Director
MSc Comm Eng (Manchester, UK)
CCNP/A, CCDP/A, JNCIA,
ITIL, CCRSSS
Chief Security & Risk Consulting
Benyazwar Mohmd
MSc Comm Eng (Manchester,
UK) ISMS/ISO27001 Certified
Lead Auditor
Tuan Faisal Azmy
Chief Marketing Officer
M. Sc Business Information
Technology (Manchester, UK)
Khairul Naim
Deputy Managing Director
& Chief Security & Strategy
BEng Computer Eng (MMU) CISSP,
GIAC HTQ, JNCIA, ITIL
ISMS/ISO27001 Certified Lead Auditor
Norzakimi Zahari
Chief Technology Officer
BSC Computer Science (UTM)
CISSP, PMP, ISMS/ISO27001
Certified Lead Auditor
Nur Aisyah
Chief Human Capital Officer
BMM (hons) Media Innovation and
Management,
Multimedia University
Ahmad Tarmizi
Chief Product Officer
BMM (Hons) Interface Design
Multimedia University
Chief of Managed Security
Suziyanti Shahrudin
BEng Computer Eng (MMU)
ISMS/ISO27001 Certified Lead Auditor
Great Leaders Make Great Teams
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Industry Recognitions
Credentials and Certifications
MSC Status Company in the field of
Global Business Services since 2013
MSC Status Company
Certified Information Security Management
System (ISMS) ISO 27001 since 2012.
Certified ISMS / ISO27001
Featured by Frost & Sullivan Cyber Security Case Studies for our industry-leading
Managed Web Security Services
Featured by Frost & Sullivan
Among only 5 local companies that have been certified
by CSM for Penetration Testing Service Providers
Cyber Security Malaysia (CSM)
PTSP-certified
Listed as Top 25 Cyber Security Technology Companies in Asia Pacific by
APAC CIO Outlook for 2017
Top APAC
Cyber Security Company
Recognised by an international accreditation
organisation in providing penetration testing
Certified CREST in Penetration Testing
Top 3 local companies that have won in
the inaugural Cyber100 Competition
Top 3 Cyber100 Innovation
Challenge 2020
Winner of for the Cybersecurity - Computer Software
Category for delivering technology excellence via NSI
Malaysia Technology
Excellence Awards 2021
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Banks/FSI
Various
Government
Telco/SP
Major Clients
Major Clients Trust Our Services
Our Solutions
Excellence in cyber security experience
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Focusing on the Customer Experience Journey
Our Solutions
SECURITY RISK &
COMPLIANCE
Information Security / ISMS Consulting
Data Leak Protection (DLP) Consulting
RMIT Cyber Risk Consulting
Business Continuity / BCM Consulting
IT Service Management / ITSM Consulting
SECURITY TESTING &
ASSESSMENT
Security Posture Assessment (SPA)
Security Penetration Test
IOT & Cloud Security Assessment
Red Teaming Security Test
Secure Code Review
MANAGED SECURITY
PROTECTION
Managed Threat Detection & Response
Managed Web Security / WAF
Managed Data Leak Protection (DLP)
Managed Endpoint Security, EDR & APT
Managed Cloud & IOT Security
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Getting certified with Relevant International Standards
Risk & Compliance
Nexagate ’5I’ Compliance Journey
Certification Benefit
Reduce Cost
By mitigating security breach and incidents,
the costs associated with loss of business
decrease as well.
Standard & Regulatory Compliance
Helps clients to meet regulatory compliance
requirements and enables more informed
decision-making.
Increase Assurance
Provide assurance to employees and
stakeholders to serve as a guarantee of
the effectiveness of the effort to secure
organization at all levels
