Derbycon 2019 - I simulate therefore i catch: enhancing detection engineering...Mauricio Velazco
https://www.youtube.com/watch?v=7TVp4g4hkpg
Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection & response capabilities has proven to be a step in the right direction. However, without the telemetry produced by adversary behavior, building new and testing existing detection capabilities will be constrained. Executing adversary simulations in monitored environments produces the telemetry that allows blue teams to identify gaps in visibility as well as build, test and enhance detection analytics.This presentation will describe a methodology to incorporate adversary simulation into detection programs as well as release a tool blue teams can use to test the resilience of detection controls
BSIMM-V: The Building Security In Maturity ModelCigital
The document describes the Building Security In Maturity Model (BSIMM), which is a descriptive model for measuring software security practices. It provides an overview of BSIMM, including that it is based on data from 67 organizations and contains 161 distinct security measurements across 4 domains and 12 practices. It also discusses how BSIMM can be used as a benchmark to track security improvements over time and compare organizations.
The document discusses adversary emulation and red teaming. It defines red teaming as emulating advanced persistent threat (APT) attacks. It describes APT groups and their goals of espionage and sabotage. Common APT groups and their targeted industries are listed. Methodologies for red teaming like MITRE ATT&CK and the cyber kill chain are explained. The differences between penetration testing and red teaming are outlined. Tools and platforms for adversary emulation like Cobalt Strike and Atomic Red Team are provided. The average costs of data breaches are cited from an IBM report. Defeating APT attacks is discussed as understanding enemies, continuous practice, and implementing security in depth.
How to prepare for the CISSP Exam. A presentation created by the (ISC)2 Hellenic Chapter to assist and instruct those in Greece interested in pursuing the CISSP Certification.
The (ISC)2 Hellenic Chapter Team
Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations) “Registered Company...Sarkar Office Japan KK
Sample of “Registered Company Seal (stamp) Certificate” of Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations).
In Japan normal practice is to use the registered company seal for endorsing official company agreement etc.
Company bank account has been also opened & operated using the registered company seal. At the time of opening the company bank a/c both Original seal & seal certificate (issued within 3/6 months [depending on the bank] is required. For operating the bank a/c over the bank counter the authorized person of the company need to carry the “original seal” every time.
Minimum requirement for establishing a subsidiary co in Japan is to have a local physical address (not PO Box) and a local resident in Japan.
[Please note effective Mar’15 the Japanese government has allowed foreign company and or individual to register Japanese KK Company with director(s) and shareholders residing abroad and the mandatory requirement of at least one local Resident Director has been relaxed!]
The said sample “Registered Company Seal (stamp) Certificate” of Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations) has been opened with a local resident direct who is also registered as “Representative Director” of the company.
Disclaimer: This information is for illustration purpose, no warranty is given that it is free from error or omission, and Sarkar Office® cannot be held liable for any decision made based on this information only!.
Patch management is critical to reducing your attack surface and keeping your endpoints and business running smoothly. Unfortunately, it's also a process that must be repeated weekly, monthly, quarterly, and whenever critical fixes have been identified for your environment. The good news is: with the right tools and some advance planning, this process can run smoothly and leave your IT team with more time to support core business goals.
Join us to learn about trends in patch management, including the latest ways Ivanti is helping Security and IT teams work together like a well-oiled machine.
UiPath Insights is an RPA analytics solution that enables the business to track, measure, and manage the performance of the entire automation program. We will be exploring how to create an insight data model with UiPath templates and custom data. 🚀
📕 Agenda:
Demonstrating how to interact with the Insights portal and use default dashboards
Overview on different tabs (My Dashboards, Tenant and UiPath Templates)
Overview on four default Templates
Demonstrating how to customize dashboards and configure custom data into Insights
Copy the default dashboard and create your own
Custom Fields
Demonstrating how to create and manage alerts in Insights
How to Create Alerts
Scheduling the delivery
Download the Data to CSV or Exporting without affecting the current dashboard
👨🏽🏫 Speaker:
Jithin Bhaskaran, RPA Solution Architect, Lead Consultant and Developer
This document provides a summary of Adarsh H's professional experience and qualifications. It includes information on his educational background such as a Bachelor's degree in Computer Science and Engineering and an MBA in Information Technology. It also lists his professional experience of over 6 years working in IT security compliance and risk assessment roles for organizations like FireEye Cybersecurity and Fidelity Information Services. His responsibilities have included conducting network audits, risk assessments, information security awareness training, and ensuring compliance with ISO security standards like ISO 27001. The document details his technical skills and certification preparations in areas like ethical hacking, Cisco networking, and ISACA's CISA certification.
Derbycon 2019 - I simulate therefore i catch: enhancing detection engineering...Mauricio Velazco
https://www.youtube.com/watch?v=7TVp4g4hkpg
Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection & response capabilities has proven to be a step in the right direction. However, without the telemetry produced by adversary behavior, building new and testing existing detection capabilities will be constrained. Executing adversary simulations in monitored environments produces the telemetry that allows blue teams to identify gaps in visibility as well as build, test and enhance detection analytics.This presentation will describe a methodology to incorporate adversary simulation into detection programs as well as release a tool blue teams can use to test the resilience of detection controls
BSIMM-V: The Building Security In Maturity ModelCigital
The document describes the Building Security In Maturity Model (BSIMM), which is a descriptive model for measuring software security practices. It provides an overview of BSIMM, including that it is based on data from 67 organizations and contains 161 distinct security measurements across 4 domains and 12 practices. It also discusses how BSIMM can be used as a benchmark to track security improvements over time and compare organizations.
The document discusses adversary emulation and red teaming. It defines red teaming as emulating advanced persistent threat (APT) attacks. It describes APT groups and their goals of espionage and sabotage. Common APT groups and their targeted industries are listed. Methodologies for red teaming like MITRE ATT&CK and the cyber kill chain are explained. The differences between penetration testing and red teaming are outlined. Tools and platforms for adversary emulation like Cobalt Strike and Atomic Red Team are provided. The average costs of data breaches are cited from an IBM report. Defeating APT attacks is discussed as understanding enemies, continuous practice, and implementing security in depth.
How to prepare for the CISSP Exam. A presentation created by the (ISC)2 Hellenic Chapter to assist and instruct those in Greece interested in pursuing the CISSP Certification.
The (ISC)2 Hellenic Chapter Team
Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations) “Registered Company...Sarkar Office Japan KK
Sample of “Registered Company Seal (stamp) Certificate” of Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations).
In Japan normal practice is to use the registered company seal for endorsing official company agreement etc.
Company bank account has been also opened & operated using the registered company seal. At the time of opening the company bank a/c both Original seal & seal certificate (issued within 3/6 months [depending on the bank] is required. For operating the bank a/c over the bank counter the authorized person of the company need to carry the “original seal” every time.
Minimum requirement for establishing a subsidiary co in Japan is to have a local physical address (not PO Box) and a local resident in Japan.
