Data Security Solutions



Similar documents
CONTENTS. PCI DSS Compliance Guide

Accelerating PCI Compliance

IT Security. Securing Your Business Investments

RSA SecurID Two-factor Authentication

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

Supplier Security Assessment Questionnaire

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

custom hosting for how you do business

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Mobile Device Management Delivering control and security. Multinational Solutions

Basics of Internet Security

Emilio Garcia Barzanallana Guerra

Security aspects of e-tailing. Chapter 7

Enforcing PCI Data Security Standard Compliance

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Introduction. PCI DSS Overview

CONTENTS. Abstract Need for Desktop Management What should typical Desktop Management Software do? Securing Desktops...

Conquering PCI DSS Compliance

CRIPT - Cryptography and Network Security

PCI Compliance 3.1. About Us

Payment Card Industry Data Security Standard

Internet. SonicWALL IP SEV IP IP IP Network Mask

Security Controls What Works. Southside Virginia Community College: Security Awareness

Proven LANDesk Solutions

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Building Reference Security Architecture

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

74% 96 Action Items. Compliance

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Information Technology Security Procedures

PCI Solution for Retail: Addressing Compliance and Security Best Practices

How Reflection Software Facilitates PCI DSS Compliance

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Network Security: A Critical Component to Any Business IT Plan.

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Guardian365. Managed IT Support Services Suite

White Paper. ZyWALL USG Trade-In Program

VERIFONE ENHANCED ZONE ROUTER

Symantec Mobile Management 7.2

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

How To Make Money On Security For A Large Organization

Security Controls for the Autodesk 360 Managed Services

Mobile Admin Architecture

PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

Symantec Mobile Management for Configuration Manager 7.2

Did you know your security solution can help with PCI compliance too?

Client Security Risk Assessment Questionnaire

LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software

Tenzing Security Services and Best Practices

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Symantec DLP Overview. Jonathan Jesse ITS Partners

VPN Lesson 2: VPN Implementation. Summary

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Research Information Security Guideline

Compliance and Security Challenges with Remote Administration

NETWORK ADMINISTRATOR

Payment Transactions Security & Enforcement

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

AL RAFEE ENTERPRISES Solutions & Expertise.

University of Pittsburgh Security Assessment Questionnaire (v1.5)

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Catapult PCI Compliance

Symantec Mobile Management 7.1

CloudDesk - Security in the Cloud INFORMATION

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Course: Information Security Management in e-governance

Protecting Your POS System from PoSeidon and Other Malware Attacks

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

Snow Agent System Pilot Deployment version

Information Technology Solutions. Managed IT Services

The Protection Mission a constant endeavor

A brief on Two-Factor Authentication

Managed Security Services for Data

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

Securing the Service Desk in the Cloud

A) Secure Virtual Private Network (VPN) access services.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Security Policy JUNE 1, SalesNOW. Security Policy v v

Remote Vendor Monitoring

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

I.T. Assurance. Letting you do what you do best... run your business

CSP & PCI DSS Compliance on HP NonStop systems

Information Security Basic Concepts

Transcription:

Data Security Solutions Calle 50 final Teléfono (507)2261125 Edificio 14, Ofc. # 1 (507)2262284 Urbanización Coco del Mar Fax (507)2262285 Data Security Solutions Company Profile

Our Company Data Security Solutions, S.A., leader in network security, was founded in 1998 with the purpose of providing the markets needs for the solutions and services necessary to prevent the vulnerability of networking systems to a maximum by any type of intruder, who can severely damage the competitiveness of a company. Our exclusive group of clients includes banks, finance, insurance, entertainment, advertising, consumer goods, publishing, and government. The Solutions offered by us, through our products and services cover a variety of network security issues, such as: Advising for the establishment of security policies. Implementation and control of security policies. Risk evaluation and vulnerabilities detection on LAN s and WAN s. Token PIN One Time Password based access Solutions. Real time attacks detection, plus inmediate response, protecting the information against external and internal threats. (Intruder Detection). Biometric user authentication (Local computers and entire domains) General Network Securit (Virtual private networks - VPN). Windows and Linux based Firewalls (software and hardware) Web servers protection. Data encryption with Standard algorithms (DES, IDEA, RSA, DSS, Diffie- Hellman, etc.). Remote Control desktop administration. Software and hardware inventories, license usage control, software deployment, etc. Web applications development and more.

