IT Security Offering Information Systems Security



Similar documents
An enterprise grade information security & forensic technical team

[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *

Cyber Security solutions

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Managed information and communications technology solutions

Caretower s SIEM Managed Security Services

ICT Category Sub Category Description Architecture and Design

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

Assuria from ZeroDayLab

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Lot 1 Service Specification MANAGED SECURITY SERVICES

Chapter 1 The Principles of Auditing 1

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Securing the Service Desk in the Cloud

ANNEXURE A. Service Categories and Descriptions 1. IT Management

Application management services that power business transformation

Delivering peace of mind in outsourcing

Solutions and IT services for Oil-Gas & Energy markets

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

THE WORLD IS MOVING FAST, SECURITY FASTER.

M2TD Consulting Company. Profile M2TD Consulting 2014

Cloud Security Introduction and Overview

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

ICA60208 Advanced Diploma of Information Technology (Network Security)

Request for Resume (RFR) CATS+ Master Contract All Master Contract Provisions Apply. Section 1 General Information

IBM QRadar as a Service

Penetration Testing Services. Demonstrate Real-World Risk

Firewall Managed Service. I.T. Security Specialists. Firewall Managed Service 1

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

BMC Remedy OnDemand. Product Overview

Information Technology Policy

ISO 27001:2005 & ISO 9001:2008

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Our Cloud Offers You a Brighter Future

Autodesk PLM 360 Security Whitepaper

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

ICT Strategy Consulting Services for Schools. Helping schools to establish a clear vision for ICT.

BSNL IDC Hosted Firewall Service. Total Network Security

Cybersecurity The role of Internal Audit

Service Definition Document

How To Improve Information Security

SIEM Implementation Approach Discussion. April 2012

PCI Compliance for Cloud Applications

Roles & Grades Rate Cards and Applicable SFIA Skills

IT Audit in the Cloud

Sales forecasting with SAS Advanced Analytics for the Pharmaceutical sector. A business case

Reliable, Repeatable, Measurable, Affordable

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Software defined networking. Your path to an agile hybrid cloud network

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Operations and Network Center (CORE)

Certified Information Systems Auditor (CISA)

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Information Security Lead (BISRID_054) Solution Architect, (Head of Business Assurance)

About Injazat Data Systems

ICT budget and staffing trends in the UK

Best Practices to Improve Breach Readiness

Procuring Penetration Testing Services

Understanding Management Systems Concepts

FTP-Stream Data Sheet

INFORMATION COMMUNICATION TECHNOLOGY PLAN

Remote Management Services Portfolio Overview

CYBER SECURITY SERVICES PWNED

REQUEST FOR EXPRESSION OF INTEREST (EOI)

Defending against modern cyber threats

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Specialist Cloud Services. Acumin Cloud Security Resourcing

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Security from a customer s perspective. Halogen s approach to security

Technology. Accenture Infrastructure Outsourcing Services

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Logicalis Managed Service Strategy & Support. Geraldine Moatti Proposition Manager, Services

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

REVOLUTIONIZING ADVANCED THREAT PROTECTION

<cloud> Secure Hosting Services

Key Security Questions to Ask a Financial Data Aggregation Provider Is the data aggregation partner you re considering following the best practices

PAAS Public Sector Managed Services

Transcription:

IT Security Offering Information Systems Security

Who are we? NewPoint is a young, dynamic and modern multinational consulting company with a successful trackrecord and a team of multi-discipline IT professionals. NewPoint Spanish ICT Consultant is a multinational consulting company with an international presence and over seven years' experience in the market. We have an excellent reputation in the ICT sector and collaborate with the main companies in each different area of business activity. Technology Services At NewPoint we offer a wide range of structured ICT services in every area of activity: Systems and Communications, Security, Business Intelligence, Customised Development, etc. Our Senior Management leads the company in an approach that is firmly orientated around the client. Professional team Team of over 150 highly qualified professionals and collaborators trained in various forms of information technology, with extensive experience in working with clients in different sectors of business activity. Our knowledge and training in best market practices guarantees our success in the ICT projects we undertake. Client-focused approach We are firmly orientated around the needs of our clients, providing efficiency, effectiveness and productivity, meeting their technological needs and offering flexible and scalable solutions. And all of this is achieved with innovation as a priority. Financial Strength We have a healthy financial position as a result of our firm belief in reinvestment, and the company has seen sustained growth in turnover since its beginnings due to an internal structure that adapts to the actual needs of clients, with a focus on controlling costs. At NewPoint Continued training we firmly believe that success in technology is based, to a certain degree, on continued training in information technology. For this reason we have developed an extensive technological training and capacity-building programme (+15% total) for all NewPoint employees

What do we do? ICT Services ICT Services Business Intelligence IT Security Systems and Communications Software Development ITC Cloud Computing Big Data Installations Systems / Networks Customised solutions Market studies Help Desk Data warehousing Mobility Mobile devices ICT Business Analysis Technical Support Fast Data Virtualization ICT Training Outsourcing / BPO Data Centre Services Voice / Data / Video

