Corporate Profile. Net Desire Technologies



Similar documents
Proven LANDesk Solutions

AL RAFEE ENTERPRISES Solutions & Expertise.

Protecting your Data in a New Generation Virtual and Physical Environment

2012 North American Enterprise Firewalls Market Penetration Leadership Award

How To Protect Your Cloud From Attack

Acronis Backup Product Line

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Cyberoam Next-Generation Security for Enterprises

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Protecting. All the Time

Market Application Delivery Networking. Products ADC, WAN Optimization, Secure Access

Virtualization Essentials

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

custom hosting for how you do business

DOBUS And SBL Cloud Services Brochure

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

Managed Service Plans

Cloud Failover Appliance

Symantec Backup Exec 2012

Injazat s Managed Services Portfolio

Boost your storage buying power... use ours!

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Virtual Machine Protection with Symantec NetBackup 7

Requirements When Considering a Next- Generation Firewall

APS Connect Denver, CO

How To Protect Your Data From Harm

FUJITSU Backup as a Service Rapid Recovery Appliance

Symantec Messaging Gateway powered by Brightmail

The Fortinet Secure Health Architecture

Kaseya IT Automation Framework

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

Simplifying Server Workload Migrations

Virtualized Security: The Next Generation of Consolidation

Turnkey Deduplication Solution for the Enterprise

Payment Card Industry Data Security Standard

Symantec NetBackup 7.5 for VMware

How To Protect Your Network From Attack From A Network Security Threat

next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

INFRASTRUCTURE SOLUTIONS OVERVIEW

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Cloud Failover Appliance

Clean VPN Approach to Secure Remote Access for the SMB

Unified Threat Management, Managed Security, and the Cloud Services Model

Virtualization Support - Real Backups of Virtual Environments

We look beyond IT. Cloud Offerings

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

White Paper. ZyWALL USG Trade-In Program

VMware Solutions for Small and Midsize Business

White Paper. Make the Upgrade: From Backup Vendor to Data Protection Platform. nfrascaletm. Infrascale Phone: Web:

IT Security. Muscat 15+ ABOUT US IN A GLANCE

VDI Security for Better Protection and Performance

Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business

Information Technology Services

Trend Micro. Advanced Security Built for the Cloud

The Fortinet Secure Health Architecture

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

INFORMATION PROTECTED

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Backup Exec 15: Protecting Microsoft Hyper-V

Information Technology Solutions

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

Q1 Labs Corporate Overview

Readiness Assessments: Vital to Secure Mobility

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Veritas Backup Exec 15: Deduplication Option

Cisco Small Business ISA500 Series Integrated Security Appliances

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

Extending the Power of Your Datacenter

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Solution Overview. Business Continuity with ReadyNAS

Introducing Arcserve Unified Data Protection

Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Solving the Desktop Dilemma

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

Backup and Archiving Explained. White Paper

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Backup Exec 15: Deduplication Option

PRODUCTS & TECHNOLOGY

5 Essential Benefits of Hybrid Cloud Backup

overview Enterprise Security Solutions

Zone Labs Integrity Smarter Enterprise Security

NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction

Monitoring & Measuring: Wi-Fi as a Service

How To Use An Fujitsu Storage Eternus C200C Backup Appliance

CA Cloud Overview Benefits of the Hyper-V Cloud

Availability for your modern datacenter

How To Use Windows Small Business Server 2011 Essentials

What is Security Intelligence?

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Total Cloud Protection

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Transcription:

Corporate Profile

CONTENTS About - 3 Product Overview - IT Security Solutions l KASPERSKY - Endpoint Security for Business l ESET - Endpoint Business Solutions l CYBEROAM - Next-Generation Security for Business l FORTINET - Network Security Solutions 4-7 Product Overview - Network Solutions & Backup Solutions l MICROSOFT - Software Solutions l GFI - Email, Messaging & Network Solutions l ACRONIS - Data Protection Solutions l DOUBLE-TAKE - Disaster Recovery Solutions l SYMANTEC - Backup Solutions 8-10 Product Overview - Network Hardware & Software Solutions l NETWORK Hardware Solutions l NETWORK Software Solutions 11-12 Annual Maintenance Contracts (AMC) -13 Contact Us

