IT Security. Muscat 15+ ABOUT US IN A GLANCE



Similar documents
Proven LANDesk Solutions

How To Buy Nitro Security

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

SANS Top 20 Critical Controls for Effective Cyber Defense

The ForeScout Difference

ForeScout MDM Enterprise

Cloud Backup and Recovery for Endpoint Devices

Driving Company Security is Challenging. Centralized Management Makes it Simple.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Symantec Endpoint Protection

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Endpoint protection for physical and virtual desktops

Payment Card Industry Data Security Standard

McAfee - Overview. Anthony Albisser

Malware and Other Malicious Threats

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Endpoint protection for physical and virtual desktops

Injazat s Managed Services Portfolio

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Q1 Labs Corporate Overview

Hands on, field experiences with BYOD. BYOD Seminar

Check Point Positions

Enterprise Security Solutions

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Kaspersky Security for Mobile

Symantec Endpoint Security Management Solutions Presentation and Demo for:

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Mobility Challenges & Trends The Financial Services Point Of View

Nessus Agents. October 2015

Bitdefender GravityZone Sales Presentation

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

IBM Endpoint Manager for Mobile Devices

Mobile Device Strategy

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

End-user Security Analytics Strengthens Protection with ArcSight

Kaspersky Security for Business

IT Enterprise Services

KASPERSKY SECURITY FOR BUSINESS

Requirements When Considering a Next- Generation Firewall

ForeScout CounterACT. Continuous Monitoring and Mitigation

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

How To Achieve Pca Compliance With Redhat Enterprise Linux

VMware Horizon FLEX 1.5 WHITE PAPER

AirWatch Solution Overview

DOBUS And SBL Cloud Services Brochure

RSA SecurID Two-factor Authentication

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Cisco TrustSec Solution Overview

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Workplace

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

Comodo Certificate Manager. Comodo Enterprise

RFI Template for Enterprise MDM Solutions

How To Protect Your Mobile Devices From Security Threats

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Readiness Assessments: Vital to Secure Mobility

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Enterprise Computing Solutions

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Strengthen security with intelligent identity and access management

Two factor strong authentication. Complex solution for two factor strong authentication

Dynamic Service Desk. Unified IT Management. Solution Overview

Samsung SED Security in Collaboration with Wave Systems

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Top 10 Reasons Enterprises are Moving Security to the Cloud

Security Management. Keeping the IT Security Administrator Busy

Guideline on Safe BYOD Management

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

EasiShare Whitepaper - Empowering Your Mobile Workforce

Transcription:

www.insight.co.om insightoman insightoman insightoman insight-information-technology

www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at our head office on the third floor in Muscat Grand Mall. GPS: 23.5903507, 58.4130823 TEL: (+968) 24488905 We are specialized in providing IT security services with superior focus on customer service to enable businesses to excel in their security, productivity, stability and efficiency. IN A GLANCE Main Services: IT Security Year of Establishment: 2003 Workforce: 15+ Head Office: Muscat Vision To become the premier providers of Information and Communication Technology Solutions in Oman. Mission To provide professional and high quality IT security services along with superior customer service.

WHY INSIGHT SERVICE LEVEL PERFORMANCE QUALITY Through 11 years of business experience in Oman, Insight has developed local service channels for all its products and services to ensure that our customers choose the right package for their unique business requirements. Our flexible service plans assure prompt attention and constant reliable presence backed by contractual commitment as dictated by our customers needs. Customers with special needs can obtain a tailored SLA that ensures higher availability and faster response time. Our time-tested methodology and service process are highly valued by our customers and have always been under constant scruitiny to maintain the same level of customer satisfaction. Members of our technical team are well trained and certified for their respective responsibilities. Our affiliation with international IT security leaders exposes us to pioneering and innovative technologies and expands our business scope. Insight is ISO-9001 certified; a badge of pride that is a constant reminder of the importance of maintaining higher standards of quality. To ensure similar standards in our field of specialization, we attained ISO-27000 - a testimony to the dedication of our team. Partnering with the likes of Microsoft, Cisco, VMware and other global leaders has given us greater exposure to future technology trends and the IT industry standard practices.

RECOGNITION Insight has received recognition awards from a plethora of clients over the years. We are honored list some of them. STANDARDS Through the years, Insight attained ISO 9001 certification, ISO 27000 and several certifications of excellence from partners & affiliates. VERTICALS Our customers inspire us to look for creative and innovative solutions that will complement our dedication. AWARDS Among several other awards, Insight received the 2012 Al Roya Economic Award for the best SME in Oman. PARTNERS ISO 9001 ISO 9001 CERTIFIED ISO 27000 ISO 27000 CERTIFIED Premier Partner To bring a range of skills and expertise to our business, we have formed strong relationships with IT market leaders. telecom health industry finance government investment semi-government retail oil & gas education small & medium enterprises RECOGNIZED CERTIFIED APPROVED

OUR SERVICES

OUR SOLUTIONS

Application Delivery Data Sanitization a10networks.com Data Center Security blancco.com A10 Networks' application networking, load balancing and DDoS protection solutions accelerate and secure data center applications and networks. Advanced WAF features allow for granular control over web applications access. Blancco is the proven data erasure solution for millions of users around the world. As the pioneer and global leader in data sanitization and end-of-lifecycle solutions, the company offers the most certified data erasure within the industry. Network Security Network Access Control bluecoat.com Web Content Security bradfordnetworks.com Network Security Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, with a robust portfolio of more than 200 patents & some of the best innovations in security. The Network Access Control (NAC) from Bradford dynamically leverages the controls built into today s switches, routers, wireless controllers and wireless access points to perform risk assessments on every attempt to connect to the network.