Our figures We are a consulting company with solid growth and a young, highly qualified team 29% Crecimiento en Facturación 25% 33% Formación Company growth español Education 9% 4% 17% 70% Titulados Universitarios Grado Superior Grado Medio Otros 2009 2010 2011 2012 Age Average Edad 19% 38% 29% 14% < 25 años 25-30 años 30-40 años > 40 años Team Team 2% 8% 17% 26% 47% Alta Dirección Dirección/Comercial Consultores/Jefes Proyecto Analistas/Jefes Equipos Técnicos/Desarrollador es

Why Security with NewPoint? At NewPoint our team is composed of professionals with varied profiles who provide the company with different skills and approaches, guaranteeing the success of our security management services: Resource specialisation and application of best practices Use of value methods and tools Multiple approaches to projects Contributions from and collaboration with specialists in every area: IT management standards and best practice (ITIL); Security standards and regulations, ISO 27001. Security organisation and management, risk analysis. Technical security architecture; security at an infrastructure and application level, applying the best practices applicable to our clients' organisations. Multi-disciplinary team to ensure analysis and implementation capacity; expert panel (systems, technology, regulation, organisation). Experience in similar projects. Use of accelerators and analysis and installation tools, including approaches, examples and tools based on best practices. Specific method for planning, defining and installing security management systems (ISMS) according to ISO standards. Risk analysis and management tools. Technical security architecture for next generation technologies. Support for highly specialised vulnerability assessment services (including internationally renowned experts in the field of IT Security). Work plan orientated around achieving short-term tangible results, so that actions are implemented faster. Security risk analysis for business processes. Coordination with related projects: ITIL installation, Identity management, etc. Regular monitoring using committees and dashboards that can be used to analyse and review the conclusions obtained from different stages of the project. Guaranteed transfer of knowledge to our clients so that they can operate the installed model.

Our experience in security NewPoint has extensive experience in security and business continuity projects, applying its own methods and reference models to develop security projects, and a team of specialised consultants with the main IT Security certifications:

Information Security Action Lines Security Management Plans Risk Analysis and Management Security Dashboard Adaptation to legal regulations (LOPD, LSSI, ENS, etc.) ISO 27001 certification / Information Security Management System (ISMS) Perimeter Security Firewalls IPS/IDS Security Access Control NAC Security of Business Platforms Hardening Mobile Device Security Penetration Test: White Box Black Box Grey Box Code : Payment Method Security (PCI-DSS, Payment Card Industry Data Security Standard) Fraud Detection S e c u r Po i n t SGSI Automation Tool Identity and Access Management (IdM) (SIEM) Security Incident Management Access Rights (IRM) Encryption and Digital Signature Business Continuity (BCP) and Disaster Recovery (DRP) Planning ISO 22301 IT Security Outsourcing Development of Secure Applications Security Incident Management ecrime Computer crime Regulations audit (LOPD) DLP Data Loss Prevention Sentiment Analysis Digital Reputation Security Training and Awareness Security Indicators Program

Information Security Action Lines NewPoint structures its IT security activity along four action lines, defined according to the type of activities each involves and the specialisation necessary to carry them out. These lines are: focused on compliance, regulations and security organisation defined as the validation line for technical and organisational compliance, penetration tests and low level revisions ISMS machinery and security programs, logical security based on physical components security platforms, large market solutions

Information Security Action Lines Security Management Plans Risk Analysis and Management Security Dashboard Security Indicators Program Adaptation to legal regulations (LOPD, LSSI, ENS, etc.) Certification ISO 27001 27002 27005 Business Continuity (BCP) and Disaster Recovery (DRP) Planning ISO 22301 IT Security Outsourcing Security Training and Awareness ISMS

Information Security Action Lines Perimeter Security Security Access Control NAC Security of Business Platforms Hardening Mobile Device Security Development of Secure Applications ISMS Security Incident Management Security Indicators Program

Information Security Action Lines Penetration Test: ISMS White Box Black Box Grey Box Code : Payment Method Security (PCI-DSS, Payment Card Industry Data Security Standard) Fraud Detection ecrime Computer crime Regulations audit (LOPD)

Information Security Action Lines ISMS ISMS Automation Tool - SecurPoint Identity and Access Management (IdM) (SIEM) Security Incident Management Access Rights (IRM) Encryption and Digital Signature DLP Data Loss Prevention Sentiment Analysis Digital Reputation

Contact Further information? Luis Ángel Reinoso Tello Responsable de Seguridad Tecnológica Head of Technology Security Mobile: (34) 606 122 158 email: lreinoso@newpoint-cs.com Tel: (34) 915 913 010 / Fax: (34) 911 309 950 www.newpoint-cs-com