[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

Similar documents
I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

IT Security Offering Information Systems Security

Phone: Fax:

Information & Asset Protection with SIEM and DLP

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Security Controls What Works. Southside Virginia Community College: Security Awareness

Securing the Service Desk in the Cloud

Bellevue University Cybersecurity Programs & Courses

Lot 1 Service Specification MANAGED SECURITY SERVICES

Solutions and IT services for Oil-Gas & Energy markets

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

CESG Certification of Cyber Security Training Courses

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Critical Controls for Cyber Security.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

McAfee Security Architectures for the Public Sector

Security aspects of e-tailing. Chapter 7

Cisco Advanced Services for Network Security

Certified Information Systems Auditor (CISA)

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Caretower s SIEM Managed Security Services

TCS Managed Security Services

Click to edit Master title style. How To Choose The Right MSSP

An enterprise grade information security & forensic technical team

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Chapter 1 The Principles of Auditing 1

locuz.com Professional Services Security Audit Services

IT Governance: The benefits of an Information Security Management System

Cyber Security Market by Solution - Global Forecast to 2020

Big Data, Big Risk, Big Rewards. Hussein Syed

COMPANY PROFILE YEAR 2013

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CompTIA Security+ (Exam SY0-410)

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

ICT budget and staffing trends in the UK

The Protection Mission a constant endeavor

COMPANY PROFILE YEAR 2012

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

Security Services. 30 years of experience in IT business

IBM QRadar Security Intelligence April 2013

High End Information Security Services

Service Catalog. it s Managed Plan Service Catalog

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Injazat s Managed Services Portfolio

What is Security Intelligence?

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cisco Cloud Assessments. Justin Tang

NEC Managed Security Services

IBM Security IBM Corporation IBM Corporation

ICT budget and staffing trends in Healthcare

Addressing Cyber Security in Oracle Utilities Applications

Building Reference Security Architecture

Since 2005 E-SPIN SDN BHD. All Right Reserved. SIEM - Log Consolidation Management (LCM) Solution

Security Analytics for Smart Grid

Metrics that Matter Security Risk Analytics

How To Buy Nitro Security

PCI Compliance for Cloud Applications

PRIME IDENTITY MANAGEMENT CORE

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

IT Security in Banque du Liban

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Logging In: Auditing Cybersecurity in an Unsecure World

Security as Architecture A fine grained multi-tiered containment strategy

GoodData Corporation Security White Paper

Supplier Information Security Addendum for GE Restricted Data

How To Protect Your Business

Security Information & Event Management (SIEM)

Agile Information Security Management in Software R&D

TrustedX - PKI Authentication. Whitepaper

Understanding Management Systems Concepts

INCIDENT RESPONSE CHECKLIST

IBM Endpoint Manager Product Introduction and Overview

Q1 Labs Corporate Overview

The Evolution of Application Monitoring

How small and medium-sized enterprises can formulate an information security management system

Securing your IT infrastructure with SOC/NOC collaboration

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

CLOUD SECURITY: THE GRAND CHALLENGE

Transcription:

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE [Digitare il sottotitolo del documento] * *

INNOVERY GROUP ITALY - SPAIN MEXICO - ALBANIA Company Profile 1. BUSINESS... 3 2. MANAGEMENT... 3 3. COMPETENCE... 4 4. TRAINING... 4 5. SECURITY & FRAUD MANAGEMENT... 5 6. ENTERPRISE APPLICATION INTEGRATION... 7 6.1 MANAGED COMMUNICATION... 7 6.2 PAYMENT SERVICES... 7 6.3 RETAIL SERVICES... 7 7. TELCO OPERATORS REAL TIME CHARGING... 8 8. MOBILE APPLICATION AND SERVICES... 8 9. CUSTOMERS... 9 10. PARTNERS... 10 BRESCIA Via Creta, 78 25124 Brescia Tel.+39 030 8373600 Tel.+39 030 8373630 MILANO Via P. Borsieri, 22 20159 Milano Tel. +39 02 6685549 Fax +39 02 700596750 ROMA Via G. A. Resti, 63 00143 Roma Tel. +39 06 51963439 Fax +39 02 700596750 MADRID C/Isabel Colbrand, 10 28050 Madrid Planta 4 Oficina 108 Tel. +34 91 3587229 MEXICO CITY Av. División del Norte 3256 Plta Alta, Colonia Ciudad Jardín Delegación Coyoacán. México DF 04370 Tel. (+52) 55 56894143 MANAGEMENT SYSTEM CERTIFICATE ISO 9001 ISO 14001 ISO 27001 ISO 20000 Page 2 of 10