[Please note effective Mar’15 the Japanese government has allowed foreign company and or individual to register Japanese KK Company with director(s) and shareholders residing abroad and the mandatory requirement of at least one local Resident Director has been relaxed!]
The said sample “Registered Company Seal (stamp) Certificate” of Japan Kabushiki-Kaisha [KK Co] (joint-stock corporations) has been opened with a local resident direct who is also registered as “Representative Director” of the company.
Disclaimer: This information is for illustration purpose, no warranty is given that it is free from error or omission, and Sarkar Office® cannot be held liable for any decision made based on this information only!.
Patch management is critical to reducing your attack surface and keeping your endpoints and business running smoothly. Unfortunately, it's also a process that must be repeated weekly, monthly, quarterly, and whenever critical fixes have been identified for your environment. The good news is: with the right tools and some advance planning, this process can run smoothly and leave your IT team with more time to support core business goals.
Join us to learn about trends in patch management, including the latest ways Ivanti is helping Security and IT teams work together like a well-oiled machine.
UiPath Insights is an RPA analytics solution that enables the business to track, measure, and manage the performance of the entire automation program. We will be exploring how to create an insight data model with UiPath templates and custom data. 🚀
📕 Agenda:
Demonstrating how to interact with the Insights portal and use default dashboards
Overview on different tabs (My Dashboards, Tenant and UiPath Templates)
Overview on four default Templates
Demonstrating how to customize dashboards and configure custom data into Insights
Copy the default dashboard and create your own
Custom Fields
Demonstrating how to create and manage alerts in Insights
How to Create Alerts
Scheduling the delivery
Download the Data to CSV or Exporting without affecting the current dashboard
👨🏽🏫 Speaker:
Jithin Bhaskaran, RPA Solution Architect, Lead Consultant and Developer
This document provides a summary of Adarsh H's professional experience and qualifications. It includes information on his educational background such as a Bachelor's degree in Computer Science and Engineering and an MBA in Information Technology. It also lists his professional experience of over 6 years working in IT security compliance and risk assessment roles for organizations like FireEye Cybersecurity and Fidelity Information Services. His responsibilities have included conducting network audits, risk assessments, information security awareness training, and ensuring compliance with ISO security standards like ISO 27001. The document details his technical skills and certification preparations in areas like ethical hacking, Cisco networking, and ISACA's CISA certification.
This document summarizes Microsoft products and technologies including its service-oriented architecture, web services, Windows Communication Foundation, Windows Workflow Foundation, BizTalk Server, Office SharePoint Server, SQL Server, business intelligence solutions including dashboards and reporting, and Microsoft Dynamics solutions for CRM, SCM, and ERP. The purpose is to provide an academic and informative benchmark of Microsoft's offerings.
The document discusses penetration testing of SAP systems. It begins with an introduction to SAP concepts like systems, instances, clients and remote function calls. It then discusses the need for penetration testing business applications due to lack of security during implementations. The document outlines the phases of SAP penetration testing: discovery to find SAP targets, exploration to gather information, and vulnerability assessment to identify security threats.
This document provides guidance on setting up a virtual machine environment for malware analysis. It recommends choosing a virtualization software like VirtualBox and installing necessary analysis tools. Key tools mentioned include debuggers like OllyDbg, decompilers, disassemblers like IDA and Ghidra, frameworks like Java and .NET, and network monitors. The document outlines best practices like taking snapshots, using host-only networking to contain malware, and automating setup with scripts. It then describes carrying out a malware analysis workflow through static analysis, dynamic analysis, and manual debugging.
Tracxn - Geo Monthly Report - Asia Tech - Dec 2021Tracxn
Check out @Tracxn's #curated latest #startup activity in #Tech rebrand.ly/sp0l33k
Subscribe for free https://rb.gy/3yuosu to access reports on your #Geography of interest, every month!
IT Security PowerPoint Presentation SlidesSlideTeam
Use IT security PowerPoint Presentation Slides to educate your audience about the cyber security. Incorporate professionally designed content-ready IT security PPT templates to showcase the techniques of protecting computers, networks, programs, and data from attacks that are aimed for exploitation. Demonstrate the preventive measures to protect information from being stolen, compromised or attacked with the help of IT security PowerPoint slideshow. Talk about various cybersecurity strategies which include identify management, risk management and incident management. This deck comprises of templates to create awareness regarding cyber security are cyber security seven preventive methods, cyber security framework, cyber security initiatives, cyber security tips, and more. Add relevant ready-to-use cyber security PPT templates to illustrate various tools such as software patches, firewalls, encryption, etc. These templates are completely editable. You can customize the template as per your convenience. Edit the color, text, icon, and font size as per your requirement. Download ready-made IT security PPT presentation to make your audience aware about the potential cyber threats. End the jitters with our It Security Powerpoint Presentation Slides. Don't give in to baseless apprehensions.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
IT infrastructure is changing and needs controls for mobile, cloud, and big data
Guardium is the leader in database and big data security
Heterogeneous support is a great asset to leverage across the infrastructure to reduce risk
Supports separation of duties
Integration with other security products
No additional training for multiple products
A short overview of the Capital One Data Breach. This presentation was a component of an online webinar for the Caribbean Developer Month 2019 hosted by the Caribbean Developers Group.
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
The document discusses incident response and handling. It outlines the incident response process including preparation, identification, containment, eradication, recovery, and lessons learned. It also discusses the attacker's methodology of reconnaissance, scanning, exploitation, keeping access, and covering tracks. An example scenario is provided where an attacker uses a 0-day exploit to infiltrate a target organization and steal intellectual property. The incident response team is then activated to contain the incident, eradicate the threat, and implement lessons learned.
A presentation on how project managers should consider cybersecurity in their project delivery activities. Delivered at the PMI-SOC Cybersecurity workshop on September 26th, 2015, in Toronto.
The document provides an overview of malware types and techniques. It discusses viruses, worms, trojans, rootkits, and other malware. It describes how malware infects systems, propagates, and hides. Historic malware examples like Morris worm, Code Red, and SQL Slammer are summarized. Methods for malware detection like signatures, heuristics, sandboxing, and network monitoring are also covered at a high level.
This document discusses static analysis techniques for testing iOS applications. It covers analyzing the app manifest file (plist) for sensitive information, checking for insecure data storage in databases and the keychain, verifying code signatures, and dumping runtime memory. The document provides examples of using tools like MobSF, otool, and objection to extract plaintext passwords and other data from test apps.
The document discusses the OWASP Top Ten project, which identifies the 10 most critical web application security risks. It provides an overview of OWASP, describes the Top 10 risks from 2013 and 2017, and explains changes between the two versions. For each risk, it gives a brief example and recommendations for prevention. The key topics covered are injection, broken authentication, sensitive data exposure, XML external entities, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, use of vulnerable components, and insufficient logging/monitoring.
