Solutions and IT services for Oil-Gas & Energy markets



Similar documents
Cyber Security solutions

Logging In: Auditing Cybersecurity in an Unsecure World

Certified Information Systems Auditor (CISA)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Payment Card Industry Data Security Standard

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

KEY STEPS FOLLOWING A DATA BREACH

Injazat s Managed Services Portfolio

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

INCIDENT RESPONSE CHECKLIST

White Paper. Information Security -- Network Assessment

JOB DESCRIPTION CONTRACTUAL POSITION

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Preemptive security solutions for healthcare

Intel Enhanced Data Security Assessment Form

INFORMATION TECHNOLOGY SECURITY STANDARDS

Managed Security Services for Data

Cisco Advanced Services for Network Security

HIPAA Security Alert

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Critical Controls for Cyber Security.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The Protection Mission a constant endeavor

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

ICANWK406A Install, configure and test network security

How To Protect Decd Information From Harm

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Vindicator Security Solutions. Security for Mission-Critical Applications

Operational Continuity

How To Manage Security On A Networked Computer System

Domain 1 The Process of Auditing Information Systems

Draft Information Technology Policy

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Managed Services. Business Intelligence Solutions

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Caretower s SIEM Managed Security Services

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

ISO Controls and Objectives

How To Protect Your Network From Attack From A Network Security Threat

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

e-discovery Forensics Incident Response

Procedure Title: TennDent HIPAA Security Awareness and Training

North American Electric Reliability Corporation (NERC) Cyber Security Standard

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

Supplier Security Assessment Questionnaire

Service Children s Education

Supplier Information Security Addendum for GE Restricted Data

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Exhibit to Data Center Services Service Component Provider Master Services Agreement

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Client Security Risk Assessment Questionnaire

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Asset management guidelines

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

SCADA Security Training

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

locuz.com Professional Services Security Audit Services

SANS Top 20 Critical Controls for Effective Cyber Defense

Course: Information Security Management in e-governance

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Data Security Concerns for the Electric Grid

Music Recording Studio Security Program Security Assessment Version 1.1

Exhibit to Data Center Services Service Component Provider Master Services Agreement

ICT budget and staffing trends in the UK

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Seven Things To Consider When Evaluating Privileged Account Security Solutions

developing your potential Cyber Security Training

AL RAFEE ENTERPRISES Solutions & Expertise.

Microsoft s cybersecurity commitment

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

WHO ARE WE AND WHAT WE DO?

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

Information Security Services

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

WHITE PAPER. Mitigate BPO Security Issues

AUDIT REPORT WEB PORTAL SECURITY REVIEW FEBRUARY R. D. MacLEAN CITY AUDITOR

Transcription:

Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance with government and industry regulations, the optimal management of business continuity, high reliability, data and information protection, problems related to environment, health and safety and operational risk integrated management are essential conditions for the business. It is therefore necessary to address the various issues in a direct and structured way, combining its own resources with partners who can provide added value in terms of experience, expertise and continuous updating. Akhela for the Akhela offers the not only experience but ICT services and products, solutions, processes and responses that allow to effectively support the needs of every company in the industry. Each solution comes from specific experiences. Constant monitoring of the international mar ket allows to offer customers the most technologically innovative, advanced and reliable solutions. The proven success of Akhela in information systems management and supervision of equipments and safety and business critical systems of important companies, National and Foreign Groups belonging to the demonstrates our ability to successfully respond to complex and challenging requests. The Akhela offer ranges from consulting services and management, design, implementation and management of IT applications, both vertical and cross, to technical assistance and user support, outsourcing and management of ICT infrastructures.

The offer components Infrastructure management Akhela currently manages in outsourcing the infrastructure of the whole information system of an industrial plant in the Oil & Gas sector and manages all applications in ASP. Akhela offers support for all issues related to consolidation, business continuity, high availability, data and information protection, integrated management of operational risk. Here are the services provided in the "Infrastructure Management" area WAN: Infrastructure supply, monitoring and management LAN: Infrastructure monitoring and management Internet Access: Supply, monitoring and management Server (physical or virtual): Supply, monitoring and management, backup, system operations, operations, ordinary and extraordinary maintenance Data Management - DBMS: Supply, monitoring and management Data security and systems Disaster Recovery Solutions development The in-depth knowledge of the and high technological skills allow Akhela to create complex customized solutions, complying with industry regulations for the government of issues relating to environment, health and safety. Here are the services provided in the area of "solutions development" Application Development: Design and development of custom applications by adopting methodologies such as SOA, which guarantee quality, simplify architectures and improve service levels. (collaborative supply chain portals; systems for the calculation of refining margins) Enterprise Application Services SAP System Integration: Development of end-to-end solutions that integrate systems, applications and packages. (SAP Integration/Systems for production systems for safety) Business Analytics (SAP-BW Human Resources analytics) Business Intelligence and Advanced Reporting (Cognos AIA, reports and indicators on actual energy consumption and refinery flows, IGCC, Analysis of shipments of petroleum products via land and sea) Business Process Management (Integrated travel and expenses management)