Our Vision Be the leader in network security in our region, integrate services and network security solutions with highly trained personnel with the last technology that can be offered to your business. Our Mission Help our customers to avoid innecesary and expensive costs Ayudar a nuestros clientes a evitar el alto costo que involucra la pérdida de sus datos y la violación de las políticas de seguridad de su empresa. Proven track record Data Security Solutions has provided trusted and confidential service to a wide variety of industries, including financial services, manufacturing, warehousing and distribution, retail and service companies since 1998. Helping key decision makers The services and solutions provided by Data Security Solutions, S.A. are the best choice your organization because it will obtain and secure data availability, as well as the integrity and the levels of confidentiality in your daily operations and corporate well being. Data Security Solution s experience and expertise in the network security field is extremely helpful to key decision markers, helping decision makers, so they can choose the most suitable options; and will also aid the network engineers to implement the technologies smoothly.

Serving clients in their diverse endeavors Data Security Solutions provides many services, such as updata, analysis, advice, and custom consulting to the world's leading industry suppliers in information, technology and communications. The other type of customers we provide these services include the foremost organizations in banking and finance, insurance, entertainment, advertising, consumer goods, publishing, and government. Independent Advice Data Security Solutions does not depend on any equipment manufacturers, distributors or installation companies, our solutions are the most appropriate because they are based on the experience we have obtained in the security field. Outsourcing proves its value As most companies try to remain competitive by outsourcing specialist advice, Data Security Solutions provides highly experienced security consultants to supply the best advice on the most appropriate level of security to their networks. Helping organizations concentrate on their core business Data Security Solutions can provide clients with the assurance that what they are buying will meet their requirements and will provide the expected level of security enabling them to concentrate on their core business. Framework Data Security Solutions helps organizations to design, implement, maintain and modify their security architecture. With our model, organizations can assess the information risk associated with business objectives, and then implement the 'right' level of trusted e- security. Our Lifecycle Security Model also helps organizations to understand what level of trust organizations require to create such a confident and reliable environment.

Our Products Our line of product includes F-Secure Antivirus complete product line Symantec Enterprise Security Manager Symantec Intruder Alert Symantec Manhunt Symnatec NetRecon Symantec Raptor Firewall Symantec Desktop Firewall Security Expressions from Pedestal Software Fortress, Clean Slate, Historian form Fortress Gran Corporation Net Support complete product line form PCI United Kindom Sonicwall firewall Astaro Firewall Zix Corp Message and Web Inspector UareU pro Digital Persona Powerlock from Powertech Visual Security Suite from Barcelona04 Visual Control Center from Barcelona04 Nomax And much more

Our customers We can count in our important goals achieved in these years of intense work, national and international projects, seminars, products and services provided to prestigious companies and organisms such as : Banco Nacional de París, Credicorp Bank, Bancolat, Metrobank, Banque Sudameris, Banco BBVA, Cable Onda, Productos Toledano, Bancafé, Banco Internacional Costa Rica, Coca Cola Interamericana, Bac International Bank, Compañía Nacional de Seguros, Casinos Alta Cordillera, Grupo Melo, Multicredit Bank, Panabank, Banco Nacional de Panamá, Banco Santander, Atlantic Security Bank, Bank Boston, ASSA Cía de Seguros, Banistmo, Banco Continental, Financiera La Bambina, Pinturas Glidden, Comisión del Canal, Contraloría de Panamá, Credirey, Clicac, Tribunal Electoral, Tropigas, Corporación Medcom, BIPAN, Super 99, Franquicias Panameñas, Fibropan, Bahía Las Minas, Ministerio de Economía y Finanzas, AES Panamá, Hotel El Panamá, Fritolay, Celloprint, Fiesta Casinos, Diario El Universal, Epasa, Cámara Americana, Asamblea Legislativa, entre otros... In Central America, some of our customers are: Credomatic de Centroamérica Costa Rica Telefónica CELTEL Honduras Grupo POPA Honduras Banco Granai & Towson Guatemala Banco Ficohsa Honduras Bañes, Costa Rica INDE (Instituto Nacional de Electrificación de Guatemala) Telefónica Intelco, Belice And much more.