ZS Infotech
IT SUPPORT SERVICES AND SECURITY SOLUTIONS
Copyrights reserved @ ZS Infotech sdn bhd (1055149-A)
About us
 ZS Infotech sdn bhd. is an IT support services and Security solution provider located in
Selangor, Malaysia.
 The company offers a full range of IT services, customized to any businesses needs at an
affordable rate.
 We can be your very own IT department or supplement your already existing IT staff. From
assessment to design, implementation to maintenance, problem resolution to on-going
help desk support, we will meet and exceed the requirements of any businesses IT
infrastructure.
Our services
 IT Staff augmentation
 Endpoint Security
 Cyber security
 Risk management
 Infrastructure Management.
IT Staff augmentation
IT staff augmentation allows a company to add staff to
their teams based on the additional skills required to
support their initiatives.
Companies may easily ramp up and down to meet
changing demand without shouldering the cost and
liabilities of additional full time employees.
AN EMERGING BEST PRACTICE
Benefit of IT Staff augmentation
 Control over staff: When there is a need to closely manage resources, staff
augmentation is ideal.
 Integration with internal processes: Companies can find it more effective to
integrate staff augmentation resources with existing business processes than to
align those processes with external project teams. After all, an individual can
adapt more quickly to the processes of an organization than two separate
organizations can align with each other.
 Leverages existing resources: By adding new skill sets to the team, a company
can take advantage of both external and internal resources for the completion
of their IT projects.
 Specialist expertise: When project team gaps mainly consist of specialized skills,
staff augmentation can efficiently fill those gaps.
 Rapidly changing staffing needs: Companies with staffing needs in constant
flux can meet those needs through staff augmentation. It’s relatively easy to
add or subtract resources to match demand.
Benefit of IT Staff augmentation continue…
 Reduce cost of acquiring skills: Avoids the cost of investing
in internal skill development.
 Reduce employer burdens: Avoids costs and liabilities of
direct employees.
 Meet aggressive project timelines: When an active project
has a need for more resources in order to be completed on
time, staff augmentation is typically the best option, and
is often the only option.
 Internal acceptance: Existing employees often embrace a staff augmentation model more than a project
outsourcing model. Existing employees are less likely to feel threatened by augmenting staff with a few
individuals than by outsourcing entire projects.
 Ease of adoption: It’s easier to adopt a staff augmentation model than a project outsourcing model.
Companies are already used to hiring employees. Staff augmentation is just a small shift from what
companies already do.
Scope of IT Staff augmentation
 Resource can be local or foreigner based on company budget and project requirement.
 Client can select resource pool from L1 level to L3 level expertise.
 Resource availability based on scope of work or time basis.
 Client can take interview to meet their expectations.
 Hyades provide experts consulting or additional resources whenever required.
 Client can select resources from onsite, offsite or hybrid support. In Hybrid support resource can visit client
site on weekly or bi-weekly basis.
 Client can select resources for 24*5, 24*7 or 9-6 pm shift.
 Client can ask resource to travel other geographical location with prior intimation to Hyades.
Endpoint Security
Endpoint systems are nothing but users/employees
desktop, laptops or Mobile phones.
Endpoint systems are always a target of Hackers,
because they have lack of security controls and
awareness.
BREAK THE ATTACK CHAIN
Why Endpoint Security needed
 Cyber crimes are becoming more sophisticated and they
can easily fool Antivirus application.
 Now a days Antivirus in not enough to protect against zero
day attack, data loss and device control etc.
 Hence current era of technology demand advance level
of security for workstations (desktops, laptops, mobile
phones) And Endpoint security fulfill this expectations with
various types of benefits.
 Endpoint security an essential layer in an organization's
security defense apparatus.
Benefit of Endpoint Security
 Prevent Breaches & Infections
Protect company networks with Antivirus, antispyware
and antispam protection that minimizes system slowdowns
and comes with a range of customization options.
 Prevent Loss of Confidential Data
Conserve bandwidth by blocking access to websites
with high volume of traffic. Protect company network
against breaches with two-way firewall, and control
unauthorized media and devices in the network.
 Minimize Management complexity
Oversee security across the entire network from a single
location. Enlist a range of customization and reporting
features to tweak the system security as you need.
Benefit of Endpoint Security continue…
 Improve Performance and Productivity
Block unwanted network traffic at workstation level and utilize
bandwidth effectively.
 Reports, Logs & Notifications
Granular report structure for complete control over
workstations. Continuous log monitoring and trigger notification
whenever require.