Consultation
End-to-end solution
to certification
Workshop
Preparing your internal
Team for the certification
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Web & Mobile Application Security
Test
External Penetration Test
Internal Penetration Test
Host Assessment (System Level)
Host Assessment (Application Level)
Physical Security Assessment
Wireless Penetration Test
Network Architecture Review
Information Security Policy Review
Nexagate Comprehensive Security Testing Services
Strengthen your cyber security health with a Security Posture Assessment
Audit & Testing
Cloud Security Penetration Test
IOT Security Penetration Test
Red Team Assessment
Secure Code Review
Security Device Testing
IPv6 Readiness Assessment
Network Performance Assessment
Web / Mobile Application Load Test & Stress
Test
Data Loss Risk Assessment
Nexagate ADVANCED Security Testing Services
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Monitoring and Managing our Clients’ Critical Assets
Managed Security Protection
Web Security
Email Security
Mobile App Security
NAC
DDoS Protection
Network APT
SIEM / LMS
Server & Endpoint APT
Malware Protection
Application Endpoint
Network
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Unified Threat Management
Providing clients with Leading Technology Solutions
Our Technology Partners
Solution &
Technology
Partners
Endpoint Protection, Detection & Response
Advance Persistent Threat
Security Incident & Event Management
Data Leak Protection
Mobile Application Protection
Web Application Firewall. DDOS Protection
Identity & Access Management
Phishing Simulation & eLearning
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Threat Management * Security Operations Center * Security Lab
NEXA Cyber Fusion Center
24 x 7 Incident Response 40+ Customers
20+ Security Analysts /
Consultants
Launched 2018
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Threat
Manager
Asset Discovery &
Threat Management
Protection
Manager
Cloud-based
Security Protection
Compliance
Manager
One App to Manage All Cybersecurity Needs
Establish Process &
Create Awareness
Cloud | Pay per Use | Fully Managed
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
Protection
Manager
Threat
Manager
Compliance
Manager
Unified Security Management
Implementation
Tracking
ISMS
Dashboar
d
Document
Management
Incident & Change
Management
NSI for Enterprise
Ensuring effectiveness of security practices and solutions
Vulnerability
Scanning*
Asset
Discovery
Vulnerability
Report
Asset & Threat
Dashboard
Web
Security
DDoS
Protection
Protection
Dashboard
Endpoint
Protection
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
How NSI Helps Large Enterprises Improve Cybersecurity
Complete Cybersecurity Visibility
Establish Processes & Create Awareness
Knowing your Assets & Threats
Ensure Right Protection
© 2021 Nexagate Sdn Bhd. All Rights Reserved
© 2021 Nexagate Sdn Bhd. All Rights Reserved
How NSI Helps SMEs Improve Cybersecurity
Simplifying Cybersecurity
Establish Processes & Create Awareness
Knowing your Assets & Threats
Ensure Right Protection
© 2021 Nexagate Sdn Bhd. All Rights Reserved
THANK YOU
Contact Us
B02-D-13A-1, Menara 3,
Boutique Office 2,
KL Eco City, Jalan Bangsar
59200 Kuala Lumpur.
Nexagate Sdn Bhd
sales@nexagate.com +6 03 2935 9363
facebook.com/nexagate
www.nexagate.com
linkedin.com/company/nexagate twitter.com/nexagate
We would like to hear from you!
© 2021 Nexagate Sdn Bhd. All Rights Reserved