Company Profile About LLC is a leading valued added system integration company established in 2012 in Dubai, United Arab Emirates. We at provide End To End information technology solutions with industries leading solution providers, including computer systems, servers, networking systems (both software & hardware), IT security along with annual maintenance agreements (AMC's) and professional services across UAE region. has established strong industry ties with leading vendors in IT security like Kaspersky Labs, ESET, Cyberoam, Fortinet & networking solution vendors like Microsoft, Acronis, Double Take, GFI, HP, DELL, and Cisco. This enables deliver a breadth of best of breed solutions to our customers through our teams of pre-sales, post sales and support experts. Our vision is to lead in the industry by providing best security, IT networking solutions in the region.

IT Security Solutions KASPERSKY - Endpoint Security for Business Kaspersky Endpoint Security for Business - An uncomplicated way to deal with changes and threats in IT environment. IT security software is only as effective as the security engine at its core. Patch management, mobile device management (MDM), encryption, device controls, anti-phishing - all these technologies and many more provide additional, valuable layers of security. Organizations should not compromise on security against known, unknown and advanced threats. Kaspersky can make your job easier as administrators can see, control and protect their IT environment with Kaspersky Endpoint Security for Business. Tools and technologies are uniquely balanced across progressive tiers to meet your evolving security and IT needs. Key Features: v Behavioral Analysis & Heuristics v Kaspersky Security Network for Cloud-Assisted Malware Detection v Active Disinfection v Encryption and Ransomware Defense v Automatic Exploit Prevention v Host-based Intrusion Prevention System (HIPS) & Personal Firewall v Network Attack blocker v Simple, Transparent Management Console Core Advanced Select Kaspersky Security Center Total Kaspersky boasts a comprehensive list of technologies all working together from the same codebase and further assisted by the cloud-based Kaspersky Security Network to give the customers the world-class protection they need. 4

IT Security Solutions ESET - Endpoint Business Solutions ESET Endpoint Business Solutions - is a pioneer in the antivirus industry with its awardwinning NOD32 technology. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today's most sophisticated cyberattacks. Key Features: v A web-console with drill-down possibilities v An independent remote administration agent v ESET Remote Administrator runs on Linux too v Server/proxy architecture for network resilience v Group-centric approach v Automatic RIP & Replace during installation v Support for the virtual environment v And much, much more... END POINT ANTIVIRUS MOBILE SECURITY FILE SECURITY ENDPOINT SECURITY MAIL SECURITY GATEWAY SECURITY ESET END POINT PROTECTION STANDARD ESET END POINT PROTECTION ADVANCE ESET SECURE BUSINESS ESET SECURE ENTERPRISE ESET DESlock+ Encryption: DESlock+ protects your data wherever it is. Patented key management technology lets users share encrypted data seamlessly, while full disk and removable media encryption takes care of compliance issues, helping to prevent fall-out from lost or stolen computers. 5

IT Security Solutions CYBEROAM - Next-Generation Security for Business With organizations experiencing newer trends like high Internet speeds, virtualization, application explosion, increasing use of Web applications and BYOD, they ought to prepare for emerging security risks in their networks along with increasing concerns on insider threats, vanishing 'trust boundaries', compliance management and more. Growing businesses and rapidly expanding network horizons have lead to an increased demand for next-generation security, higher performance, easy security management and quick compliance, in enterprises. Cyberoam's next-generation security caters to the security anxiety and demand for advanced network security in organizations today. Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective. Cyberoam's Extensible Security Architecture (ESA) and multi-core technology carry the ability to combat future threats for organizations' security. Key Features: v Layer 8 Technology for Identity-based Security. v Advanced Threat Protection - Intrusion Prevention System, Gateway Anti-Virus/Anti-Spyware, Gateway Anti-Spam v Application Visibility & Control v On-appliance reporting v Web Application Firewall v VPN - Threat-free Tunneling technology v Web filtering v QoS or Bandwidth management Cyberoam's NG series UTM appliances offer future-ready security with best-in-class hardware, along with software to match, offers up to 5 times the industry average throughputs, making Cyberoam the fastest UTM appliances for SOHO/ SMB segments. 6