 Employee Effectiveness
Prevent employee access to non-work-related websites. Keep
company computers running smoothly and extend the lifetime
of hardware.
Scope of Endpoint Security
 ZS Infotech needs to install Endpoint client to each selected workstations manually.
 We are responsible to update each client with latest virus definition.
 We monitor every client on daily basis.
 We can restrict USB access to workstations as per client requirement.
 Applications can be restricted based on client requirement.
 Any technical issue related of Endpoint will be attended (excluding week-end, public holidays) in 48
hour with NO cost to the client.
 Bandwidth management can be perform based on feasibility of client network.
 ZS Infotech can provide weekly, monthly, quarterly summary reports to the clients.
 ZS Infotech can provide detail logs on daily, weekly, and monthly basis.
 Workstation inventory can be manage by us based on requirement.
Cyber security
Cyber security – defined as the protection of
systems, networks and data in cyberspace – is a
critical issue for all businesses.
Cyber security will only become more important as
more devices, ‘the internet of things’, become
connected to the internet.
MAINTAIN YOUR BUSINESS DIGNITY
Why Cyber security needed
 Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming
from both physical and cyber threats and hazards.
 Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and
money and are developing capabilities to disrupt, destroy, or threaten the delivery of
essential services.
 A range of traditional crimes are now being perpetrated through cyberspace. This includes
banking and financial fraud, intellectual property violations, and other crimes, all of which
have substantial human and economic consequences.
 Cyberspace is particularly difficult to secure due to a number of factors: the ability of
malicious actors to operate from anywhere in the world, the linkages between cyberspace
and physical systems, and the difficulty of reducing vulnerabilities and consequences in
complex cyber networks.
 Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject
to sophisticated cyber intrusions that pose new risks.
 As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-
consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend.
 In light of the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an
important as security mission.
Impact of lack of Cyber Security in 2015
 Malaysian biggest airline career website hacked in 2015
Company not only faced financial loss but also their reputation for customers and stake holders.
 Comcast:
Comcast Corporation, an American multinational mass media company found its users’ login credentials sold on the dark web. The company
confirmed that over 200,000 users were affected from the breach. However, the company failed to catch the culprit behind the breach
 Ashley Madison
Back in July, hackers breached the security of the online dating portal “Ashley Madison”. The hackers were able to leak data from the site including
site’s database, internal emails and source code in relation to some of their internal apps.
 VTech
VTech is a Chinese company which builds and develops learning toys faced a data breach that leaked private information of 4.8 million parents and
200,000 children. Those numbers increased later on to 6.7 million.
 OPM
OPM (Office of Personnel Management) manages records for all government employees including military personnel in the US.
The data breach of OPM took place in March but came to light in June and investigations showed an increase of 4 million breached records.
 T-Mobile via Experian
This was an unusual hack because the company itself (in this case T-mobile) didn’t have a data breach rather Experian (a credit reporting company)
had a data breach which leaked T-mobile’s consumers’ data.
Scope of Cyber Security
 Security posture assessment.
 Penetration testing (black box, while box).
 3rd party vendor audit.
 Datacenter assessment.
 System, website or devices vulnerability management.
 Cloud security services
 Application assessment and baseline security audit.
 Policy review
 business continuity and disaster recovery plan
 Forensic investigation.
 Hacking incident analysis.
 Fraud detection and analysis.
 Road map designing
Risk management (RM)
Risk management is the process of identification,
analysis and either acceptance or mitigation of
uncertainty.
RM Systems are designed to do more than just
identify the risk.
RISK IS PART OF ALL OUR LIVES
Risk Management…the What, Why, and How
 RM involves understanding,
analyzing and addressing risk to
make sure organizations achieve
their objectives.
 So it must be proportionate to the
complexity and type of
organization involved.
 Enterprise risk management (ERM)
is an integrated and joined up
approach to managing risk across
an organization and its extended
networks.
 Risk Management is the process of identifying, analyzing and responding to risk factors, it implies control of
possible future events and is proactive rather than reactive.
 Proper risk management will
reduce not only the likelihood of
an event occurring, but also the
magnitude of its impact.
 RM is a continuous process and
as such must not only be done at
the very beginning of the project,
but continuously throughout the
life of the project.
IT Infrastructure management (ITIM)
ITIM help enterprises design, build, run,
and manage their IT infrastructure
services in an agile manner that allows
for better integration with the existing
processes and operations at optimum
costs.