More Related Content

What's hot

Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
Amazon Web Services
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
Setu Parimi
 
DevOps Powerpoint Presentation Slides
DevOps Powerpoint Presentation SlidesDevOps Powerpoint Presentation Slides
DevOps Powerpoint Presentation Slides
SlideTeam
 
AWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS CloudAWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS Cloud
Amazon Web Services
 
Gartner - The art of the one page strategy
Gartner - The art of the one page strategyGartner - The art of the one page strategy
Gartner - The art of the one page strategy
Deepak Kamboj
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
Amazon Web Services
 
CI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
CI/CD Pipeline Security: Advanced Continuous Delivery RecommendationsCI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
CI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
Amazon Web Services
 
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
Amazon Web Services
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
Okta-Inc
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
Building your Cloud Strategy
Building your Cloud StrategyBuilding your Cloud Strategy
Building your Cloud Strategy
Amazon Web Services
 
Efficient API delivery with APIOps
Efficient API delivery with APIOpsEfficient API delivery with APIOps
Efficient API delivery with APIOps
Sven Bernhardt
 
AWS business essentials
AWS business essentials AWS business essentials
AWS business essentials
Amazon Web Services
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Jeff Williams
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
Amazon Web Services
 
Devops maturity model
Devops maturity modelDevops maturity model
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Tom Stiehm
 
Clean Infrastructure as Code
Clean Infrastructure as Code Clean Infrastructure as Code
Clean Infrastructure as Code
QAware GmbH
 
DevOps adoption in the enterprise
DevOps adoption in the enterpriseDevOps adoption in the enterprise
DevOps adoption in the enterprise
Sanjeev Sharma
 
The Enterprise Journey to AWS with Accenture
The Enterprise Journey to AWS with AccentureThe Enterprise Journey to AWS with Accenture
The Enterprise Journey to AWS with Accenture
Amazon Web Services
 

What's hot (20)

Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevOps Powerpoint Presentation Slides
DevOps Powerpoint Presentation SlidesDevOps Powerpoint Presentation Slides
DevOps Powerpoint Presentation Slides
 
AWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS CloudAWS Partner Webcast - Data Center Migration to the AWS Cloud
AWS Partner Webcast - Data Center Migration to the AWS Cloud
 
Gartner - The art of the one page strategy
Gartner - The art of the one page strategyGartner - The art of the one page strategy
Gartner - The art of the one page strategy
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
 
CI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
CI/CD Pipeline Security: Advanced Continuous Delivery RecommendationsCI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
CI/CD Pipeline Security: Advanced Continuous Delivery Recommendations
 
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
Case Study: How Hulu reinvented television using the AWS Cloud - CTD302 - re:...
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Building your Cloud Strategy
Building your Cloud StrategyBuilding your Cloud Strategy
Building your Cloud Strategy
 
Efficient API delivery with APIOps
Efficient API delivery with APIOpsEfficient API delivery with APIOps
Efficient API delivery with APIOps
 
AWS business essentials
AWS business essentials AWS business essentials
AWS business essentials
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Devops maturity model
Devops maturity modelDevops maturity model
Devops maturity model
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
 
Clean Infrastructure as Code
Clean Infrastructure as Code Clean Infrastructure as Code
Clean Infrastructure as Code
 
DevOps adoption in the enterprise
DevOps adoption in the enterpriseDevOps adoption in the enterprise
DevOps adoption in the enterprise
 
The Enterprise Journey to AWS with Accenture
The Enterprise Journey to AWS with AccentureThe Enterprise Journey to AWS with Accenture
The Enterprise Journey to AWS with Accenture
 

Similar to Nexagate corporate profile 2021

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
Softwide Security
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
Iwan Setiawan
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
keshavsecurium
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
keshavsecurium
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
 
Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)
.ιlι..ιlι.Naeem Ahmad.ιlι..ιlι.
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium Solutions
Securium solutions
 
DVCOM
DVCOMDVCOM
DVCOM
dvcom2
 
DVCOM
DVCOMDVCOM
DVCOM
dvcom2
 
Securely Setting Information Night: A dive
Securely Setting Information Night: A diveSecurely Setting Information Night: A dive
Securely Setting Information Night: A dive
acesleipnir
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISAIshita Kundu
 
Secured Technology Platform Provider in Enterprise IT
Secured Technology Platform Provider in Enterprise IT Secured Technology Platform Provider in Enterprise IT
Secured Technology Platform Provider in Enterprise IT
WIKI LABS SDN BHD
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
rebsec solutions
rebsec solutionsrebsec solutions
rebsec solutions
rebsecsolutions
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Adrian Hall
 

Similar to Nexagate corporate profile 2021 (20)

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)Resume (CV) Naeem Ahmad (Sales Manager)
Resume (CV) Naeem Ahmad (Sales Manager)
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium Solutions
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 
Securely Setting Information Night: A dive
Securely Setting Information Night: A diveSecurely Setting Information Night: A dive
Securely Setting Information Night: A dive
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 
Secured Technology Platform Provider in Enterprise IT
Secured Technology Platform Provider in Enterprise IT Secured Technology Platform Provider in Enterprise IT
Secured Technology Platform Provider in Enterprise IT
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
rebsec solutions
rebsec solutionsrebsec solutions
rebsec solutions
 