IT Security Solutions FORTINET - Network Security Solutions Whether you need to deploy a high performance data center firewall, an enterprise next generation firewall or a smaller UTM device for your distributed enterprise site or small business, there is a FortiGate physical or virtual appliance to fit your unique Network Security requirements. Fortinet delivers High Performance Network Security Solutions that help you protect your network, users and data from continually evolving threats. The diverse product line of complementary solutions enables businesses and governments to consolidate standalone products, embrace new technologies and pursue business opportunities while remaining secure. Key Features: v The industry s fastest firewall appliance - 160Gbps throughput and multiple 40G, QSFP ports. v NSS Labs Recommended Next Generation Firewalls with five time s next generation performance. v An integrated Breach Detection System (aka sandbox ) v High switch port density and Power over Ethernet (PoE) support on smaller UTM appliance delivers secure wired and wireless access and connectivity. v Cloud-Ready Multi-tenant/ Virtual Domain support, Support for VMware and all major hypervisors, APIs for rapid orchestration, fast integration with 3rd party ecosystems. Fortinet combines the FortiOS Operating System with custom FortiASIC processors and the latest-generation CPUs to provide advanced protection from sophisticated, highly targeted attacks, without becoming a network bottleneck. 7

Network & Backup Solutions MICROSOFT - Software Solutions Founded in 1975, Microsoft is the worldwide leader in software, services, and solutions that help people and businesses realize their full potential. Microsoft has established a solid reputation for developing scalable, robust and reliable software to improve your business process and performance. can help you maximize your key Microsoft investments by deploying new solutions or updating and tuning existing installations that can help you get the most out of your IT investment. We are a trusted Partner with Microsoft. Following are the solutions we provide to SME & Enterprises in UAE region: Key Products: v Microsoft Windows Server Systems v Microsoft Windows Client Licensing v Microsoft Exchange and Office 365 Licensing GFI - Email, Messaging & Network Solutions GFI Software pioneers powerful, award-winning IT solutions for small and medium-sized businesses that are affordable and easy to use. With GFI, you can access all the IT Solutions you need from a single source: be it web and mail security, archiving, backup and fax, networking and security software, and hosted IT solutions. GFI believes in keeping technology simple wherever possible, and provide expert help and resources when you need them. Key Products: v GFI WebMonitor - Web security, monitoring and Internet access control v GFI LanGuard - Patch management, Vulnerability assessment and network auditing v GFI MailEssentials - Email anti-spam and antivirus software v GFI EventsManager - Event log monitoring, management and archiving v GFI MailArchiver - Email archiving for compliance, management and accessibility v GFI EndPoint Security - Control, audit and secure removable endpoint devices v GFI FaxMaker - Network fax server software for Exchange/SMTP/Lotus v GFI FaxMaker Online - Simple, fast online faxing without software 8

Network & Backup Solutions ACRONIS - Data Protection Solutions Acronis is a leading provider of easy to use backup, recovery and security solutions. The rise of virtualization, the explosion of data creation and the opportunities of cloud services are bringing new challenges to maintaining effective backup and disaster recovery programs for critical data. Acronis can help you securely migrate, protect and recover critical data wherever it resides in your physical, virtual or cloud environments. With a unified platform and new generation technology, its innovative solutions are designed to ease the management burden and reduce total cost of ownership, while improving your recovery time objectives. "Protect all your business-critical systems - physical, virtual, and cloud - with one efficient backup solution managed by a single, easy-to-use console." Designed specifically for SMB & larger enterprise environments, Acronis Backup provides world-class protection and fast, flexible disaster recovery for all systems in your environment, regardless of its complexity. Key Features: v Tailored products for any business environment from a single workstation to an entire enterprise environment v Customizable solutions for any system setup from virtual machines, physical servers, applications, workstations, and more. v Award-winning backup technology captures an entire system in one simple step v Ultra-fast disaster recovery ensures your back up running in minutes, not hours v Flexible data recovery can restore anything - from a single fiile to an entire server v Multi-destination support can store backup data anywhere (including the Acronis cloud) v Smart backup features reduce network consumption and storage costs v Disk management utilities streamlines IT tasks and boosts system performance v Deduplication can be run on either the source or target side to minimize data movement and maximize utilization of storage and network infrastructure 9