OWASP Top 10 - The Ten Most Critical Web Application Security RisksAll Things Open
The document discusses the OWASP Top 10 list, which is periodically updated by the Open Web Application Security Project to compile the top 10 most common security vulnerabilities found in web applications. It provides details on the top vulnerabilities, including Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities, Broken Access Control, Security Misconfiguration, Cross-Site Scripting, and Insecure Deserialization. For each vulnerability, it describes examples, grading based on exploitability, prevalence and detectability, and recommendations for prevention.
Shoulder surfing resistant graphical and image based login systemAkshay Surve
This document discusses the weaknesses of text-based passwords and proposes an alternative graphical password system. It summarizes that existing login systems use usernames and passwords but are vulnerable to shoulder surfing, keyloggers, and bots. It then describes a graphical password system that displays a grid of images for the user to click in a specific pattern to log in, avoiding these threats. System requirements of the proposed graphical password system are also listed.
This document provides an overview and agenda for a presentation on ISO 27001 and information security management systems (ISMS). It introduces key terms like information security, the CIA triad of confidentiality, integrity and availability. It describes the components of an ISMS like policy, procedures, risk assessment and controls. It explains that ISO 27001 specifies requirements for establishing, implementing and maintaining an ISMS. The standard is popular because it can be used by all organizations to improve security, comply with regulations and build trust. Implementing an ISMS also increases awareness, reduces risks and justifies security spending.
Brosura Polaris Medical - Spital de recuperare ClujPolaris Medical
Brosura de prezentare a spitalului de recuperare Polaris Medical din judetul Cluj, loc. Suceagu.
Spitalul ofera servicii de recuperare medicala, cardiologica, neurologica, psihiatrie si ingrijiri paliative, dar si servicii in abulator:
- Psihologie
- Psihoterapie individuala si de grup
- Logopedie
- Evaluare si consiliere psihologica
- Ergoterapie
- Consiliere antitabac
- Consiliere dieta si nutritie
This document summarizes Microsoft products and technologies including its service-oriented architecture, web services, Windows Communication Foundation, Windows Workflow Foundation, BizTalk Server, Office SharePoint Server, SQL Server, business intelligence solutions including dashboards and reporting, and Microsoft Dynamics solutions for CRM, SCM, and ERP. The purpose is to provide an academic and informative benchmark of Microsoft's offerings.
The document discusses penetration testing of SAP systems. It begins with an introduction to SAP concepts like systems, instances, clients and remote function calls. It then discusses the need for penetration testing business applications due to lack of security during implementations. The document outlines the phases of SAP penetration testing: discovery to find SAP targets, exploration to gather information, and vulnerability assessment to identify security threats.
This document provides guidance on setting up a virtual machine environment for malware analysis. It recommends choosing a virtualization software like VirtualBox and installing necessary analysis tools. Key tools mentioned include debuggers like OllyDbg, decompilers, disassemblers like IDA and Ghidra, frameworks like Java and .NET, and network monitors. The document outlines best practices like taking snapshots, using host-only networking to contain malware, and automating setup with scripts. It then describes carrying out a malware analysis workflow through static analysis, dynamic analysis, and manual debugging.
Tracxn - Geo Monthly Report - Asia Tech - Dec 2021Tracxn
Check out @Tracxn's #curated latest #startup activity in #Tech rebrand.ly/sp0l33k
Subscribe for free https://rb.gy/3yuosu to access reports on your #Geography of interest, every month!
IT Security PowerPoint Presentation SlidesSlideTeam
Use IT security PowerPoint Presentation Slides to educate your audience about the cyber security. Incorporate professionally designed content-ready IT security PPT templates to showcase the techniques of protecting computers, networks, programs, and data from attacks that are aimed for exploitation. Demonstrate the preventive measures to protect information from being stolen, compromised or attacked with the help of IT security PowerPoint slideshow. Talk about various cybersecurity strategies which include identify management, risk management and incident management. This deck comprises of templates to create awareness regarding cyber security are cyber security seven preventive methods, cyber security framework, cyber security initiatives, cyber security tips, and more. Add relevant ready-to-use cyber security PPT templates to illustrate various tools such as software patches, firewalls, encryption, etc. These templates are completely editable. You can customize the template as per your convenience. Edit the color, text, icon, and font size as per your requirement. Download ready-made IT security PPT presentation to make your audience aware about the potential cyber threats. End the jitters with our It Security Powerpoint Presentation Slides. Don't give in to baseless apprehensions.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
IT infrastructure is changing and needs controls for mobile, cloud, and big data
Guardium is the leader in database and big data security
Heterogeneous support is a great asset to leverage across the infrastructure to reduce risk
Supports separation of duties
Integration with other security products
No additional training for multiple products
A short overview of the Capital One Data Breach. This presentation was a component of an online webinar for the Caribbean Developer Month 2019 hosted by the Caribbean Developers Group.
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
The document discusses incident response and handling. It outlines the incident response process including preparation, identification, containment, eradication, recovery, and lessons learned. It also discusses the attacker's methodology of reconnaissance, scanning, exploitation, keeping access, and covering tracks. An example scenario is provided where an attacker uses a 0-day exploit to infiltrate a target organization and steal intellectual property. The incident response team is then activated to contain the incident, eradicate the threat, and implement lessons learned.
A presentation on how project managers should consider cybersecurity in their project delivery activities. Delivered at the PMI-SOC Cybersecurity workshop on September 26th, 2015, in Toronto.
The document provides an overview of malware types and techniques. It discusses viruses, worms, trojans, rootkits, and other malware. It describes how malware infects systems, propagates, and hides. Historic malware examples like Morris worm, Code Red, and SQL Slammer are summarized. Methods for malware detection like signatures, heuristics, sandboxing, and network monitoring are also covered at a high level.
This document discusses static analysis techniques for testing iOS applications. It covers analyzing the app manifest file (plist) for sensitive information, checking for insecure data storage in databases and the keychain, verifying code signatures, and dumping runtime memory. The document provides examples of using tools like MobSF, otool, and objection to extract plaintext passwords and other data from test apps.
The document discusses the OWASP Top Ten project, which identifies the 10 most critical web application security risks. It provides an overview of OWASP, describes the Top 10 risks from 2013 and 2017, and explains changes between the two versions. For each risk, it gives a brief example and recommendations for prevention. The key topics covered are injection, broken authentication, sensitive data exposure, XML external entities, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, use of vulnerable components, and insufficient logging/monitoring.
OWASP Top 10 - The Ten Most Critical Web Application Security RisksAll Things Open
The document discusses the OWASP Top 10 list, which is periodically updated by the Open Web Application Security Project to compile the top 10 most common security vulnerabilities found in web applications. It provides details on the top vulnerabilities, including Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities, Broken Access Control, Security Misconfiguration, Cross-Site Scripting, and Insecure Deserialization. For each vulnerability, it describes examples, grading based on exploitability, prevalence and detectability, and recommendations for prevention.
