STEALTH INTERNATIONAL INTELLIGENCE SECURITY SERVICE INC.



Similar documents
CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.

Creativity. Technology. Results.

Print4 Solutions fully comply with all HIPAA regulations

Reading Road, Suite # 2 H, Edison, NJ, USA, Phone : 1 (732) info@artechglobal.com

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

Required Software Product List

eflair Management Systems

PT. Advance Norms Technology & Systems

Web Technologies Week 4 Hosting, Servers and Databases. Context. Contents. MSc in Computing Computing - IBITE Liverpool Hope University College

SBP is a software development outsourcing company, established in 2004, and headquartered in Bucharest, Romania.

Isra Software company ISOC :

Your Information Technology Partner. Company Overview. Copyright Mantra IS LLC. All rights reserved.

Bellevue University Cybersecurity Programs & Courses

SCF-16, III Floor, Phase 3B2, Mohali, India 91 (172) , USA +1 (646) , AUS +61 (88) , sales@indiwork.

Information Security Services

HP Security Assessment Services

Required Software Product List

Australian Computer Society ANZSCO ICT Code descriptions v Further updates will be issued in

C A M I N O T e c h n o l o g i e s

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Securing the Service Desk in the Cloud

ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS F-SE-13-T01 WEB DEVELOPMENT SERVICES

Network Test Labs (NTL) Software Testing Services for igaming

How To Succeed At A High Level Of Success

S-Power Software Solutions Enterprise Class Software Solutions for Small- and Medium- Sized Business Environments at Breathtaking Price

TUTORIALS GENERAL ASSESSMENTS ADMINISTRATIVE ASSISTANT

E-commerce. Web Servers Hardware and Software

WEBSITE DESIGN & MANAGEMENT. Website Services Package Includes: WEB MARKETING WEBSITE DESIGN & DEVELOPMENT MANAGEMENT

Computer Science A.A. Degree, Certificate of Achievement & Department Certificate Programs

capabilities statement

SKILLS HIGHLIGHTS: W e b a n d G r a p h i c D e s i g n e r

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Electronic Commerce Engineering

Call us today to help you (888) LAWSON CERTIFIED CONSULTANTS

Cybernetic Global Intelligence. Service Information Package

GRAD Analytics Advanced price and promotional analysis interface. Reactive UI providing dimensional visibility to marketing analysis.

ASSOCIATE IN ARTS DEGREE-60 UNITS

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Information Security Policy

BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION

Business Information System Courses Description

Short notes on webpage programming languages

MANAGED MICROSOFT AZURE SERVICES

Company Background. Table of Contents: Company Background FPDS Services Price Matrix Labor Category Descriptions Services Provided

SCHOOL DISTRICT OF ESCAMBIA COUNTY

INFORMATION SECURITY TRAINING CATALOG (2015)

How To Develop A System For A Car Dealership

Luca Caucchioli Information Technology Consultant

Pemrograman Web. 1. Pengenalan Web Server. M. Udin Harun Al Rasyid, S.Kom, Ph.D

OFFSHORE SOFTWARE DEVELOPMENT

Key Considerations for Vulnerability Management: Audit and Compliance

Corporate Spying An Overview

DEPARTMENT OF INFORMATION TECHNOLOGY GOVERNMENT OF GOA TECHNICAL SPECIFICATIONS FOR GOA GOVERNMENT WEBSITES

E-commerce. Chapter 4. Building an E-commerce Web Site. Kenneth C. Laudon. Fourth Edition. Copyright 2007 Pearson Education, Inc.

STEP Networks Inc North routledge Park Ontario, Canada, N6H 5N5 OUR COMMITMENT TO EXCELLENCE

Firewall Administration and Management

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Weaving a Web Development Curriculum

COMPUTER SCIENCE (AS) Associate Degree, Certificate of Achievement & Department Certificate Programs

SUPPORTING HIPAA COMPLIANCE THROUGH MANAGED HOSTING.

DATABASE-DRIVEN WEBSITES: A WORKING COURSE MODEL

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

W16 INTEGRATING SECURITY INTO THE DEVELOPMENT LIFECYCLE. Ryan English SPI Dynamics Inc BIO PRESENTATION 6/28/2006 3:00 PM

Put into test the security of an environment and qualify its resistance to a certain level of attack.

BMC s Security Strategy for ITSM in the SaaS Environment

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Is your business prepared for Cyber Risks in 2016

Zeus Networks Company Portfolio

Diploma in Computer Science

Building a Systems Infrastructure to Support e- Business

Easily recover individual files or full disaster restores. Your data will be there when you need it - it s ready to restore. Install it and forget it

RISK ASSESSMENT On IT Infrastructure Mr Pradhan P L & Prof P K Meher

Mobile Apps Development Cross Platform Mobile Apps Development Mobile Apps Porting & Migration Mobile Apps Testing & QA

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Windows 2000 / NT 4.0 / 95 / 98, MS-DOS, Suse Operating Systems

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

OracleAS Identity Management Solving Real World Problems

Helping Corporations Defend Enterprise Attacks through Security Awareness & Desktop Security

Client Requirement. Why SharePoint

What? Me, Worry? I've Already Been Hacked. Haven't You?