Solutions and IT services for Application Maintenance Service Services are supplied with a dedicated team, consisting of technical and functional experts with a deep knowledge of context, business processes and technology platforms served. The Akhela Application Management services represent an offer aimed at achieving significant savings through industrialization of development and application maintenance, including consulting analysis of software development processes and opportunities to modernize the application portfolio. The offer aims to incorporate the needs of the client's business and translate them into solutions that can provide a competitive advantage, enabling new business models and processes, and also improving performance reliability and availability of existing solutions. Regulatory compliance is assured. Services are supplied on "mission critical" platforms and solutions (eg, SAP IS-OIL, SAP HCM, Lotus Applications, Chemical Laboratory, Portals,..) in compliance to defined contractual SLA. Services include AM Testing Service. Desktop Management and Fleet Management Akhela, thanks to the support service, can solve problems with fast response times, reducing complexity in a multi-product and multi-vendor environment configured with hardware and software from multiple vendors. The offer is aimed at increasing the availability of IT environments, simplifying their management. Operational and technical specialists on-site also ensure the management of all the computer equipment installed at the users working places. All support activities are centrally accepted and managed by a group of specialized professionals who, after receiving the reports, manage them on their own or forward them to a higher level of support, keeping all activities monitored to ensure compliance with the SLA. The service is supplied in SPOC mode, which provides a single point of contact, through appropriate support technologies, enabling the Akhela staff to be the single point of contact for all possible assistance needs of the customer.

Job Safety Work Permit Akhela has developed, on SAP platform, an integrated system for managing fieldwork, designed in compliance to procedural standards to ensure that potentially dangerous works in high-risk industrial sites are carried out in safety. The system makes it possible to manage: the requirements for the necessary preparatory work, including an evaluation of hazards the necessary precautions to ensure the safety of equipment the preparation of a working procedure that: - clearly defines the scope of work - describes a logical sequence with the procedures of the work itself - clearly defines responsibilities - makes it binding to train operators properly - confers adequate information about the potential dangers - ensures the delivery of appropriate safety equipment - draws up and issues a work permit in writing, with or without attached checklist, which must be countersigned by both the supervisor and user that carries out the job. DUVRI Single document for interference risks evaluation In the context of job safety, Akhela has created an integrated procedure for the production and publication of daily automated DUVRI * integrated with the computerized management system of " Work Permit ". * "The employer must promote cooperation and coordination referred to in paragraph 2 by preparing a single risk assessment document to indicate the steps taken to eliminate or, where this is not possible, to minimize the risk of interference. (Article 26, paragraph 3 of Legislative Decree no. 81/2008)

Solutions and IT services for Active Safety At Work Akhela has developed a system that prevents errors or omissions in the use of Personal Protective Equipment (PPE) by the Operators. The system: verifies that the user is equipped with the PPE provided for a given work and keeps them for as long as needed to complete the activity actives audible alarms in order to notify the operator that one or more PPE are not detected by the capture device The application integrates: Voice recorder Audible alarms in case of non-detection of required PPE System logging of alarm events during the execution of the job The solution uses a smartphone, as capture device, and ad hoc tags made with wireless transmission technologies, ultra low power, with very low fuel consumption that makes battery duration similar to PPE themselves. Security Boa Industrial plants conditions require special attention to the protection of personnel who work in certain environments. In this context, a point of great attention is the risk of accidents due to interference between activities relating to a same area between operators of different contractors. Akhela has created a tool that represents a great help to strengthen safety of workers since it verifies that there are no overlaps between different worker teams on the same area during the course of work activities.