Data Leakage Prevention Advanced Threat Protection devicelock.com fidelissecurity.com A clear leader in endpoint Data Loss Prevention (DLP) with over 70,000 licensed customers who ve deployed on over 4 million endpoints (laptops, desktops and servers). A comprehensive Advanced Threat Defense solution that stops advanced threats with industry-leading network traffic and payload analysis across all phases of the threat lifecycle by focusing on real-time detection and prevention. End-Point Security End-Point Security Patch Management f-secure.com gfi.com F-Secure offers a solid, award-winning and reliable end-point protection for all levels of the corporate IT infrastructure: Desktops, laptops, servers, and email & web traffic. F-Secure is the fastest-growing AV in the Omani government sector. GFI LanGuard scans and detects network vulnerabilities before they are exposed, reducing the time required to patch machines on your network. It covers patches for Microsoft, Mac OS X, Linux and more than 60 third-party applications.

Mobile Device Management Secure Data Storage good.com istorage-uk.com Good provides mobile device management (MDM) to support the complete device lifecycle. IT can easily control device settings on any managed device corporate liable, BYO or COPE, and ensure safe access to business information. The istorage Secure Drive are the best portable hardware encrypted drives with PIN code access and capacities of up to 6TB. It utilises military grade AES 256-bit hardware encryption which encrypts all data stored on the drive in real time. SIEM & LOG Management Identity Management logrhythm.com Network Forensics netiq.com Configuration Management LogRhythm is the largest and fastest growing independent security intelligence company in the world. Its Award-Winning Platform unifies SIEM, log management, network forensics, host forensics and advanced security analytics. NetIQ offers a full-featured portfolio to manage, secure and measure the critical elements of your IT infrastructure, helping you turn the challenges of cloud, mobility, BYOD and identity into opportunities to be successful.

Identity Governance Secure USB Drives sailpoint.com Access Management secudrives.com A leader in Gartner s 2014 Identity Governance and Administration (IGA) Magic Quadrant, Sailpoint offers comprehensive Identity and Access Management Solutions for every environment. With SECUDRIVE USBs, security threats from losing the USB are subdued with features such as AES 256-bit encryption and password protection, keeping our customer s confidential and private information secure at all times. Vulnerability Management Advanced Threat Protection secunia.com Patch Management stealthbits.com Secunia is a pioneers in Vulnerability Intelligence, Vulnerability Assessment and automated Patch Management offering tools to manage and control vulnerabilities across IT networks and endpoints. STEALTHbits offers a real-time monitoring and enforcement solution that provides policy-based security enforcement to protect an organization s critical business assets from attackers both within and outside the organization.

Network Security Database Security stormshield.eu End-Point Security trustwave.com E-mail Security A subsidiary of Airbus Defence and Space CyberSecurity, that offers innovative end-to-end security solutions to protect networks, workstations and data via its highly trusted and certified next-generation solutions. Trustwave helps protect data and reduce security risk. With managed security services, integrated technologies and a team of security experts and researchers, we enable you to manage your information security and compliance programs. Vulnerability Management Authentication tenable.com vasco.com Application Security Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Relied upon by more than 24,000 organizations around the world. VASCO is the world leader in providing Two-factor authentication and Electronic Signature solutions to financial institutions. VASCO solutions enhance security, protect mobile applications, and meet regulatory requirements.

Network Monitoring Encryption Solutions whatsupgold.com System Management winmagic.com WhatsUpGold helps you to monitor the performance and availability of network devices, track bandwidth usage, and improve network, server, application performance, and enable enterprise-wide administration of distributed systems. With WINMAGIC, all devices that access organizational data can be managed via one console. Whether it's a laptop, desktop, server, tablet or smartphone, every device s status is tracked to ensure its data is in a secure state if it's lost or stolen. xceedium.com Identity Management FREE TRIALS Product trials and proof of concept installations are available on request. Xceedium Xsuite delivers tightly integrated privileged identity management capabilities for hybrid-cloud computing platforms and traditional systems. It vaults and manages credentials, federates identities and protects systems. Insight maintains an open policy towards the customers right to try a product before making a decision.

CONTACT US Tel: 2448 8905 - Fax: 2448 8906 Muscat Grand Mall - 3rd Floor - Office 302 P.O.Box 1398, PC 133, Sultanate of Oman info@insight.co.om http://www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om