A full time position in software design and development that would enhance my technical skills.

The guiding principles of this service are to deliver a hosting solution fit for the customers needs; this includes features such as;

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

CURRICULUM VITAE. Masters (MS) in Management in Information Systems (MIS). Temple University Fox School of Business Philadelphia, PA (USA).

Understanding Management Systems Concepts

How to Choose a Cloud Service Provider

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Xelude. Company Profile. Information Systems.

Information Technology Services

How To Write An Ets Request For Proposal (Rfp)

Security, Reliability, Scalability

Deploying Firewalls Throughout Your Organization

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Joe Smith XX Somewhere Street, Somewhere Ontario X1X 1X1 Website:

SequeLink Server for ODBC Socket

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.:

Efficient Technologies Intelligent Solutions. Corporate Profile

Annex 10 Standard Profile Specification and Request Form for Services

Transcription:

STEALTH INTERNATIONAL INTELLIGENCE SECURITY SERVICE INC. "... professionalism, security and intelligence...

Our mission "... professionalism, security and intelligence... Security is becoming a more and more essential issue in our lives and in business. It is our goal to raise the awareness of security threats and implement effective solutions, before missuse and loss of confidential information happens. Each customer is unique and needs individual security solutions. Our mission is to provide our customers in industry and government with security solutions, which meet their specific challenges. We enable them to profit from the advanced use of new technology and our know-how. We strive to build long-term client relationships based on mutual trust, respect and loyalty.

Focus Areas and Customers Governments and state service institutions Intelligence Aerospace and Defense Telecommunications (satellite) Information Technology Electronic & Space Systems Financial sector, Banks and Insurance Healthcare Hotel and Gastronomical Sector Insurance sector

What We Do... Stealth - ISS is an IT security solutions provider and integrator offering a variety of security services world-wide: Vulnerability Assessments (network, servers, applications, database) Penetration Tests (extern and on-site) IT Security Regulation Compliances and Audits Secure/Wireless/Satellite Network Design IT Consulting and Project Management Security Police Assessment and Implementations Secure Data Storage and Data Center Services PKI systems, Disaster recovery, VTC Content Management

IT Security Services Computer and Data Security As the Internet and technology continues to grow, businesses are shifting to the digital continuum to work faster, communicate better and establish stronger customer and supplier relationships. But the move toward an increasingly networked business world creates challenges. And security is at the forefront. Security concerns take many forms. They can be hackers, viruses, bugs, competitors or disgruntled employees. Whatever the security issue, you need to be protected. It's no longer a matter of choice. It's a matter of survival. STEALTH - ISS Inc. works with you to define your security goals and design the right and individual solutions and for your business.

What We Do... Commercial Intelligence and Industrial Espionage Security Secretary of Defense William Perry has warned: "We live in an age that is driven by information. Technological breakthroughs... are changing the face of war and how we prepare for war." Our services in this field include: implementing IT security to prevent data loss network and traffic monitoring surveillance gathering information background checks detection of spy technology risk analysis countermeasures

IT and Data Security/Networks What We Do... STEALTH - ISS Inc. works with you to define your security goals and design the right and individual solutions and for your business. STEALTH - ISS's Inc. services are: to implement new and secure information technologies for regional and international security integration to inform about the latest IT-technologies, in order to find solutions and realize projects to secure our clients from industrial espionage, threats, vulnerabilities, data and identity theft to inform about data security and protection based on national/internationals standards and guidelines and to implement them (ISO, HIPPA etc). to find security flaws and vulnerabilities in all fields and implement security needs/standard for individual companies, organizations and governments. to design and implement IT security projects and networks to realize complete IT project planning and management for our clients perform vulnerability assessments for web sites and portals with databases, online transactions and data collection features

What We Do... Counterintelligence Technology and Science are the fields, which are the main focus for industrial espionage: computer, military, biotechnology, medicine, space science, energy and aviation. We specialize in corporate and business counterintelligence (CI), offering solutions to protect information beyond security, gates, dogs and alarms from those who are not authorized to receive it, to counter potential threats and to enhance security. We work with the the latest technology, proven methods and provide feasible, effective and unique solutions for your company, BEFORE you realize that you might become a victime.