The main element of the system is a portable device, which can be positioned in an area in which the risk of overlap exists and is able to detect the presence of different contractors personnel through signals sent from the tags worn by the operators. The system uses different technologies for wireless communication with the tag and sends data to a central server. Security Industrial Security Akhela has innovative methodologies for risk assessment in safety critical environments and to mitigate the impact of unsafe technologies of automation systems, which must ensure the highest level of reliability. Akhela offer on Industrial Security is modular and each component is independent and can be supplied individually. The set of all modules, however, represents a coherent system of rules, procedures and extremely effective controls, able to ensure the security of the company against risks from inadequate protection of the control systems. Assessment: Security assessment of SCADA systems and distributed control systems (DCS) in order to identify any weaknesses that could allow harmful or illegal activities within the control. The methodology ensures complete continuity of services and does not allow any form of Penetration Testing in production environments Policy Definition & Compliance: Definition and revision of security policies and verification of compliance with industry standards and regulations Deployment Network Protection: Implementation of policies and security measures in continuous uptime Security Monitoring & Management: h24 Service log monitoring and management of security (alerting and incident management) Contingency Planning: Creating, implementing and testing contingency planning strategies to ensure continuity of SCADA/DCS service networks

Solutions and IT services for Cyber Security Security management is a strategic factor for organizations. Protecting data and assuring continuity of information systems, are crucial requirements for business. Always more sophisticated attacks, targeting every conceivable vulnerability in the information infrastructure, applications, processes and behaviour of individuals, call for a direct and structured response to the problem. To this end, a specialist partner can bring added value in terms of expertise, competencies and continually updated protection. In this context Akhela offers the security services and products and designs customized solutions and protection systems. Vulnerability Assessment & Penetration Test: periodic Vulnerability Assessment and Penetration Testing Services in Wireless and VoIP environments, aimed at assessing the degree of security of networks, systems and applications. The activities are carried out in Ethical Hacking mode carrying out targeted manual activities File sharing management and protection: solutions that allow to identify and automatically correct the lacks of access permissions, to have historical data, to identify the "Data Owner" and non active data, automating and implementing control processes Privileged Passwords Management: secure password system administration, devices and applications by authorized users Data Protection & DLP: Methodologies and Solutions to prevent confidential information leakage. The offer includes the steps of: Data Classification - Discovery of confidential information on the corporate network, archives, files shared, both at server and endpoint level - Monitoring and protection of confidential data output (via ftp, email, IM/P2P, web, printers) Internal fraud detection: Solutions for the monitoring of business applications that allow to record the behaviour of users and system administrators, in order to pro-actively monitor threats to privacy and security through behaviour analysis Dashboard for monitoring (eg Ipad/Iphone) of Security and Business Continuity on mobile devices - provides a comprehensive and integrated view on security and business continuity, providing summary information on services status VA & Management Services: Services supplied by the Akhela SOC for the ongoing evaluation of the infrastructure security degree of the customer and for the prevention against cyber attacks aimed at compromising the continuity of service or retrieving confidential information illegally

Solutions and IT services for FW-IDS-IPS-IDP Operational Management: SOC Operations fee for the operational management of the equipment FW, IDS, IPS and IDP (Security Change Management, Security Problem Management, Security Event Management). Delivery mode Outsourced, In-Sourced, Co-Sourced H24 Incident Management: h24 Security Help Desk for immediate support, in case of extraordinary events such as accidents or internal attacks, in order to take action quickly and effectively Computer Forensics: Consulting activities supplied by the Akhela Computer Forensics Lab Akhela making use of personnel and instruments certified for: - Recovery of Deleted or Encrypted data - Technical Support Specialist for preventive defensive investigations - Fraud contrast and post attack investigations - Technical consultant for the defense of investigated parties - Investigative technical support for Legal Offices and Private Companies Physical Security Akhela, thanks to its experience in critical environments, in which security and safety have a fundamental importance, is specialized in the design, construction, operation and maintenance of Physical Security systems. Global Service Access Control: Access Control and Presence management systems, integrated with SAP and e-learning platforms Integrated Management Reporting System of External Emergencies which includes maintenance and technical assistance related to emergency signalling system, provided by Akhela, and installed in the industrial area to comply with Law Seveso II Global Perimeter Security Service which includes the following activities: - Design, supply and implementation of security systems - Preventive Planned maintenance and corrective perimeter intrusion detection system at the site and of its security and video surveillance systems Cagliari - Milan - Rome - Turin - Maranello follow us