Shoulder surfing resistant graphical and image based login systemAkshay Surve
This document discusses the weaknesses of text-based passwords and proposes an alternative graphical password system. It summarizes that existing login systems use usernames and passwords but are vulnerable to shoulder surfing, keyloggers, and bots. It then describes a graphical password system that displays a grid of images for the user to click in a specific pattern to log in, avoiding these threats. System requirements of the proposed graphical password system are also listed.
This document provides an overview and agenda for a presentation on ISO 27001 and information security management systems (ISMS). It introduces key terms like information security, the CIA triad of confidentiality, integrity and availability. It describes the components of an ISMS like policy, procedures, risk assessment and controls. It explains that ISO 27001 specifies requirements for establishing, implementing and maintaining an ISMS. The standard is popular because it can be used by all organizations to improve security, comply with regulations and build trust. Implementing an ISMS also increases awareness, reduces risks and justifies security spending.
Brosura Polaris Medical - Spital de recuperare ClujPolaris Medical
Brosura de prezentare a spitalului de recuperare Polaris Medical din judetul Cluj, loc. Suceagu.
Spitalul ofera servicii de recuperare medicala, cardiologica, neurologica, psihiatrie si ingrijiri paliative, dar si servicii in abulator:
- Psihologie
- Psihoterapie individuala si de grup
- Logopedie
- Evaluare si consiliere psihologica
- Ergoterapie
- Consiliere antitabac
- Consiliere dieta si nutritie
Ce poti face daca banca vinde creanta unei firme de recuperari creante?
Practica arata ca, in ultima perioada, din ce in ce mai multe persoane se
confrunta cu situatia cedarii creantelor de catre banca unor societati de
recuperare.
Mecanismul cesiunii catre SRL-ul subsidiara a bancii functioneaza conform urmatoarei scheme: banca mama declara creditul ca fiind neperformant, isi constituie provizion de risc, dar nu trece la executarea silita si nici nu il trimite in insolventa, ci vinde creanta unei filiale pe care o detine in proportie de 100% (sau unui alt SRL detinut 100% de
banca mama a bancii in cauza); vanzarea creantei catre propria filiala (adica, trecerea acesteia "intr-un buzunar intr-altul") sau catre o afiliata se face la preturi cam de 10% din valoarea nominala, pret pe care filiala/afiliata il plateste cu un credit pe care, de cele mai multe ori, i-l acorda chiar banca.
Cesiunea de creante este operatiunea prin care creditorul (cedent) transmite in mod voluntar, cu titlu oneros sau cu titlu gratuit, dreptul de creanta unei alte persoane (cesionar) care devine astfel creditor in locul sau si va putea incasa de la debitor creanta cedata.
Contabilizarea contractelor de cesiune a creantelor la cesionar (persoana care a preluat creantele) trebuie facuta in functie de clauzele specifice fiecarui contract.
ATENTIE!
In toate cazurile, daca nu s-a convenit expres asupra unei cesiuni
partiale, cesionarul devine titular al creantei pentru totalitatea ei.
Odata cu dreptul de creanta, cesionarul dobandeste, prin efectul cesiunii si in lipsa oricarei stipulatii exprese in acest sens, toate drepturile, accesoriile si garantiile de orice natura ale creantei cesionate. Daca nu s-a convenit altfel, dobanzile si orice alte venituri aferente creantei, devenite scadente, dar nepercepute inca de cedent, revin cesionarului, cu incepere de la data cesiunii.
In primul rand, trebuie facuta distinctie dupa cum creditul a fost
declarat sau nu scadent in prealabil cesiunii.
* in primul caz avem de a face cu o activitate de recuperare a unei creante realizata de o societate specializata; cel putin aparent, nimic ilegal;
* in cea de-a doua ipoteza - nu a fost declarant scadent inainte de cesiune operatiunea este flagrant si grav ilegala. Cesiunea creditelor neperformante poate fi considerata ilegala mai ales in cazul contractelor de credit de retail, in care debitorul este un consumator in raporturile cu banca, calitate pe care si-o pierde in raporturile cu colectorul de creante.
Iar in cazul cesiunii creditorului catre un SRL de recuperat creante, controlat 100% de banca mama (sau de banca-bunica, pentru a prelua o formula folosita de Adrian Vasilescu, consilierul BNR), acest SRL se erijeaza el insusi in banca, fiindca primeste prin cesiune o creanta care ramane neschimbata (in sensul ca isi pastreaza natura de creanta bancara), plus
garantiile care o insoteau.
www.coltuc.ro
avocat@coltuc.ro
0745150894
The document defines and describes various medical terms from A to Z. It provides concise explanations of common conditions, body parts, medical devices and processes. Terms covered include asthma, blood glucose meter, cavities, depression, eardrum, frostbite, gingivitis, hemangioma, influenza, junk food, ketones, lens, myopia, nits, orthodontist, polyphagia, retainer, stress, tinnitus, hives, virus, wheeze, x-ray, yawning, and zoonosis. For each term, it gives a brief, easy to understand definition in child-friendly language.
Fizica medicala este o ramura a fizicii care are ca scop pastrarea si restabilirea sanatatii umane prin utilizarea tehnologiei moderne.
Aceasta studiaza in acest scop procesele fizice ale vietii , structurile si
functiile organismului, cauzele si mecanismele de producere a bolilor
proprietatile fizice aplicate in medicina pentru diagnosticare , tratare si prevenire a bolilor.
Using Blogs for Online and Classroom Teaching discusses how blogs can be used as an educational tool. There are three main types of blogs for teaching: tutor blogs run by the teacher, class blogs for student collaboration, and learner blogs for individual or group work. Tutor blogs provide resources, links, and class updates for students. Blogs can support teaching listening, speaking, reading, writing, grammar, and pronunciation through activities like presentations, discussions, readings, and exercises. They also allow teachers to share materials and students to submit work online. Popular free blogging platforms that are easy for educators to use include Blogger, Weebly, and WordPress.
[WMD 2015] Segment >> Diana Smith, "Measuring For B2B Engagement: How To Coll...500 Startups
The document discusses best practices for collecting and tracking engagement data across devices. It recommends defining a tracking plan by selecting a naming convention based on object and action, carefully choosing 3 key events to start, and including detailed properties. The plan should focus on discover, engage and convert stages. Properties help answer questions like popular plans and month-to-month changes. Data-first approach is important to clean, consistent analytics across tools.
A&D Risk Management este o companie care furnizează servicii de evaluare a riscului de securitate fizică, conform Legii 333/2003, H.G. 301/2012 şi Instrucţiunii nr. 9/2013 a MAI - (evaluare de risc; analiza de risc).
Securitas serveste o gama larga de clienti intr-o varietate de industrii si segmente. Marimea obiectivelor clientilor nostri variaza de la "magazinul din colt" la companii importante la nivel global. Avem 300.000 de angajati in 52 de tari din America de Nord, America Latina, Asia, Orientul Mijlociu, Africa si Europa.
