Corporate Overview. Who We Are: What We Do: Quick Facts: Products. Services. Training. Support. Monitored and Managed Services
|
|
- Dale Pearson
- 8 years ago
- Views:
Transcription
1 We Mean Security Corporate Overview Who We Are: Nexum, Inc. is a cybersecurity and networking company that builds and defends global networks, empowering organizations to conduct mission-critical business securely and efficiently. Our core value - do what is best for the customer and success will follow - drives Nexum to take a holistic, value-based approach to cybersecurity and networking that includes best-of-breed products, professional services, authorized training courses, Nexum-branded manufacturer support, and monitored and managed security services. Latin for an arrangement by which one pledged one s very liberty as security, Nexum stands for our commitment to mitigate risk and ensure our customers security. At Nexum, We Mean Security. What We Do: Products Best-of-breed cybersecurity and networking products from the industry s top manufacturers. Services Nexum s engineers assess, architect and integrate network and security infrastructure. Training Nexum manufacturer-certified training delivered by authorized trainers who are also field engineers with deep customer experience. Support Nexum s security and network operation command centers provide manufacturer-authorized technical support from US-based engineers. Quick Facts: Founded: 2002 Headquarters: Chicago, Ill. Security & Network Operations Command Centers (SNOCC): Albuquerque, N.M. Chicago, Ill. Training Facilities: Illinois New Hampshire New Mexico Ohio Regional Sales Offices: Illinois Kentucky Michigan New Hampshire Ohio Wisconsin Contact: shout@nexuminc.com Monitored and Managed Services Nexum s firstdefense monitors and manages customer devices all over the globe. Nexum is a Service-Disabled Veteran-Owned Small Business (SDVOSB)
2 Products Nexum partners with top manufacturers in the cybersecurity and networking industry to deliver best-of-breed solutions in 18 critical areas. Application and Network Performance Management Application Delivery Controllers Change, Governance, Risk and Compliance Data Loss Prevention DNS, DHCP and IP Address Management Endpoint Protection Firewalls Identity and Access Management Infrastructure Mobile Data Protection Network Access Control Network Intrusion Prevention Systems (IPS)/Distributed Denial of Service (DDoS) Protection Secure Gateways Secure Web Gateways Security Information Event Management Virtualized Infrastructure Virtual Private Networks WAN Optimization
3 Services Nexum offers a suite of services to match our cybersecurity and networking solutions. Our offerings range from assessments to consulting to support and much more. We deliver everything you need to take your network goals from concept to reality. Product Integration Services Configuration Review Custom Configuration Data Center Deployments and Integration Device Tuning Enterprise Architecture Health Checks Independent Vendor Analysis Knowledge Transfer Lab Services On-site and Remote Engineering Services Product Evaluations Proofs of Concept Version Upgrades Consulting Services Audit Readiness Preparation Data Center Design Compliance Assessment Penetration Testing Technical Business Continuity Review Vulnerability Assessment Web-based Application Testing
4 Additional Services Training Nexum delivers vendor-authorized and certified training courses from the top manufacturers in the cybersecurity and networking industry. From our training facilities in Illinois, New Hampshire, New Mexico and Ohio or through our network of training partners across the country and around the world, Nexum s expert instructors teach the training courses your engineers and IT personnel need to manage and secure the network of the future. We also offer many more courses through our partner, Global Knowledge. Learn more at EDUCATION SERVICES AUTHORIZED PARTNER Manufacturer-Authorized Support Nexum s technical support team is available 24x7x365 through our web-based portal, via and by telephone. Our vendor-certified support engineers become your first line of defense, providing enhanced support for the full spectrum of products and services. With a direct awareness of your network infrastructure, Nexum s security engineers identify the root causes of complex and recurring network issues more efficiently than outside support. We also record and document past issue resolutions for trending, consistency and problem-solving reference. Phone and support from Nexum (live IT analysts and vendor-certified security engineers) Break/fix troubleshooting Secure ticket access and asset tracking Managed escalation to Level 3 vendor support Redundant Security & Network Operation Command Centers (SNOCC) 24x7x365 US-based staff coverage On-site support (additional hourly fees apply) ADVANTAGE PROGRAM AUTHORIZED SUPPORT PROVIDER Authorized Service Partner