ALWAYS-ON-ALWAYS-AVAILABLE
Offerings services of ITIM
Web: www.zsinfotech.com.my
Email: info@zsinfotech.com.my
Contact:
Muhammad Zubair +60 16 620 1878
Adam Aryan +60 17 273 5302
WE ARE ALWAYS READY TO HELP YOU…!

ZS Infotech v1.0

  • 1.
    ZS Infotech IT SUPPORTSERVICES AND SECURITY SOLUTIONS Copyrights reserved @ ZS Infotech sdn bhd (1055149-A)
  • 2.
    About us  ZSInfotech sdn bhd. is an IT support services and Security solution provider located in Selangor, Malaysia.  The company offers a full range of IT services, customized to any businesses needs at an affordable rate.  We can be your very own IT department or supplement your already existing IT staff. From assessment to design, implementation to maintenance, problem resolution to on-going help desk support, we will meet and exceed the requirements of any businesses IT infrastructure.
  • 3.
    Our services  ITStaff augmentation  Endpoint Security  Cyber security  Risk management  Infrastructure Management.
  • 4.
    IT Staff augmentation ITstaff augmentation allows a company to add staff to their teams based on the additional skills required to support their initiatives. Companies may easily ramp up and down to meet changing demand without shouldering the cost and liabilities of additional full time employees. AN EMERGING BEST PRACTICE
  • 5.
    Benefit of ITStaff augmentation  Control over staff: When there is a need to closely manage resources, staff augmentation is ideal.  Integration with internal processes: Companies can find it more effective to integrate staff augmentation resources with existing business processes than to align those processes with external project teams. After all, an individual can adapt more quickly to the processes of an organization than two separate organizations can align with each other.  Leverages existing resources: By adding new skill sets to the team, a company can take advantage of both external and internal resources for the completion of their IT projects.  Specialist expertise: When project team gaps mainly consist of specialized skills, staff augmentation can efficiently fill those gaps.  Rapidly changing staffing needs: Companies with staffing needs in constant flux can meet those needs through staff augmentation. It’s relatively easy to add or subtract resources to match demand.
  • 6.
    Benefit of ITStaff augmentation continue…  Reduce cost of acquiring skills: Avoids the cost of investing in internal skill development.  Reduce employer burdens: Avoids costs and liabilities of direct employees.  Meet aggressive project timelines: When an active project has a need for more resources in order to be completed on time, staff augmentation is typically the best option, and is often the only option.  Internal acceptance: Existing employees often embrace a staff augmentation model more than a project outsourcing model. Existing employees are less likely to feel threatened by augmenting staff with a few individuals than by outsourcing entire projects.  Ease of adoption: It’s easier to adopt a staff augmentation model than a project outsourcing model. Companies are already used to hiring employees. Staff augmentation is just a small shift from what companies already do.
  • 7.
    Scope of ITStaff augmentation  Resource can be local or foreigner based on company budget and project requirement.  Client can select resource pool from L1 level to L3 level expertise.  Resource availability based on scope of work or time basis.  Client can take interview to meet their expectations.  Hyades provide experts consulting or additional resources whenever required.  Client can select resources from onsite, offsite or hybrid support. In Hybrid support resource can visit client site on weekly or bi-weekly basis.  Client can select resources for 24*5, 24*7 or 9-6 pm shift.  Client can ask resource to travel other geographical location with prior intimation to Hyades.
  • 8.
    Endpoint Security Endpoint systemsare nothing but users/employees desktop, laptops or Mobile phones. Endpoint systems are always a target of Hackers, because they have lack of security controls and awareness. BREAK THE ATTACK CHAIN
  • 9.
    Why Endpoint Securityneeded  Cyber crimes are becoming more sophisticated and they can easily fool Antivirus application.  Now a days Antivirus in not enough to protect against zero day attack, data loss and device control etc.  Hence current era of technology demand advance level of security for workstations (desktops, laptops, mobile phones) And Endpoint security fulfill this expectations with various types of benefits.  Endpoint security an essential layer in an organization's security defense apparatus.
  • 10.
    Benefit of EndpointSecurity  Prevent Breaches & Infections Protect company networks with Antivirus, antispyware and antispam protection that minimizes system slowdowns and comes with a range of customization options.  Prevent Loss of Confidential Data Conserve bandwidth by blocking access to websites with high volume of traffic. Protect company network against breaches with two-way firewall, and control unauthorized media and devices in the network.  Minimize Management complexity Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.
  • 11.