ADERAREA LA CERINTELE NORMEI 6/2015 ASF | Op.team AssociatesDaniela Cretu
Norma 5/2015 publicata de catre Autoritatea de Supraveghere Financiara contine un set de cerinte pentru standardizarea modului in care sunt gestionate riscurile operationale generate de sistemele informatice utilizate de catre companiile financiare si entitatile reglementate, autorizate/avizate si/sau supravegheate de ASF.
Aderarea la aceste cerinte este un proces complex, cu impact considerabil asupra companiei vizate, astfel incat colaborarea in acest sens cu parteneri specializati este o abordare recomandabila, din multiple considerente.
http://opteam.ro/consultanta/audit-de-conformitate-it-norma-62015/
Secom® isi gestioneaza stocurile cu solutiile WMS si Inventory Optimisation d...Senior Software
Secom® a implementat solutiile Inventory Optimisation si WMS de la Senior Software, cu ajutorul carora isi gestioneaza in mod integrat stocurile de marfa, fluxurile de lucru din depozit si procesele de business conexe. In 2015, compania a inregistrat o cifra de afaceri de 12,2 milioane EUR, in crestere cu 19% fata de anul anterior.
EXPERT SERVICE 24/7 este singura firmă de pe piaţa românească dedicată în totalitate serviciilor de service şi mentenanţă pentru toate categoriile de uşi: glisante automate, secţionale industriale şi rezidenţiale, rulouri, uşi rapide, ghilotine, uşi rotative, porţi, sisteme de andocare etc. cu acoperire la nivel naţional.
EXPERT SERVICE 24/7 este singura firmă de pe piaţa românească dedicată în totalitate serviciilor de service şi mentenanţă pentru toate categoriile de uşi: glisante automate, secţionale industriale şi rezidenţiale, rulouri, uşi rapide, ghilotine, uşi rotative, porţi, sisteme de andocare etc. cu acoperire la nivel naţional.
1. O.R.C. - J40/21182/2008; C.U.I. - RO 24887130
Bd. Dimitrie Pompei Nr. 10A, Conect 1, Etaj 3, Sector 2, Bucuresti
tel: 0213149015; 0212640000; 0219504
fax: 0213180098; 0213149013; 0318171116
e-mail: office@alistar-security.ro
•
DESPRE NOI
S.C. ALISTAR SECURITY S.R.L. reprezinta o societate de paza, siguranta si protectie dinamica, supla si eficienta, adaptata
evolutiilor si cerintelor curente ale pietei romanesti. Compania este condusa de o echipa manageriala care a acumulat o
indelungata si valoroasa experienta profesionala, activand in acest domeniu specializat inca din anul 1991.
Intentia si viziunea echipei manageriale plaseaza S.C. ALISTAR SECURITY S.R.L. printre cei mai performanti furnizori
privati de solutii de securitate, oferta fiind indreptata catre rezolvarea eficienta si calitativa a nevoilor si intereselor
beneficiarilor.
Societatea acopera intreaga gama de produse si servicii necesare pentru a raspunde cererilor de pe piata romaneasca,
indreptandu-se catre clienti mari, mijlocii si mici care urmaresc, cu predilectie, sa beneficieze de un mediu de securitate
sigur, fara a fi nevoiti sa angajeze pentru aceasta costuri uriase.
OBIECT DE ACTIVITATE
Activitatea principala conform codificarii (ordin 337/2007):
- Activitati de protectie si garda – 8010.
- Activitati secundare conform codificarii:
- Activitati de servicii privind sistemele de securitate – 8020;
- Alte activitati profesionale, stiintifice si tehnice (consultanta in domeniul securitatii private) - 7490.
Domenii de activitate:
1. Paza si protectia persoanelor, obiectivelor, bunurilor si valorilor si consultanta specializata in domeniu;
2. Monitorizarea sistemelor de alarma si interventia la semnalele acestora;
3. Servicii de garda de corp si consultanta specializata in domeniu;
4. Proiectarea, instalarea, intretinerea sistemelor de alarmare la efractie si incendiu, control acces si CCTV;
5. Servicii de transport bunuri si valori si consultanta specializata in domeniu.
1
ACTIVITATE DIRECTII DE ACTIUNE
- Lider national pe monitorizare-interventie cu un
portofoliu de peste 11.600 de clienti, deserviti de 173
echipaje de interventie cu acoperire nationala;
- Intre primele 5 companii de profil, detinand o cota de
piata de 5-6%;
- Peste 1.250 de angajati si puncte de lucru in toate
resedintele de judet;
- Eficienta, stabila financiar si avand costuri optimizate;
- Companie cunoscuta si de incredere la nivel national;
- Companie ce promoveaza responsabilitatea sociala.
- Orientarea ferma catre clienti si oferirea de solutii
particularizate conform nevoilor si intereselor acestora;
- Implementarea continua a tehnologiilor noi si viabile;
- Ridicarea standardelor serviciilor oferite, printr-un proces
continu de invatare si adaptare a structurilor operationale;
- Actualizarea permanenta a procedurilor de lucru;
- Specializarea inalta a personalului;
- Infiintarea a 7 centre de excelenta operationala;
- Perfectionarea tehnica permanenta a Centrului National de
Alarmare si Gestiune a evenimentelor de securitate.
DATE DE IDENTIFICARE
S.C. ALISTAR SECURITY S.R.L.
Codul Unic de Inregistrare 24887130.
Atribut RO si numar de ordine in Registrul Comertului J40/21182/2008.
Adresa: Bucureşti, Bulevardul Dimitrie Pompei Nr. 10 A, Corp CONECT 1, Et.3, Sector 2.
Telefon: 021.264.00.00/ 021.314.90.15 / 021.9504 fax: 021.318.00.98 / 021.314.90.13 / 031.817.1116
2. PUNCTELE TARI ALE COMPANIEI
- Experienta si profesionalismul echipei manageriale;
- Orientarea si deschiderea catre client si catre nevoile si interesele acestuia;
- Ritmul rapid de innoire si diversificare a serviciilor oferite;
- Adaptabilitatea companiei la cerintele si evolutiile pietei romanesti;
- Personalul foarte bine pregatit, competent si eficient;
- Raportul pret-calitate foarte competitiv;
- Capacitatea de a opera cu serviciul de monitorizare – interventie la nivel national, inclusiv in orase mici si comune;
- Structuri operative ce pot actiona in toate judetele tarii.
PERSPECTIVE
S.C. ALISTAR SECURITY S.R.L. detine un portofoliu important de clienti si lucreaza pentru dezvoltarea lui permanenta.
Intentionam sa devenim in cel mai scurt timp o companie in care oamenii isi dezvolta permanent capacitatea
profesionala, iar actiunile lor se dea rezultatele pe care le dorim cu adevarat, echipa manageriala stimuland si incurajand
modelele de gandire inovative si exploratorii.
Ne vom orienta ferm spre a deveni o companie care sa utilizeze eficient toate resursele de care dispune pentru realizarea
celor mai importante obiective, respectiv, deschiderea catre nevoile si interesele clientului si satisfacerea acestora .