5 Monitored and Managed Services: firstdefense What is firstdefense? firstdefense is a family of services offered by Nexum designed to be your first line of defense for security and networking challenges by extending the Nexum team to your team. Whether your needs are product support or full managed security services, Nexum s team of certified experts located at our redundant US-Based Security and Network Operation Command Centers (SNOCCs) are ready around the clock to help. Designed from the ground up in response to real-world IT security threats, firstdefense solutions empower your IT staff to manage and defend your network efficiently and effectively, even if you are lean on resources. IT security and operations teams everywhere have an immense and ever increasing workload to manage, often with tight budget restrictions and a minimum number of personnel. While the security threats facing your infrastructure have never been more persistent or insidious, firstdefense is always on and at the ready to respond in real time. Optimize your resources, defend your investments and take back your network with firstdefense. Managed Services Monitored Services Night Vision Redundant Security and Network Operation Command Centers (SNOCCs) Guaranteed 30-minute response time On-site support (additional hourly fees apply) portal access Secure ticket access and asset tracking Web-based reporting Standard and customized security reporting and trending Real-time 24x7 log correlation, aggregation and monitoring Real-time 16x5, 24x2 log correlation, aggregation and monitoring 24x7x365 incident response and mangement by live engineers Secure log retention and storage Proactive device health monitoring, alerting and reporting Phone and support Real-time 24x7 searchable log access Device tuning for optimal security and network performance Device path management Unauthorized and unapproved change detection Device software upgrades
6 Engineering Expertise With best-of-breed products and services, Nexum emphasizes technical education and understanding as the foundation to providing enterprise level solutions. Our technical certifications include: ARISTA NETWORKS Arista Networks Professional Sales Engineer Arista Configuration Essentials (ACE) Arista Networks BPoE Partner SE ARUBA NETWOKS Aruba Certified Mobility Associate Aruba Certified Mobility Professional BLUE COAT SYSTEMS Blue Coat Certified Proxy Administrator Blue Coat Certified Proxy Professional Blue Coat Bluetouch Support Partner Blue Coat Level 1 Technical Fundamentals Blue Coat Certified Instructor CHECK POINT SOFTWARE TECHNOLOGIES Check Point Security Administration (CCSA) Check Point Certified Security Expert (CCSE) Check Point Certified Instructor CISCO SYSTEMS Cisco Certified Network Associate (CCNA, Route/Switch) Cisco Certified Network Professional (CCNP) Cisco Certified Design Associate (CCDA) Cisco Express Foundations Design Associate Cisco Certified Network Associate (CCNA, Security) Cisco Certified Instructor F5 NETWORKS ( ) TMOS Administration exam F5 LTM Advanced F5 ASM F5 GTM F5SE-LTM - System Engineer F5PC-LTM - Product Consultant F5PC-GTM - Product Consultant F5PC-ASM - Product Consultant F5SE-GTM - System Engineer F5 LTM Basic F5 Certified Instructor 301A: LTM Specialist: Architect, Setup & Deploy 301beta:LTM Specialist: Maintain & Troubleshoot 302beta: GTM Specialist FIREEYE Certified Associate INFOBLOX Certified Infoblox Core Administrator (CICA) Certified Infoblox Core Engineer (CICE) Infoblox Automation Solution Architect (IASA) Infoblox Automation Services Engineer (IASE) Certified Infoblox Support Technician (CIST) Infoblox Certified Instructor- CICA Infoblox Certified Instructor- CICE JUNIPER Juniper Networks Sales Specialist (JNSS-MX) Juniper Networks Sales Specialist (JNSS-EX) Juniper Networks Sales Specialist (JNSS-FWV) Juniper Networks Certified Specialist (JNCIS-FWV) Juniper Networks Certified Professional (JNCIP-SEC) Juniper Networks Certified Specialist (JNCIS-SEC) Juniper Networks Sales Specialist (JNSS-PAC) JUNIPER NETWORKS (Continued) Juniper Networks Certified Specialist (JNCIS-SSL) Juniper Networks Certified Specialist (JNCIS-AC) Juniper Networks Sales Specialist (JNSS-AS) Juniper Networks Sales Specialist (JNSS-FWV) Juniper Networks Sales Specialist (JNSS-JUNOS) Juniper Networks Sales Specialist (JNSS-MT) Juniper Networks Sales Specialist (JNSS-ANI) Juniper Networks Sales Specialist (JNSSMMX) Juniper Networks Sales Specialist (JNSS-NI) Juniper Networks Sales Specialist (JNSS-EX) Juniper Networks Sales Specialist (JNSS-WAN-ACCELERATION) Juniper Networks Sales Specialist (JNSS-WX) Juniper Networks Certified Instructor (JNCI-SSL) Juniper Networks Certified Specialist (JNCIS-SSL) Juniper Networks Certified Specialist (JNCIS-AC) Juniper Networks Certified Instructor (JNCI-FWV) Juniper Networks Certified Specialist (JNCIS-FWV) Juniper Networks Certified Instructor (JNCI-ENT) Juniper Networks Certified Specialist (JNCIS-ENT) Juniper Networks Certified Professional (JNCIP-SEC) Juniper Networks Certified Specialist (JNCIS-SEC) Juniper Networks Certified Instructor (JNCI-SEC) Juniper Networks Certified Instructor (JNCI-SP) Juniper Networks Certified Specialist (JNCIS-SP) Juniper Networks Certified Instructor (JNCI-AC) Juniper Networks Sales Specialist (JNSS-PAC) Juniper Networks Certified Expert Enterprise Routing & Switching (JNCIE-ENT) PALO ALTO NETWORKS Palo Alto Accredited Configuration Engineer (ACE) Palo Alto Certified Network Security Engineer (CNSE) Palo Alto Instructor Competency Workshop Palo Alto Certified Instructor Q1 LABS IBM Security QRadar V7.0 MR4 RIVERBED TECHNOLOGY Riverbed Technical Sales Associate (RTSA) Riverbed Technical Sales Specialist (RTSS) Riverbed Certified Solutions Associate (RCSA) RTSA-NPM (Network Performance Management Cascade) RTSS-NPM (Network Performance Management Cascade) RCSP-W (Riverbed Certified Solutions Professional in Wan Optimization) RCSP-NPM (Riverbed Certified Solutions Professional in Network Performance Management) SOURCEFIRE Sourcefire Certified Sales Engineer TUFIN Tufin Certified Security Expert (TCSE) WEBSENSE WebSense Web 7.5 WebSense DLP 7.5 OTHER Certified Information Systems Security Professional (CISSP) CompTIA Security+
7 Nexum for Federal Nexum, Inc. is a Service-Disabled Veteran-Owned Small Business (SDVOSB) with an acute understanding of what it takes to secure the nation s most critical infrastructure, control exposure to security risk and promote functional, real-world security in an ever-changing threat landscape. Nexum understands that cybersecurity is one of our nation s most imminent challenges. We take pride in supporting our nation s war fighter and providing our government with solutions to effectively protect our country. Nexum Locations Nexum, Inc. Headquarters 190 S. LaSalle St. Suite 1450 Chicago, IL main fax Kentucky 727 Executive Park Louisville, KY main New Mexico 725 6th Street NW Suite C Albuquerque, NM main Michigan main Ohio 525 Vine St. Suite 1040 Cincinnati, OH main New Hampshire 98 Spit Brook Road Suite 4405 Nashua, NH main Wisconsin 1860 Renaissance Blvd. Suite 207 Sturtevant, WI main We Mean Security
8 Nexum, Inc. 190 S. LaSalle Street Suite 1450 Chicago, IL
Halloween Costume Ideas for the Wii Game 2010
Blue Coat Certified Training Blue Coat Certified Proxy Administrator (BCCPA) 01/25/2016 01/27/2016 Chicago, IL 01/25/2016 01/27/2016 Instructor Led Online (CT) 02/29/2016 03/02/2016 Chicago, IL 02/29/2016
More informationNEXUM S AUTHORIZED TRAINING CENTER 2015 Security Training Schedule
Blue Coat Certified Training Blue Coat Certified Proxy Administrator (BCCPA) 12/07/2015 12/09/2015 Chicago, IL 12/07/2015 12/09/2015 Instructor Led Online (CST) 01/18/2016 01/20/2016 Chicago, IL 01/18/2016
More informationCurrent IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
More informationRelax...Arrow has it covered
Relax...Arrow has it covered Arrow Support Services - what we deliver Arrow offers channel partners a comprehensive range of extended support options with published Service Level Agreements (SLAs), delivering
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationNexum Training Course Catalog
Nexum Training Course Catalog Nexum Training Course Catalog Table of Contents JUNIPER Juniper SRX Bootcamp..................................................... 4 Juniper JNCIS - ENT Bootcamp..............................................
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationInformation Technology Services
Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,
More informationProof of Concept service. Professional and Managed Services. Installation services. First Looks
SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationWORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours
WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationManaged Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationCaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationIBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
More informationAPPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.
APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE TITLE O*NET-SOC CODE RAPIDS CODE Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.00 111HY Network and Computer
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationInfoblox vnios Software for CISCO AXP
Summary Infoblox vnios for Cisco consolidates core network services such as DNS, DHCP and IPAM and others onto the Cisco Integrated Services Router (ISR) running the Application Extension Platform (AXP)
More informationRed Hat & SAP Support Overview
Red Hat & SAP Support Overview 2015 SAP SAPPHIRE NOW Terry Bowling Senior Technical Account Manager David Wood Technical Account Manager Upcoming teasers Red Hat... more than just linux Specialty Based
More informationImplementing Cisco Intrusion Prevention System 7.0 (IPS)
Implementing Cisco Intrusion Prevention System 7.0 (IPS) Course Overview: The Implementing Cisco Intrusion Prevention System (IPS) v7.0 course is a five-day course aims at providing network security engineers
More informationNetwork Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationCisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA)
Cisco Certified Network Associate (CCNA) CISCO Certification Path IIHT Nagpur is one of the best IT training Institutes that provides Cisco, Cloud Computing, hardware and networking courses. Address -
More informationCompany Profile. 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com
Company Profile 1344 S Flores #205 San Antonio, TX 78204 210-694-2797 www.thomasontech.com Trusted Security Advisor For Industrial Control Systems Thomason Technologies provides world-class security solutions
More informationCisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
More informationPALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
More informationCOMPANY PRESENTATION SOLUTIONS
2MN LTD COMPANY PRESENTATION SOLUTIONS 2MN LTD www.2mn.co.uk I A PROPOS DE 2MN Telephone: +44(0)8709192892 Email: info@2mn.co.uk Dear Sir/Madam, Support: support@2mn.co.uk Dear Sir, Madame, 1 Dear Sir/Madame,
More information2015 Services Catalog. IT Security Training & Solutions I(TS) ²
2015 Services Catalog IT Security Training & Solutions I(TS) ² CONSULTING Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current
More informationAllegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
More informationNASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA calvin.rhodes@gta.ga.gov
More informationProfessional and Managed Services
SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product
More information3618 8 th Avenue Phone: 262 564 6400 Kenosha, WI 53140 Fax: 262 564 6401 NOC SERVICES OFFSITE, LLC 262 564 6400. 0 of 8
NOC SERVICES OFFSITE, LLC 262 564 6400 0 of 8 OVERVIEW In today s competitive world, it is critical for IT Service companies to provide a full range of services for their clients. Through the use of highly
More informationAttachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
More informationCisco Certification Skills Matrix
Cisco Certification Skills Matrix Whatever skills you need, IT networking professionals with Cisco Certifications have more to offer. Use this matrix to help evaluate candidates and make the perfect hire.
More informationTechnical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com
Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationCisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
More informationFIRN Secure Internet Bundled Services:
FIRN INTERNET SECURITY BUNDLE SERVICES AND NEW ADVANCED SECURITY OPTIONAL SERVICES (New Services and Prices Available July 1, 2014. CSAB Orders can be placed as early as March 1, 2014) Ethernet Bandwidth
More informationCOMPANY PROFILE. Expert Advice. Experience Advantage. Proactive Security Solutions Through Cutting-Edge Research. www.pandoralabs.
A Security-as-a-Service Company. We Make IT Secure. COMPANY PROFILE Expert Advice. Experience Advantage. Proactive Security Solutions Through Cutting-Edge Research. Table of Contents PANDORA SECURITY LABS...
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationPREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK
MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and
More informationIBM ISS Optimizacija Sigurnosti
IBM ISS Optimizacija Sigurnosti Slaven Novak IBM ISS Technical Sales Specialist slaven.novak@hr.ibm.com 1 The Business Challenge: New Methods and Motives: Adding to the complexity and sheer number of risks
More informationN e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
More informationCisco Remote Management Services for Security
Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock
More informationCompany Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
More informationInfoblox Education Services Course Catalog
Infoblox Education Services Course Catalog Enhance Your Contribution to the Business, Earn Industry-recognized Accreditations, and Develop Skills that Help You Advance in Your Career SEPTEMBER 2015 training.infoblox.com
More informationDer Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
More informationModular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
More informationService Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.