IT Security Services Consulting Services: for information technologies for infrastructure development for complex integrated information systems and networks on interational/iso/nato INFO SEC standards system integration security compliance (e.g. HIPAA, GLB, BS7799, NIST -800) project management telecommunication and security systems risk management and business continuity

IT strategy and projects/audits: IT Security Services preparing IT strategy IT audit realizations functional and technical IT architecture risk and security analysis risk and security management development secure infrastructure design ISO assessments and realizations e.g. ISO 17799/BS 7799 OS, application and database security analysis evaluation of secure internet infrastructure risk assessments and DMZ analysis detailed security scans (internal netweork and external access) vulnerability assessments and penetration testing Database, application, network, server risk assessments

IT Security Services Security Compliance : Implementation, audit and consulting on: NIST-800 ISO 17799/BS7799 Sarbanes-Oxley Health Information Portability and Accountability Act (HIPAA) Gramm-Leach- Bliley (GLBA)

IT Security Services Other IT Services: Development of Emergency Plans (Business Continuity) Security policies (audit, deign and/or implementation) Identification and Intensifications (e.g. PKI, access control etc.) Network security (analysis, design, development, improvement) Operating system and database security Internet Security (IDS, firewalls, VPN, Encryption etc) Information and data security Hacker prevention Technology implementation and sales Incident handling and response planning Vulnerability Assessments (security scans and penetration tests) Secure (Satellite) Communications and Video Teleconferencing (VTC) Enterprise Content Management Managed Services

Development Stealth - ISS provides innovative and comprehensive Technology Solutions to Global enterprises and emerging Internet businesses. From Web Development, intranet solutions, database applications to Back-End Systems to Application Development we have demonstrated our ability to develop solutions that enable our clients to generate both new revenue opportunities and streamline existing operational systems. Software & Technology Application Development Database Development Enterprise System Development Handhelds & PDAs Ecommerce Website Design Flash Online Forms & Database Integration Usability & Interface Design Web Design & Development Web Programming PROGAMMING TECHNOLOGIES AND DESIGN: ASP /ASP.net, JSP & Java Servelet, Visual Basic (+VBA, +VBScript), PHP, JSP & Java Servelet, COM/DCOM, PHP, XML, XSL, HTML, DHTML, UML, HPGL, CSS, VC++;C/C++, ActiveX, Basic, Delphi, Windows /.Net, ODBC, DAO, OLE DB, Delphi, ColdFusion, Dreamweaver, Director, Fireworks, Flash, Photoshop, Illustrator, Pagemaker, DATABASES: MS SQL Server, mysql, Oracle, Microsoft Access, dbase, Sybase, FoxPro OPERATING SYSTEMS/PLATFORMS: MS Windows NT/98/2000/XP/2003/CE, UNIX, DOS, HP UNIX, Solaris, Linux APPLICATIONS/WEB SERVERS: Microsoft IIS, Apache Web Server, MTS

Data Center Services STEALTH - ISS Inc. takes the uncertainty out of hosting - and puts service, performance and value back in. No matter which hosting type or plan you choose, your site receives 24/7 maintenance and protection in our and our partners' world-class data centers. And you get the expert, friendly service you deserve. Build your server the way you want it. Take any one of our four base servers, add the operating system of your choice, and choose the hardware, network, and software options that are right for you. We offer: Virtual Private and Dedicated Servers Managed Services Storage / Backup Services Web Hosting Services 100% network uptime. No packet loss from us to our Tier 1 backbone bandwidth providers. Below 3 ms latency from us to our Tier 1 backbone bandwidth providers. Security Customer service Easy upgrade options 5 different data center locations throughout the US

Technology We use the latest technology and know-how which is used by the following institutions: U.S. Dept. of Defense U.S. Dept. of Agriculture U.S. Dept. of Commerce / Census Bureau U.S. Dept. of Justice / FBI U.S. Dept. of the Treasury U.S. Dept. of Transportation / FAA National Security Agency Central Intelligence Agency American Express AT&T Bank of America Boeing Booz-Allen & Hamilton Charles Schwab Citibank Computer Sciences Corp. EDS Fidelity Investments GE Aircraft Hewlett Packard Hughes Aircraft Lockheed Martin Lucent ManTech International Corp. NCR NMT Corporation Pitney Bowes PriceWaterhouseCoopers Raytheon Rockwell Collins Rolls Royce SallieMae Swank HealthCare Services TRW Unisys Wells Fargo Bank

Project Solutions Services and know-how can be provided on: Project basis (consultation, development, project management, research and/or support) Specific project (business deal or contract) General consultation and support (based on time) Continuous services (e.g. network security monitoring, periodic vulnerability assessments)

Partnerships and Cooperations

Additional Information In business since 1996 (in Europe) Established in US in 2002 Small Business NAICS: 516110, 518111, 518210, 54512, 54519, 541618, 541511 Member of Tampa Chamber of Commerce since 2004 DUNS: 12-622-5445

Stealth - ISS Benefits Custom solutions Experienced account teams Rapid delivery of IT solutions Responsive to client needs Knowledge of legacy and emerging technologies Proven corporate stability Adaptive to client environment Repeat customers Years of success Highly skilled team members Certified and experienced security engineers and staff Proven methodology Strong project management team Multivendor capability International solutions and project realization New technology implementation

Markets until 2005 International Services

STEALTH International Intelligence Security Service Inc. www.stealth-iss.com info@stealth-iss.com iss.com Phone: + 1 (727) 820-0891 Fax: + 1 (206) 600-4477 137 Pompano Drive SE, St. Petersburg, FL 33705 Offices: Germany Slovakia - USA