Ne-am creat scopuri, politici, strategii, obiective si misiuni specifice pe care le revizuim si le adaptam permanent
evolutiilor de pe piata romaneasca si analizelor privind riscurile de securitate.
Avem in derulare programe importante ce necesita investitii mari si specializare inalta. Acestea sunt:
- dotarea permanenta a CENTRULUI NATIONAL DE ALARMARE SI GESTIUNE A EVENIMENTELOR DE SECURITATE cu
cele mai noi tehnologii in domeniu;
- dezvoltarea flotei pentru interventie din punct de vedere al marimii si al tehnologiilor folosite;
- dezvoltarea numarului de echipe tehnice la nivel national si instruirea permanenta a acestora pentru cresterea
capacitatilor tehnice si profesionale a acestora;
- infiintarea de centre de excelenta operationala.
Specialistii S.C. ALISTAR SECURITY S.R.L. analizeaza permanent cu atentie piata si necesarul de securitate pe zone si
domenii, ceea ce ne permite sa ne calibram eforturile si resursele catre directiile cu potentialul cel mai ridicat.
2
CERTIFICARI
Urmare standardelor profesionale ridicate oferite clienţilor noştri, am fost certificaţi SR EN ISO 9001:2008 pentru
deţinerea şi menţinerea sistemului de management al calităţii în domeniul pazei si protectiei, proiectarii si instalarii
sistemelor de securitate, transporturilor de valori, monitorizarii si interventiei. Aceasta certificare reprezinta confirmarea
oficiala a nivelului ridicat si credibil de performanta organizationala.
Compania este certificata in Sistemului de Management al Sanatatii si Securitatii Ocupationale - OHSAS 18001:2007.
Obtinerea acestei certificari confirma responsabilitatea managementului in domeniul sanatatii si securitatii in munca,
identificarii pericolelor, evaluarii si tinerii sub control a riscurilor privind sanatatea si securitatea in munca, combaterii
riscurilor si nu a consecintelor, reducerii numarului de accidente de munca sau a imbolnaviri profesionale.
Informatia este un bun esential care trebuie protejat corespunzator. Compania este certificata in sisteme de
Management al Securitatii Informatiilor ISO 27001:2005. Beneficiile acestui sistem de management sunt conformitatea
cu cerintele legale si contractuale si asigurarea increderii clientilor privind modul de gestionare a informatiilor, incluzand
evitarea scurgerilor de informatii confidentiale.
Protectia Informatiilor clasificate se realizeaza in conformitate cu prevederile H.G. nr. 781/2002.
Nivelul de performanta credibil si incadrarea activitatilor organizatiei in reglementarile nationale si internationale
privind protectia mediului ne-au adus si certificarea in Sisteme de Management al Mediului ISO 14001:2004.
Nu in ultimul rand, compania detine certificatul SRM 8000, echivalent SA 8000:2008, pentru recunoasterea Sistemului
de Management de Responsabilitate Sociala.
3. DESCRIEREA SERVICIILOR OFERITE
SERVICIUL DE PAZA SI PROTECTIE
ALISTAR SECURITY S.R.L. asigura servicii de paza pentru toate categoriile de obiective: sedii si unitati bancare, resedinte
private, institutii publice, bancomate, case de schimb valutar, farmacii, supermarketuri, santiere de constructii, institutii
religioase, muzee, fabrici, centre de afaceri, etc., cu agenti instruiti, specializati pentru astfel de activitati si atestati de
organele de politie.
Agentii sunt echipati in uniforma societatii, având insemne distinctive si dotare specifica activitatii: baston de cauciuc (tomfa),
pulverizator de substante iritant-lacrimogene, dispozitiv electrosoc, statie radio emisie/receptie sau telefon mobil, lanterne si
alte mijloace functie de locul si specificul misiunii.
La solicitarea beneficiarilor si pentru cazurile in care situatia de risc o impune, agentii de paza pot fi inarmati cu arme de foc
letale sau neletale, in conditiile prevazute de lege.
Agentii de paza sunt instruiti ca, in eventualitatea producerii unor calamitati naturale, incendii sau dezastre sa actioneze
alaturi de personalul beneficiarului pentru protectia persoanelor si bunurilor aflate in zona de responsabilitate.
Pentru anumite activitati si manifestari culturale, sportive ori stiintifice (conferinte, receptii, festivitati, expozitii, competitii
sportive, concerte etc.), agenti specializati pot asigura paza arenelor ori a locurilor unde acestea se desfasoara, protectia VIP-
urilor participante, monitorizarea accesului persoanelor si vehiculelor precum si ordinea pe durata manifestarilor.
Totodata, se poate interveni la obiectivele pazite si la cele monitorizate, cu echipaje special instruite, dotate cu autovehicule
specializate.
Activitatea agentilor de paza se desfasoara pe baza de proceduri specifice stabilite pentru fiecare obiectiv, controlul
implementarii lor efectuandu-se de catre inspectori de securitate cu responsabilitate zonala.
ALISTAR SECURITY SRL asigura consultanta pentru identificarea solutiilor optime privind paza si protectia obiectivelor,
persoanelor, evaluarea riscurilor de securitate, stabilitatea si eficacitatea dispozitivelor proprii de paza si instruirea specifica a
personalului cu astfel de atributii.
Societatea noastra ofera asistenta de specialitate la fundamentarea, redactarea si obtinerea avizelor pentru planurile de paza
(responsabilitate care, potrivit Legii nr. 333/2003, revine beneficiarului).
ALISTAR SECURITY SRL mentine o permanenta legatura atat cu sectiile de Politie din fiecare sector din Municipiul Bucuresti,
cat si cu Inspectoratele Judetene de Politie (cu majoritatea acestora fiind incheiate protocoale de colaborare), Unitatile de
Jandarmerie, alte societati private de paza si protectie, astfel incat orice actiune sa fie efectuata in conformitate cu prevederile
legale si sa asigure solutionarea rapida a tuturor situatiilor ce pun in pericol vietile oamenilor si proprietatile.
3
MONITORIZAREA SISTEMELOR DE ALARMA
Compania noastra detine DISPECERATE dotate cu sisteme electronice performante, prin care suntem in permanenta legatura
cu obiectivele monitorizate. In situatia aparitiei unui semnal de alarma, dispeceratul il receptioneaza si il analizeaza, trimitand
apoi pentru interventie cel mai apropiat echipaj mobil. Acesta actioneaza rapid pentru inlaturarea incidentului sau limitarea
urmarilor acestuia.
Monitorizarea sistemelor de alarmare se efectueaza prin dispeceratele dispuse in urmatoarele localitati:
Dispecerat Central: Bucuresti;
Dispecerate zonale: Alba-Iulia, Constanta, Drobeta Turnu-Severin, Focsani, Roman, Targoviste, Bistrita.
Echipamentele electronice, dotarea punctului operativ de conducere, personalul de supraveghere şi echipajele de intervenţie
asigură constant securitatea persoanelor si a proprietăţilor fizice, a bunurilor şi valorilor păzite precum şi predarea
infractorilor catre organele de poliţie competente.