Service Offerings Ensuring IT Resources are available, reliable, scalable & manageable always. SNICare has divided its end-to-end offering into three main segments which covers all the aspects of the IT
More informationBUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
More informationPCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
More informationTraining Program Informational Catalog 2015 WWW.STRIDECENTER.ORG
Training Program Informational Catalog 2015 WWW.STRIDECENTER.ORG NOW ENROLLING Dear Partner, The Stride Center takes pride in partnering with you to empower the community by providing relevant workforce
More informationBlackBerry Technical Support Services
BlackBerry Technical Support Services Your strategic support partner Support matters With mobile solutions increasingly driving essential business functions, even the smallest amount of downtime has the
More informationSymantec Residency and Managed Services
Symantec Residency and Managed Services Flexible options for staff augmentation and IT out-tasking Symantec Global Services Confidence in a connected world. Symantec Residency and Managed Services provide
More informationOIT User Conference Security Team November 2014
OIT User Conference Security Team November 2014 Welcome and Introductions What will we be covering today? Introductions Office of Information Security and Privacy (OISP) and the Transformation effort Staffing
More informationKevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
More informationAL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
More informationHow To Use Cautela Labs Cloud Agile.Com
1 Correlation and analysis of security and network events in one integrated solution Cautela Labs Cloud Agile. Secured. Log Management 1 Log Management A great deal of events cross your network, servers,
More informationThe Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
More informationManaged Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
More informationMANAGED SERVICES. What are the Advantages of Managed Service for your Organization?
MANAGED SERVICES best practices for your IT environment What are the Advantages of Managed Service for your Organization? Touchbase has been providing managed services to companies all over the world for
More informationInfoblox Education Services Course Catalog
Infoblox Education Services Course Catalog Enhance Your Contribution to the Business, Earn Industry-recognized Accreditations, and Develop Skills that Help You Advance in Your Career FEBRUARY 2016 training.infoblox.com
More informationSYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
More informationSecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor
VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationCCNA Cisco Associate- Level Certifications
CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA
More informationPocket E-Guide. Sponsored By:
Pocket E-Guide Top disaster recovery tips for protecting your VoIP systems For today's enterprise, (VoIP) offers immense business benefits, including unified, voice-enabled applications and significant
More informationRemote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationHow To Make Money On Security For A Large Organization
SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information
More informationCDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE
CDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE DIRECTION OF THE WIRELESS MARKET AND THE INFRASTRUCTURE THAT SUPPORTS IT As mobile devices become more common in the workplace, IT managers must prepare
More informationAre you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
More informationCisco Remote Management Services for Financial Services
Cisco Remote Management Services for Financial Services The global financial services industry continues to evolve to adjust to a shifting market landscape and increased customer expectations. With demand
More informationPluralsight Training Pre-Approved for CompTIA CEUs
Pluralsight Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain
More informationTERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
More informationPRESIDIO MANAGED SERVICES OVERVIEW JULY 2013
OVERVIEW JULY 2013 AGENDA Overview Capabilities Commitment OVERVIEW Capabilities Addressing today s IT challenges Our Capabilities and Approach Network Data Center Collaboration Security Workplace Service
More informationOCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationClick to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
More informationTraining Program Informational Catalog 2014 WWW.STRIDECENTER.ORG
Training Program Informational Catalog 2014 WWW.STRIDECENTER.ORG NOW ENROLLING Dear Partner, The Stride Center takes pride in partnering with you to empower individuals by providing workforce relevant
More informationChristian Wangel. Experience
Christian Wangel Experience February 2014 Arrow ECS Sweden AB Stockholm Senior Sales Engineer Sales and Technical guidance to partners and colleagues in most IT fields focusing on security and data management.
More informationCisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service
Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service Cisco TelePresence Select Operate allows customers to make full use of the benefits of the Cisco TelePresence solution,
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationSCOPE: Role Descriptions/Job Profiles
SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and
More informationHow To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
More informationCisco Network Specialist CCNA
Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web
More informationInternet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationPREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
More informationSector-leading support and in-depth expert knowledge
servicedesk on demand Comprehensive, expertly-managed support services from Axonex that provide flexible and reliable solutions tailored to meet any of your IT infrastructure requirements or challenges.
More informationQRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
More informationE M P I R E C O L L E G E
34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of
More informationNETWORK SECURITY SOLUTIONS
NETWORK SECURITY SOLUTIONS Protecting Your Environment While Maintaining Connectivity OVERVIEW Network security and design is significantly more complex than it was even just a few years ago, and the pace
More informationSERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
More informationWe are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
More information