Network & Backup Solutions DOUBLE-TAKE - Disaster Recovery Solutions Double-Take Software is a leading provider of affordable software for recoverability, including continuous data replication, application availability and system state protection and enables customers to protect and recover business-critical data and applications such as Microsoft Exchange, SQL, Linux and SharePoint in both physical and virtual environments. Key Features: v Enhanced mobility, high availability, and disaster recovery for server workloads across physical, virtual, and cloud-based resources. v Cloud-ready right out of the box so that businesses can take advantage of the many benefits of cloud technology. v Full-Server Failover: The Full-Server Failover feature applies the source server's OS configuration, applications, and data to the target server. Because applications do not have to be pre-installed and maintained on the target server, full-server failover is easy to configure. Full-Server Failover supports one-to-one connections of 32bit or 64bit servers and can failover the LAN or WAN to dissimilar hardware. SYMANTEC - Backup Solutions Symantec provides security, storage and systems management solutions for consumers and small businesses to the largest global organizations. The company's unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location. Key Features: v Protect virtual and physical environments and backup to disk, tape, and cloud v Integrated bare-metal disaster recovery, physical to virtual (P2V) and virtual to physical (V2P) recovery v Flexible block-level data deduplication across your entire virtual and/ or physical environment. v Easy-to-use interface with intelligent dashboards and intuitive wizards provide the visibility you need to quickly track, monitor and manage every backup and recovery job 10

Network Hardware & Software Solutions NETWORK Hardware Solutions realizes the importance of partnering with industry leaders. Their products are superior and their support is second to none. team is your advocate to the manufacturers; we are here to hold them accountable for your hardware. Today's technology users are mobile and visual. They can be internal workers, external partners as well as customers. Regardless of location, application, or information stream, our solutions deliver a consistent high-quality and secured network experience to connected users, with the maximum uptime and highest throughput. This increases enduser productivity, satisfaction ratings, business system interaction as well as returns. We can deliver end-to-end network solutions and infrastructure projects in all phases from inception to planning, implementation, monitoring and optimization by using our valuable industry experience, highly focused approach and qualified resources across the region. We are authorized partners for the following brands in Hardware : 11

Network Hardware & Software Solutions NETWORK Software Solutions With the rapid technological advances, increased market pressures and growing sophistication in security threats, businesses in today's world are expected to be constantly vigilant and preemptive. Our highly experienced and qualified security professionals at leverage experience, deep industry knowledge and business-process know-how to protect your business against threats and minimize risks. In today's world, it's widely accepted that organizations can improve productivity and business growth and increase customer trust only by implementing comprehensive security solutions and protecting information and systems from threats and attacks., after understanding in detail your business needs, offers a complete package of security solutions ranging from formulating security strategy for business, network security and design, email and web security, network audit & monitoring, endpoint control and security services. solutions help you mitigate data damage risks and solve your security challenges. From IT Infrastructure installation and configuration to annual maintenance support, supplies authentic products and information technology services to SME and Enterprise companies here in Dubai and across the UAE. is one of the top IT system integrators and IT networking companies in Dubai, UAE. We are authorized partners for the following brands in Software : 12

Annual Maintenance Contracts (AMC) An Annual Maintenance Contract is your best protection against unexpected System/Network failure. Annual maintenance contracts give you guaranteed maintenance at a guaranteed cost. We provide a comprehensive Annual Maintenance Program that provides our customers with a peace of mind, knowing that they are in the safe and professional hands of our network and system engineers. For an Affordable annual fee, all components of their network inclusive of all computer systems and peripherals will be protected against all breakdowns and malfunctions. With the support of technical expertise from our on-site technical team, network and system engineers, all their computing equipment will be kept at optimal performance throughout the year. Annual Maintenance Benefits l Free software upgrades l High quality system administration services. l Higher system ROI by extending usability l Certified technicians skilled in cross-platform environments l Regular Network Health Checkups. l 8x5 & 24x7 Support agreements. 13

Corporate Office: LLC Office: 101/2, BMI Building, Bank Street, Bur Dubai, P.O.Box: 120721 Dubai, United Arab Emirates Tel: +971 4 3598074/73/72/71 Fax: +971 4 3598075 Mob: +971 55 385 0124 Email: sales@ndtuae.com Web: www.ndtuae.com