OUR BUSINESS 1. BUSINESS INNOVERY is a privately-owned Joint Stock Company founded in 2001 by high qualified ICT consultants that is a leading ICT Services Provider and Software Developer for medium to large sized customers INNOVERY develops its business cooperating with its affiliates in Spain, Mexico and from 2015 in Albania. INNOVERY INNOVERY ESPAÑA INNOVERY LATINO AMERICA INNOVERY AL Company services are certified by: ISO 9001: 2008 ISO 14001: 2004 ISO 27001: 2005 ISO 20000: 2014 2. MANAGEMENT Our Management Policy is based on the following values: Operating with working groups that combine strategic skills with technical and highly qualified skills; Offering and developing solutions consistent with business model of customers; Quickness and Efficiency; Helping Organization to increase their internal knowhow to be independent in managing the implemented infrastructure. Innovery has expanded by recruiting and retaining highly educated and specialized engineers that are building a unique experience through the implementation of technologically advanced IT service. INNOVERY has consistently increased its revenue over the years: INNOVERY specialties includes multi-vendor system integration and consulting services, including architecture design, integration and installation, legal and organizational solutions along with client training, support, and on-site services. The Company has a strong and diversified customer base building up a particularly strong reputation for quality and innovation: Utilities Telecommunication Public Administration Finance Industries Retailer / Distribution Page 3 of 10

OUR BUSINESS 3. COMPETENCE INNOVERY designs, develops, supports and promotes software ICT applications and solutions by using and integrating the state-of-the-art technologies: ICT SECURITY AND GOVERNANCE ENTERPRISE APPLICATION INTEGRATION MANAGED COMMUNICATION TELCO REAL TIME CHARGING SYSTEM 4. TRAINING By working with Major Companies and Public Administrations in Europe, implementing very complex IT and Application Infrastructures, Innovery has developed several ways to guide his clients through the basics as well as coaching them on best practices for utilizing implemented technologies to the fullest: On-Site Training (classroom and on-the-job ) Recommended Learning Paths based on user roles Advanced and Customized Training MOBILE APPLICATION AND SERVICES PAYMENT SERVICES PROFESSIONAL SERVICES Breakdown by technology of the Company revenue is as follows: Page 4 of 10

SECURITY 5. SECURITY & FRAUD MANAGEMENT Innovery developed a complete and coherent offering to manage Security of IT system and Enterprise Risk and Fraud Management. Security Governance Services Create and Sustain Security Governance Security Planning o Security Blueprint, o Security Roadmap Information Security (ISMS, ISO27001) Security Policies and Operational Procedures Manage Risk Secure Application Building (SSDLC) o ICT Security Assessment (Awareness, Check-Up) Security Operation Center Monitoring & Audit Risk Analysis / Business Impact Analysis Business Continuity & Disaster Recovery (BS25999/ ISO23001) Incident Management Assure Compliance Privacy ComplianceDPS (Documento Programmatico Sicurezza) Compliance (SOX, L.231, ISO 27000, Facta, Basilea II, PCI-DS, SEPA, ITIL...) Security Consulting and System Integration Services Innovery Security Services offer a dedicated security architecture practice that provides you with a coherent and consistent view of the current threat landscape and focuses on maximizing the effectiveness of customer IT security strategy. Support the security program strategy. Address security solution focusing on a specific issue. Help you to understand and fix identified gaps within your security environments. Implement and run effectively multivendor and open sources solutions. Managed Security Services Critical Infrastructure Management Support Services Operation Services Customer Support Service Desk Preventive Incident/Problem Management Application Operation Page 5 of 10

SECURITY INNOVERY SECURITY OFFERING Infrastructured Application Information Digital Identity Organization Network Security Physical & Perimetral Security IDS/IPS Malware NAC Log Management & Audit SIEM System Security Patch Mgmt VA & PT SCADA Security Hardening High avalability Systems Log Management & Audit SIEM EndPoint Security Application Security Safe Coding Code Review VA & PT SOA Security Web2.0 Security Application & Web Firewall egovernment & PKI Infrastructure CA Infrastructure Digital & Electronic Signature Remote Signature Biometric Signature PEC EDI Data Security Database Security Data Masking Data Encryption Content Filtering Data Confidentially SIEM Fraud Management Fraud Prevention Fraud Detection Fraud Case Manager Behavior Analysis BI & Dashboards Identity & Access Management Role Management User Provisioning Enterprise e Web SSO Strong Authentication Federation Privileged Account and Session GRC Security Governance Risk Management Compliance Privacy Security Analytics Business Continuity Security and Fraud Dashboard and Analytics (Security KPI/KRI/KPO) Page 6 of 10