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Nexagate corporate profile 2021

  • 1. www.nexagate.com Company Profile PUBLIC © 2021 Nexagate Sdn Bhd. All Rights Reserved
  • 2. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Introduction Company Background © 2021 Nexagate Sdn Bhd. All Rights Reserved
  • 3. © 2021 Nexagate Sdn Bhd. All Rights Reserved Risk & Compliance Establish & Improve Security Processes Audit & Testing Assess & Test against Cyber Threats Managed Protection Defend & Protect Against Cyber Threats Project Secured 400+ Client Base 300+ Excellence in end to end Cyber Security solution Established Since 2010 10 years and growing strong Manpower 50 Members and growing Global Certification ISO/IEC 27001 CREST Critical projects secured & delivered Singapore Indonesia Malaysia Laos Meet Nexagate Your Trusted Cybersecurity Partner Philippines
  • 4. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Leadership Team Khairil Effendy Managing Director MSc Comm Eng (Manchester, UK) CCNP/A, CCDP/A, JNCIA, ITIL, CCRSSS Chief Security & Risk Consulting Benyazwar Mohmd MSc Comm Eng (Manchester, UK) ISMS/ISO27001 Certified Lead Auditor Tuan Faisal Azmy Chief Marketing Officer M. Sc Business Information Technology (Manchester, UK) Khairul Naim Deputy Managing Director & Chief Security & Strategy BEng Computer Eng (MMU) CISSP, GIAC HTQ, JNCIA, ITIL ISMS/ISO27001 Certified Lead Auditor Norzakimi Zahari Chief Technology Officer BSC Computer Science (UTM) CISSP, PMP, ISMS/ISO27001 Certified Lead Auditor Nur Aisyah Chief Human Capital Officer BMM (hons) Media Innovation and Management, Multimedia University Ahmad Tarmizi Chief Product Officer BMM (Hons) Interface Design Multimedia University Chief of Managed Security Suziyanti Shahrudin BEng Computer Eng (MMU) ISMS/ISO27001 Certified Lead Auditor Great Leaders Make Great Teams
  • 5. © 2021 Nexagate Sdn Bhd. All Rights Reserved Industry Recognitions Credentials and Certifications MSC Status Company in the field of Global Business Services since 2013 MSC Status Company Certified Information Security Management System (ISMS) ISO 27001 since 2012. Certified ISMS / ISO27001 Featured by Frost & Sullivan Cyber Security Case Studies for our industry-leading Managed Web Security Services Featured by Frost & Sullivan Among only 5 local companies that have been certified by CSM for Penetration Testing Service Providers Cyber Security Malaysia (CSM) PTSP-certified Listed as Top 25 Cyber Security Technology Companies in Asia Pacific by APAC CIO Outlook for 2017 Top APAC Cyber Security Company Recognised by an international accreditation organisation in providing penetration testing Certified CREST in Penetration Testing Top 3 local companies that have won in the inaugural Cyber100 Competition Top 3 Cyber100 Innovation Challenge 2020 Winner of for the Cybersecurity - Computer Software Category for delivering technology excellence via NSI Malaysia Technology Excellence Awards 2021
  • 6. © 2021 Nexagate Sdn Bhd. All Rights Reserved Banks/FSI Various Government Telco/SP Major Clients Major Clients Trust Our Services
  • 7. Our Solutions Excellence in cyber security experience © 2021 Nexagate Sdn Bhd. All Rights Reserved
  • 8. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Focusing on the Customer Experience Journey Our Solutions SECURITY RISK & COMPLIANCE Information Security / ISMS Consulting Data Leak Protection (DLP) Consulting RMIT Cyber Risk Consulting Business Continuity / BCM Consulting IT Service Management / ITSM Consulting SECURITY TESTING & ASSESSMENT Security Posture Assessment (SPA) Security Penetration Test IOT & Cloud Security Assessment Red Teaming Security Test Secure Code Review MANAGED SECURITY PROTECTION Managed Threat Detection & Response Managed Web Security / WAF Managed Data Leak Protection (DLP) Managed Endpoint Security, EDR & APT Managed Cloud & IOT Security