Pentru rezolvarea urgenţelor medicale, colaborăm cu unele dintre cele mai bune clinici si spitale din ţară, echipajul de
intervenţie fiind instruit să solicite sprijinul salvării si să acorde primul ajutor pana la sosirea ei.
ALISTAR SECURITY SRL este o companie ce actioneaza la nivel national prin cele 8 dispecerate de monitorizare si echipajele de
interventie proprii precum si prin cele subcontractate, in cadrul parteneriatelor incheiate cu alte societati private de paza si
protectie, selectate conform criteriilor proprii de excelenta.
4. 4
INTERVENTIA OPERATIVA CU ECHIPAJELE DE INTERVENTIE
Ca serviciu privat, INTERVENTIA este asigurata de catre echipajul/echipajele mobile de interventie din exteriorul
obiectivului care actioneaza rapid, la solicitarea personalului din cadrul obiectivului sau la semnalele transmise de
sistemul de alarma. In momentul primirii semnalului de alarma in dispecerat, operatorii dispeceri intra in comunicare
nemijlocita cu echipajul de interventie si, simultan, sunt selectate categoriile de interventie (in functie de natura
semnalului) si anuntate persoanele responsabile desemnate de beneficiar conform protocolului particularizat.
Evenimente care fac necesara interventia: ATAC / EFRACTIE / INCENDIU / TURBULENTE care ameninta viata oamenilor
si integritatea proprietatilor / ALTE EVENIMENTE – calamitati naturale, explozii etc.
Agentii de interventie sunt profesionisti de inalta performanta, cu experienta vasta in domeniu, selectati extrem de
riguros, pregatiti si antrenati permanent in executarea operatiunilor complexe.
Echipele mobile de interventie ale S.C. ALISTAR SECURITY S.R.L., ca forta de raspuns la incidente si interventie primara
plasata in afara obiectivului protejat, actioneaza imediat:
•Pentru intreruperea starii de alarma atunci cand obiectivul nu este protejat si cu paza umana;
•Ca forta suplimentara in sprijinul dispozitivelor de paza amplasate in obiectivele protejate cu paza umana;
•Ca element de sprijin pentru fortele de interventie specializate ale Politiei, Salvarii si Pompierilor;
•Pentru intarirea rapida a dispozitivului de paza intr-un punct sau zona din obiectiv in care s-a conturat sau s-a produs o
amenintare;
•Pentru neutralizarea/zadarnicirea actiunilor cu caracter infractional ce nu au putut fi prevenite, aflate in faza
incipienta sau in desfasurare;
•Pentru degajarea obiectivelor ocupate de catre elemente infractoare;
•Pentru inlaturarea cauzelor si limitarea efectelor unor evenimente cauzatoare de prejudicii.
Dupa fiecare interventie se intocmeste un raport de eveniment care este prezentat beneficiarului la termenii stabiliti
printr-un protocol personalizat. Acest raport include si recomandari pentru prevenirea incidentelor similare in viitor.
LOCALITATILE IN CARE PRESTAM SERVICII DE INTERVENTIE CU OPERATOR PROPRIU
Bucuresti, Chitila, Snagov, Voluntari, Afumati, Peris, Bragadiru, Constanta, Tulcea, Braila, Galati, Bacau, Onesti, Buzau,
Ramnicu-Sarat, Nehoiu, Focsani, Adjud, Panciu, Suceava, Roman, Piatra Neamt, Targu-Neamt, Bicaz, Iasi, Vaslui, Barlad,
Husi, Targoviste, Gaiesti, Pucioasa, Titu, Moreni, Ramnicu-Vilcea, Horezu, Dragasani, Alba-Iulia, Blaj, Sebes, Sibiu,
Predeal, Sfantu-Gheorghe, Baraolt, Intorsura Buzaului, Covasna, Targu-Secuiesc, Cristuru-Secuiesc, Targu Mures,
Miercurea Ciuc, Odorhei, Toplita, Gheorghieni, Turnu Magurele, Drobeta Turnu-Severin, Vanju Mare, Timisoara, Carani,
Brasov, Deva, Hunedoara, Craiova, Bistrita, Baia Mare, Cluj, Pitesti.
5. 5
LOCALITATI IN CARE INTERVENTIA ESTE ASIGURATA IN COLABORARE
Satu-Mare, Zalau, Resita, Lugoj, Caransebes, Slatina, Oradea, Botosani, Alexandria, Slobozia, Urziceni, Medias,
Fagaras, Petrosani, Sighetul-Marmatiei, Calarasi, Vatra Dornei, Campulung-Moldovenesc, Falticeni, Gura-
Humorului .
INSTALARE, INTRETINERE, SERVICE SI MENTENANTA
SISTEME DE SUPRAVEGHERE VIDEO SI ALARMARE LA EFRACTIE SI INCENDIU
DEPARTAMENTUL TEHNIC al S.C. ALISTAR SECURITY S.R.L. proiecteaza, instaleaza, intretine si repara
sisteme de alarmare la efractie si incendiu, control acces si televiziune cu circuit inchis.
Acest compartiment al societatii noastre dispune de personal tehnic specializat, avizat de catre Inspectoratul
General al Politiei Romane, capabil sa acorde consultanta si sa proiecteze, instaleze, puna in functiune si sa
asigure service profesional pentru sisteme electronice de supraveghere - alarmare antiefractie, antiicendiu,
televiziune cu circuit inchis si control acces. Deasemenea, personalul nostru tehnic asigura la parametrii inalti
instruirea personalului beneficiarului cu privire la utilizarea sistemelor de alarmare instalate.
6. 6
PAZA TRANSPORTURI BUNURI SI VALORI
In baza licentei eliberate de catre Inspectoratul General al Politiei Romane, ALISTAR SECURITY SRL poate
desfasuara transportul de bunuri si valori importante pe intreg teritoriul Romaniei.
Paza transporturilor bunurilor si valorilor, care constau in sume de bani, titluri de credite, cecuri sau alte
inscrisuri de valoare, metale si pietre pretioase, valori stiintifice, tehnice, de cultura si arta, se asigura cu mijloace
de transport anume destinate, certificate si abilitate in conformitate cu legislatia din Romania.
ALISTAR SECURITY SRL promoveaza si utilizeaza o tehnologie inteligenta de transport a bancnotelor.
Sistemul presupune transportul bancnotelor in casete prevazute cu dispozitive de maculare a acestora (hartie sau
polimeri) in caz de furt. Sistemul se compune dintr-un server de exploatare, containere pentru transportul
bancnotelor (element mobil) si alte componente specializate si este imbatabil. Fiecare container este echipat cu o
cutie neagra care inregistreaza toate informatiile ce permit stabilirea clara a responsabilitatii in cazul
degradarii/macularii bancnotelor. Avantajele sistemului sunt multiple, el asigurind atit securitatea oamenilor si a
bancnotelor transportate, precum si descurajarea reala a infractorilor. Sistemul este omologat in Romania si
utilizat pe scara larga in Franta, Belgia, Germania si Italia. Banca Nationala a Romaniei asigura inlocuirea
bancnotelor maculate la valoarea nominala a acestora, prin intermediul societatii transportatoare.
