BMS Consulting Cyber Security and IT Technology Team



Similar documents
Application Backdoor Assessment. Complete securing of your applications

Two factor strong authentication. Complex solution for two factor strong authentication

Application Performance Management. Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience

Migration from Lotus to Exchange Complex solution for simplify transition

TCS Managed Security Services

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

G-Cloud Service Definition. Atos Security Professional Services SCS

Caretower s SIEM Managed Security Services

Logicalis Managed Service Strategy & Support. Geraldine Moatti Proposition Manager, Services

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Network Segmentation

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Guided HIPAA Compliance

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Modular Network Security. Tyler Carter, McAfee Network Security

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

PCI-DSS Penetration Testing

PCI Requirements Coverage Summary Table

APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD Solid Border, Inc.

Cloud Courses Description

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

PCI Requirements Coverage Summary Table

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Cloud Courses Description

PCI DSS. Payment Card Industry Data Security Standard.

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Securing the Service Desk in the Cloud

Penetration testing & Ethical Hacking. Security Week 2014

Global Knowledge Cybersecurity Training

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Service Offerings. Ensuring IT Resources are available, reliable, scalable & manageable always.

Security Services. 30 years of experience in IT business

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

AL RAFEE ENTERPRISES Solutions & Expertise.

Reference Technology Roadmap

MTI OVERVIEW MANAGING DATA SECURELY FOR OVER 25 YEARS

Australian Computer Society ANZSCO ICT Code descriptions v Further updates will be issued in

Click to edit Master title style. How To Choose The Right MSSP

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

The Next Generation of Security Leaders

Hackers are here. Where are you?

HP Cyber Security Control Cyber Insight & Defence

How To Get A Cloud Security System To Work For You

Reference Technology Roadmap

Cloud Computing - Benefits and Barriers for Retail Adoption

Fax2 IT and Security Audit. In 2012 and 2013, PRAS Consulting was awarded by Microsoft Romania as Best partner for Public Cloud.

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

IBM Security Strategy

PCI Compliance. Top 10 Questions & Answers

Goals. Understanding security testing

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

SOC & HIPAA Compliance

Field of Study Area of Expertise Certification Vendor Course

Global Security Software Market

Designing & Building an Information Security Program. To protect our critical assets

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Critical Controls for Cyber Security.

HC3 Draft Cloud Security Assessment

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Response to Questions CML Managed Information Security

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

KeyLock Solutions Security and Privacy Protection Practices

The PCI DSS Compliance Guide For Small Business

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Transcription:

BMS Consulting Cyber Security and IT Technology Team

Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the world: More than 100 technology specialist engineers, testers, auditors, programmers, consultants. About 50 completed projects a year Standardized internal process: project management, solution architecture design, customers support and satisfaction, compliance ISO 9001:2010 certificate issued by TÜV SÜD in 2013 Our certifications Qualified Security Assessor (QSA); Approved Scanning Vendor (ASV); Certified Information Systems Security Professional (CISSP); Certified Information Systems Auditor (CISA); Certified Ethical Hacker (CEH); ISO 27001 Lead Auditor; Check Point Certified Security Expert; Symantec SSE; McAfee Technical Professional: System Security; McAfee Technical Professional: Risk and Compliance; CISCO Lifecycle Services Advanced Security; Cisco Security Solutions and Design Specialist; Cisco Express Foundation Sales Specialist; CISCO CCDA; CCNA;CCNP;CCIE; Fortinet Certified Network Security Administrator; Oracle Database 10g Oracle Certified Professional; Microsoft Certified ІТ Professional; etc Customer s recognition Raiffeisen Bank International accredited us as a penetration testing services provider across all RBI subsidiaries (in 33 counries) BNP Paribas Ukraine (Ukrsibbank) chooses us as PCI DSS assessor to provide certificate of compliance Zeppelin (Caterpillar) uses our Microsoft CRM Professional Support and Development services for supporting it s global customer satisfaction platform InfoPulse A The part Foundation of the for Partner International Nordic IT Community group Assistance EVRY (FINCA International) uses our Microsoft AD migration services in whole CEMEA region

Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Internal processes are certified according to the quility requirements of ISO 9001 international standard 60+ technology partners around the world Product portfolio IT Security Clouds, Migration and IT Support Business software development Our honorable clients: 80+ certified engeneers and consultants 500+ projects in government, industry, banking and telecom sectors

Our Portfolio

Applications Portals Microsoft SharePoint Business Process Management Systems IBM BPM, K2 Big Data HP Autonomy CRM/xRM Microsoft Dynamics Enterprise Service Bus IBM WebSphere Message Broker, Microsoft BizTalk

IT Security Data Center Protection Symantec, SafeNet Web Protection Citrix, A10, F5 Mobile Device Management AirWatch, MobileIron AntiDDoS Radware, SecurityDAM Vulnerability Management Rapid 7 SaaS Database Protection Imperva, IBM Data Leak Prevention Symantec SIEM HP, IBM PCI DSS Penetration Tests Source Code Analysis Information Security Audit

IT Support & Migration Physical infrastructure Virtualization Microsoft, VMWare Lotus, Zimbra, Gmail, Custom SAN, DAS Online services MS Office 365, Exchange online Software Defined Storages HP, DataCore High-cost datacenter Cloud Azure, Amazon

BMS Managed Security Services Portfolio Threat Prevention Incident Detection Remote IT Support & Remediation Managed Firewalls and Remote Access Managed Web/DNS Firewalls Managed Data Leak Prevention Hybrid DDoS Protection Patch Management Log Management IT Service & Application Monitoring Advanced Security Event and Incident management Managed IPS Vulnerability Detection 24x7 operation Multilingual operators Comprehensive reports Customer portal Incident management and forensics

200+ Employees 60+ Vendors InfoPulse A part of thepartner Nordic IT group EVRY

Vendor Certificates

We offer for German partners Migration from IBM Lotus to Microsoft Exchange System and Network Monitoring Application monitoring SAP Security Solutions Backdoor assessments Advanced Persistent Threat stress-testing Two-factor authentication PCI DSS Certification Please contact our representative and request detailed presentation on these topics.

Thank you for attention! 12