EAI 6. ENTERPRISE APPLICATION INTEGRATION INNOVERY can help customers to integrate both internal and external business processes across the value chain, and do it in smart, profitable increments. Managed Communications - B2B - Managed File Transfer - Business Process Integration - EDI Solutions - Multi-Enterprise SOA - Operating Support to Systems and Applications Bank Payments Services Retail Collaboration Platform (Order Management, Fulfillment Management) Telco Charging & Billing Mobile Application Big Data Relevant to Customer day-to-day support of individual components, Innovery is an IBM Sterling Commerce Partner. Our specialties include system integration and consulting services, including architecture design, integration and customization, application support along with client training, support, and on-site services. Managed Service to support customer all round completes the offering. 6.2 PAYMENT SERVICES Innovery developed a complete and coherent offering to manage Payment Services based on Managed Communication Solution. 6.3 RETAIL SERVICES 6.1 MANAGED COMMUNICATION INNOVERY Operational Services are all task-related activities Retail Business Application, based on IBM Sterling Suite manages Orders, Stocks, Warehouse, Shipment and integration with Customer Care and On-line shop. Innovery has got significant references and capabilities to manage Retail Fulfillment based on Managed Communication Solution. Page 7 of 10

TELCO&MOBILE 7. TELCO OPERATORS REAL TIME CHARGING The Communication Service Provider s landscape is changing faster than ever. A widespread technology innovation, a structural evolution in customer demand and a strong competition, lead the CSP to offer new digital products and services to the market quicker than ever. Billing systems are one of the main constraints to move in new offering model. Focused on dynamic and innovative promotions and time to market, Innovery value proposition on Charging Solution is based through deep knowledge of Ericsson Charging System fully convergent, supporting all services, all access methods and all payment alternatives for Traditional telecom services (SMS, MMS, voice and broadband), permitting operators to do innovative cross-bundles and packages. 8. MOBILE APPLICATION AND SERVICES Innovery has the knowhow and resources to develop Mobile Application, having cross competencies on mobile application development and test, including SSDLC and secure test, on EAI and Security. With experience and a pool of skilled cross platform mobile app developers / programmers, we are able to successfully deliver quality solutions in mobile application development, which is not only compatible but also capable of running on all major mobile operating Systems. The huge experience of Innovery consultants made working with mobile operators, gave them the capabilities as a means of designing mobile services to allow organizations to clear identity, the strategy to enter into the paradigm of BYOND. HP OCMP Platform to manage top ups (physical and virtual), balance retrieval and end user interaction via IVR functions. Our specialties include system integration and configuration management, including business requirements gathering and solution proposition, application architecture design, integration and customization, application support and maintenance along with client training, support, and on-site services. Application Operation to support customer all round. Page 8 of 10

CUSTOMERS 9. CUSTOMERS Page 9 of 10

PARTNERS 10. PARTNERS Partnerships are basic to how INNOVERY conducts his business. INNOVERY has established long term cooperation and business relations with a great number of hardware and technology vendors. Partner Tecnologia Privileged Identity Management: Manage and Update privileged user and administration accounts Biometric Partner Tecnologia Identity Access Management Information Management, Mobile Application B2B Solutions, Enterprise Integration Application, Managed File Transfer (Sterling Commerce) Software Security Assurance (Fortify) High Sensitive Data Management (ArcSight) Identity Access Management, Identity Management, SSO GRC (Archer) Identity Access Management, Identity Management, SSO, Strong Autentication Identity Access Management Enterprise User Activity Monitoring NAC BYOD PKI, Digital Signature and Cryptography; Biometric Autentication Encryption HSM, data protection, Strong Autentication Encryption HSM AntiMalware Integrated Network Security Integrated Network Security Log Management, SIEM, e DLP Vulnerability Assessment Fraud Prevention Solution, Risk and Compliance Solutions, GRC Chargning & Billing Information rights management Security policy management and vulnerability Security data and governance Biometric Solution Web application firewall Recovery and forensic mobile solution Page 10 of 10