    Benefit of EndpointSecurity continue…  Improve Performance and Productivity Block unwanted network traffic at workstation level and utilize bandwidth effectively.  Reports, Logs & Notifications Granular report structure for complete control over workstations. Continuous log monitoring and trigger notification whenever require.  Employee Effectiveness Prevent employee access to non-work-related websites. Keep company computers running smoothly and extend the lifetime of hardware.
  • 12.
    Scope of EndpointSecurity  ZS Infotech needs to install Endpoint client to each selected workstations manually.  We are responsible to update each client with latest virus definition.  We monitor every client on daily basis.  We can restrict USB access to workstations as per client requirement.  Applications can be restricted based on client requirement.  Any technical issue related of Endpoint will be attended (excluding week-end, public holidays) in 48 hour with NO cost to the client.  Bandwidth management can be perform based on feasibility of client network.  ZS Infotech can provide weekly, monthly, quarterly summary reports to the clients.  ZS Infotech can provide detail logs on daily, weekly, and monthly basis.  Workstation inventory can be manage by us based on requirement.
  • 13.
    Cyber security Cyber security– defined as the protection of systems, networks and data in cyberspace – is a critical issue for all businesses. Cyber security will only become more important as more devices, ‘the internet of things’, become connected to the internet. MAINTAIN YOUR BUSINESS DIGNITY
  • 14.
    Why Cyber securityneeded  Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards.  Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.  A range of traditional crimes are now being perpetrated through cyberspace. This includes banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences.  Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks.  Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject to sophisticated cyber intrusions that pose new risks.  As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high- consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend.  In light of the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an important as security mission.
  • 15.
    Impact of lackof Cyber Security in 2015  Malaysian biggest airline career website hacked in 2015 Company not only faced financial loss but also their reputation for customers and stake holders.  Comcast: Comcast Corporation, an American multinational mass media company found its users’ login credentials sold on the dark web. The company confirmed that over 200,000 users were affected from the breach. However, the company failed to catch the culprit behind the breach  Ashley Madison Back in July, hackers breached the security of the online dating portal “Ashley Madison”. The hackers were able to leak data from the site including site’s database, internal emails and source code in relation to some of their internal apps.  VTech VTech is a Chinese company which builds and develops learning toys faced a data breach that leaked private information of 4.8 million parents and 200,000 children. Those numbers increased later on to 6.7 million.  OPM OPM (Office of Personnel Management) manages records for all government employees including military personnel in the US. The data breach of OPM took place in March but came to light in June and investigations showed an increase of 4 million breached records.  T-Mobile via Experian This was an unusual hack because the company itself (in this case T-mobile) didn’t have a data breach rather Experian (a credit reporting company) had a data breach which leaked T-mobile’s consumers’ data.
  • 16.
    Scope of CyberSecurity  Security posture assessment.  Penetration testing (black box, while box).  3rd party vendor audit.  Datacenter assessment.  System, website or devices vulnerability management.  Cloud security services  Application assessment and baseline security audit.  Policy review  business continuity and disaster recovery plan  Forensic investigation.  Hacking incident analysis.  Fraud detection and analysis.  Road map designing
  • 17.
    Risk management (RM) Riskmanagement is the process of identification, analysis and either acceptance or mitigation of uncertainty. RM Systems are designed to do more than just identify the risk. RISK IS PART OF ALL OUR LIVES
  • 18.
    Risk Management…the What,Why, and How  RM involves understanding, analyzing and addressing risk to make sure organizations achieve their objectives.  So it must be proportionate to the complexity and type of organization involved.  Enterprise risk management (ERM) is an integrated and joined up approach to managing risk across an organization and its extended networks.  Risk Management is the process of identifying, analyzing and responding to risk factors, it implies control of possible future events and is proactive rather than reactive.  Proper risk management will reduce not only the likelihood of an event occurring, but also the magnitude of its impact.  RM is a continuous process and as such must not only be done at the very beginning of the project, but continuously throughout the life of the project.
  • 19.
    IT Infrastructure management(ITIM) ITIM help enterprises design, build, run, and manage their IT infrastructure services in an agile manner that allows for better integration with the existing processes and operations at optimum costs. ALWAYS-ON-ALWAYS-AVAILABLE
  • 20.
  • 21.
    Web: www.zsinfotech.com.my Email: info@zsinfotech.com.my Contact: MuhammadZubair +60 16 620 1878 Adam Aryan +60 17 273 5302 WE ARE ALWAYS READY TO HELP YOU…!