GARDA DE CORP
Pentru activitatea de gardă de corp Legea nr. 333/2003 stabileşte în mod concret definiţia serviciului de gardă de
corp, modalitatea de prestare a acestuia, criteriile de selectare, recrutare şi angajare a personalului specializat,
precum şi drepturile şi obligatiile acestuia şi a societăţilor avizate sa presteze astfel de servicii. De asemenea, legea
stabileşte regimul contravenţiilor specifice desfăşurării activităţii de gardă de corp.
ALISTAR SECURITY SRL este autorizata de către Ministerul Administraţiei şi Internelor, Inspectoratul General
al Poliţiei Române - Direcţia Poliţiei de Ordine Publică, prin Licenţa de Funcţionare, să efectueze servicii de gardă
de corp şi consultanţă specializata în domeniu.
Societatea noastră dispune de personalul calificat necesar desfăşurării în condiţii foarte bune a acestui serviciu
precum si de echipamentele necesate, garantând in acelasi timp confidenţialitate maximă pentru fiecare misiune în
parte.
Angajaţii noştri vă asigură transportul în deplină siguranţă la destinaţia indicată şi escortarea permanentă sau
ocazionala, în autovehicule de lux sau blindate, în funcţie de solicitările dumneavoastră.
7. 7
PORTOFOLIU CU PRINCIPALII BENEFICIARI
ATE BANK ROMANIA – retea nationala;
BANCA COMERCIALA ROMANA – 67% din unitatile bancare din 25 judete si 4 sectoare din municipiul
Bucuresti ;
BANCA COMERCIALA ROMANA – Centrele de procesare – retea nationala ;
BANC POST – prin subcontractare de la alte societati de paza, interventie operativa cu echipaje proprii Alistar
Security la 47 de sucursale teritoriale ale bancii si 67 bancomate Bank Post ;
CEC –prin subcontractare, interventie operativa la peste 250 de sedii in 13 judete;
RAIFFEISEN BANK -prin subcontractare, interventie operativa la peste 100 de sedii in 13 judete;
BANCA COMERCIALA CARPATICA-prin subcontractare, interventie operativa la 18 de sedii
BANCA TRANSILVANIA –prin subcontractare, interventie operativa la peste 25 de sedii;
ALPHA BANK-prin subcontractare, interventie operativa la 25 de sedii;
PIRAEUS BANK-prin subcontractare, interventie operativa la 26 de sedii;
BANCA ROMANEASCA –prin subcontractare, interventie operativa la 22 de sedii;
SELGROS –retea nationala;
HORNBACH IMOBILIARE (fostul complex PRISMA –Bucuresti);
ARABESQUE – sediul central si 6 unitati teritoriale
OFICIUL NATIONAL AL REGISTRULUI COMERTULUI - retea nationala;
SPEED TRANSFER - retea nationala;
SMITH&SMITH - retea nationala;
ELECTRICA << MUNTENIA SUD>>.
POSTA ROMANA – interventie la peste 400 de sedii in 15 judete;
PETROM – monitorizare si interventie la statii de combustibil din 4 judete;
CARBOGAZ – statii alimentare gaz lichefiat - retea nationala;
CONPET Ploiesti;
Centru de afaceri « CONECT BUSINESS PARK », BUCURESTI;
GALERIA MALL – BUZAU;
AMYLUM ROMANIA, TG.SECUIESC;
ATON TRANSILVANIA;
COMPLEXUL ZOOTEHNIC PERIS;
RENANIA TRADE;
GRUP 4 SECURITY SERVICES prin subcontractare in 15 judete;
COBRA SECURITY prin subcontractare in 10 judete;
TEAM GUARD prin subcontractare in 10 judete;
INTERGUARD GRUP prin subcontractare in 4 judete;
SECURIT FORCE prin subcontractare in 5 judete;
BIDEPA prin subcontractare in 5 judete;
8. 8
INSTRUIREA SI PREGATIREA PROFESIONALA
Personalul de paza apartinand societatii noastre este personal calificat profesional si care detine Atestat obtinut
in urma absolvirii cursurilor de calificare profesionala, cu durata de minimum 90 zile, in conformitate cu
prevederile art. 41 din Legea nr.333/2003. Instruirea si pregatirea profesionala a personalului de paza, avizat de
organele de politie sa detina si sa foloseasca in interesul serviciului arme de foc si munitii, se efectueaza printr-o
pregatire profesionala specifica privind modul de detinere si uzul de arma, pe baza Tematicii anuale de pregatire
si a Instructajului specific prevazut de art.69 din Legea nr. 295/2004 si aprobate de Inspectoratul General al
Politiei Romane. La aceasta data, societatea are agenti de paza instruiti si avizati pentru portul de arma.
Activitatea de instruire a agentilor de paza, avizati portarma, include Proceduri de lucru privind modul de
actiune al agentului de paza pentru asigurarea securitatii si accesului in orice tip de obiectiv.
Personalul de paza care executa serviciul in obiective deosebite (banci, supermarketuri, mall-uri, magazine
cash&carry) participa la sedinte de pregatire unde sunt precizate si evidentiate particularitatile serviciului de
paza, responsabilitatile ce-i revin pentru asigurarea securitatii obiectivelor, modul de actiune in situatii deosebite,
comportamentul fata de personalul beneficiarului si clientii acestuia.
Un accent deosebit este pus pe respectarea codului etic de conduita, pe tactul si discretia necesare in obiectivele cu
afluenta mare de public.
Pregatirea profesionala specifica pentru personalul de paza neinarmat se realizeaza prin convocari lunare, pe
baza tematicii anuale aprobate de conducerea societatii.
SUMAR
Scopul S.C. ALISTAR SECURITY S.R.L. este acela de a furniza servicii de exceptie clientilor nostri.
Prin actiunile desfasurate asiguram ca beneficiarii nostri, indiferent ca sunt guvernamentali sau comerciali, sa se
poata concentra asupra obiectivelor lor primare, lasand in grija societatii noastre sa rezolve toate problemele
legate de paza si protectie.
Ethosul nostru corporatist se bazeaza pe urmatoarele principii:
- Excelenta profesionala;
- Discretie si integritate;
- Confidentialitate asupra datelor si informatiilor legate de clienti;
- Transparenta si deschidere;
- Respect fata de legile nationale si internationale, precum si fata de drepturile omului;
- Angajare integrala si deschisa catre institutiile guvernamentale si internationale;
- Respectarea reglementarilor domeniului;
- Responsabilitate sociala fata de angajati.
CONTACT
Nume: Gabriel Banu
Functie: Tehnician Alistar Security
E-Mail: Tehnic.roman@alistar-security.ro
Telefon: 0725005121
Fax :