  • 9. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Getting certified with Relevant International Standards Risk & Compliance Nexagate ’5I’ Compliance Journey Certification Benefit Reduce Cost By mitigating security breach and incidents, the costs associated with loss of business decrease as well. Standard & Regulatory Compliance Helps clients to meet regulatory compliance requirements and enables more informed decision-making. Increase Assurance Provide assurance to employees and stakeholders to serve as a guarantee of the effectiveness of the effort to secure organization at all levels Consultation End-to-end solution to certification Workshop Preparing your internal Team for the certification
  • 10. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Web & Mobile Application Security Test External Penetration Test Internal Penetration Test Host Assessment (System Level) Host Assessment (Application Level) Physical Security Assessment Wireless Penetration Test Network Architecture Review Information Security Policy Review Nexagate Comprehensive Security Testing Services Strengthen your cyber security health with a Security Posture Assessment Audit & Testing Cloud Security Penetration Test IOT Security Penetration Test Red Team Assessment Secure Code Review Security Device Testing IPv6 Readiness Assessment Network Performance Assessment Web / Mobile Application Load Test & Stress Test Data Loss Risk Assessment Nexagate ADVANCED Security Testing Services
  • 11. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Monitoring and Managing our Clients’ Critical Assets Managed Security Protection Web Security Email Security Mobile App Security NAC DDoS Protection Network APT SIEM / LMS Server & Endpoint APT Malware Protection Application Endpoint Network
  • 12. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Unified Threat Management Providing clients with Leading Technology Solutions Our Technology Partners Solution & Technology Partners Endpoint Protection, Detection & Response Advance Persistent Threat Security Incident & Event Management Data Leak Protection Mobile Application Protection Web Application Firewall. DDOS Protection Identity & Access Management Phishing Simulation & eLearning
  • 13. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Threat Management * Security Operations Center * Security Lab NEXA Cyber Fusion Center 24 x 7 Incident Response 40+ Customers 20+ Security Analysts / Consultants Launched 2018
  • 14. © 2021 Nexagate Sdn Bhd. All Rights Reserved
  • 15. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Threat Manager Asset Discovery & Threat Management Protection Manager Cloud-based Security Protection Compliance Manager One App to Manage All Cybersecurity Needs Establish Process & Create Awareness Cloud | Pay per Use | Fully Managed
  • 16. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved Protection Manager Threat Manager Compliance Manager Unified Security Management Implementation Tracking ISMS Dashboar d Document Management Incident & Change Management NSI for Enterprise Ensuring effectiveness of security practices and solutions Vulnerability Scanning* Asset Discovery Vulnerability Report Asset & Threat Dashboard Web Security DDoS Protection Protection Dashboard Endpoint Protection
  • 17. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved How NSI Helps Large Enterprises Improve Cybersecurity Complete Cybersecurity Visibility Establish Processes & Create Awareness Knowing your Assets & Threats Ensure Right Protection
  • 18. © 2021 Nexagate Sdn Bhd. All Rights Reserved © 2021 Nexagate Sdn Bhd. All Rights Reserved How NSI Helps SMEs Improve Cybersecurity Simplifying Cybersecurity Establish Processes & Create Awareness Knowing your Assets & Threats Ensure Right Protection
  • 19. © 2021 Nexagate Sdn Bhd. All Rights Reserved THANK YOU
  • 20. Contact Us B02-D-13A-1, Menara 3, Boutique Office 2, KL Eco City, Jalan Bangsar 59200 Kuala Lumpur. Nexagate Sdn Bhd sales@nexagate.com +6 03 2935 9363 facebook.com/nexagate www.nexagate.com linkedin.com/company/nexagate twitter.com/nexagate We would like to hear from you! © 2021 Nexagate Sdn Bhd. All Rights Reserved