How To Run Corporate Information Technology Solutions

Similar documents
Cisco Advanced Services for Network Security

INFORMATION TECHNOLOGY ENGINEER V

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Protection Mission a constant endeavor

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Securing the Service Desk in the Cloud

GOOD PRACTICE GUIDE 13 (GPG13)

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

IT Security. Securing Your Business Investments

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Security Controls What Works. Southside Virginia Community College: Security Awareness

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Better secure IT equipment and systems

External Supplier Control Requirements

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Security for NG9-1-1 SYSTEMS

About PROXC Consulting. PROXC Services Domains

Zone Labs Integrity Smarter Enterprise Security

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Managed Services. Business Intelligence Solutions

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

HR & HRD Consulting Services

KPIT Cummins partners with Tata Communications to enhance customer experience, productivity and optimises costs

CyberSecurity Solutions. Delivering

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

Technology. Accenture Infrastructure Outsourcing Services

Enterprise Risk Management taking on new dimensions

SUPPLIER SECURITY STANDARD

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security and Services

How To Protect Your Cloud From Attack

Trend Micro. Advanced Security Built for the Cloud

2012 Data Breach Investigations Report

Goals. Understanding security testing

AL RAFEE ENTERPRISES Solutions & Expertise.

PCI DSS Reporting WHITEPAPER

Steven Shalita, Vice President, Marketing of NetScout Systems, Inc.

Cybersecurity Health Check At A Glance

Security Transcends Technology

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Simplify Your Network Security with All-In-One Unified Threat Management

Information and Communication Technology. Patch Management Policy

BlackBerry External Infrastructure Penetration Testing Service

Linexcom Sdn Bhd. ict Group of Companies ver1.2

Data Access Request Service

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

How To Ensure The C.E.A.S.A

Accenture Technology Consulting. Clearing the Path for Business Growth

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Professional Customer Services

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Information Technology Strategic Plan /23/2013

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Job Description Information Services Coordinator

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Glinda Cummings World Wide Tivoli Security Product Manager

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

IBM Connections Cloud Security

Cybersecurity and internal audit. August 15, 2014

Information Blue Valley Schools FEBRUARY 2015

Best Practices For Department Server and Enterprise System Checklist

Accenture Sustainability Performance Management. Delivering Business Value from Sustainability Strategy

Creation of lead nurturing database revives languishing long-term prospects and accelerates the sales pipeline

1 Introduction Product Description Strengths and Challenges Copyright... 5

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

BYOD & MOBILE SECURITY

Protecting Your Organisation from Targeted Cyber Intrusion

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

STRONGER ONLINE SECURITY

security in the cloud White Paper Series

Alcatel-Lucent Services

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

Cyber Security Competency Center

NEC Managed Security Services

Simply Sophisticated. Information Security and Compliance

Transcription:

Company Profile P.O.Box 34603, Jued House,1st Floor, Kambarage St, Mikocheni A Dar es Salaam, Tanzania, East Africa, Tel: +255 222 771 368, Fax: +255 222 774 268 Web site: www.cits.co.tz, Email: info@cits.co.tz.

Who We Are Corporate Information Technology Solutions, trading as CITS is an IT consulting firm instituted to provide total end-to-end IT Solutions. We are a registered company in the United Republic of Tanzania, operating from Dar es Salaam, the commercial capital of Tanzania. Our offices are located in Mikocheni A, about quarter a kilometer from the residence of the late Mwalimu Julius Kambarage Nyerere, the first president of the United Republic of Tanzania Background History Corporate Information Technology Solutions began as a concept for an IT consulting firm in early 2008, with a complete Vision and Mission. The planning was in progress, and slowly developed throughout 2009. In August 2010 the logo was designed, the business name was registered with Registration Number 77910 and Tax Identification Number (TIN) 110-688-008. Its website www.cits.co.tz was also registered and hosted during this time. In September 2011, the core founders of CITS moved to work full time for the company, recruiting all other crucial positions. From this point, the company started to grow steadily getting a good reception by many businesses due to its specialization, the competencies of its people and due to the Information Technology Solutions requirement in the region. 1 P a g e

CITS Vision: To be a corporate IT solutions provider with international standards of excellence CITS Mission: To increase business productivity to the clients we serve by providing efficient and secure IT Solutions CITS Values: Client First, Services Excellence. CITS was established to help businesses use technology in increasing productivity and cutting cost, while protecting their valuable information assets against threats by avoiding potential risks. CITS combines the skills, commitment, specialization and experience of its staffs to help businesses best focus on what they do in a most productive way while securing their corporate information and infrastructure against malicious activities and unforeseen disruption due to man-made or natural events. The core of the highly IT skilled and experienced team at CITS has been together after successful individual careers with a number of major multinational corporations in the Banking, Mining and Telecommunication sectors. These professionals are members of several international professional bodies. The combination of these professional s skills does not only build a strong professional competency for CITS but also gives an ability to view and analyse IT Solutions and any possible risks from different dimensions. Through a comprehensive range of professional services, CITS is uniquely positioned to provide clients with total IT Solutions. CITS differentiate herself in the IT marketplace by specializing in IT Solutions for corporate clients only. This enables the company to provide outstanding services to the customers. To monitor progress and encourage honest collaboration with our clients, CITS established the Service Excellence program. This is instrumental to the company s success in cultivating and maintaining long-term business relationship with the clients. 2 P a g e

CITS Solutions and Services: What We Do As a customers' trusted business partner, CITS provides the best solutions and services for businesses to help executives, IT Professionals and the business at large maximize business productivity and best protect company s information assets. In the corporate arena, CITS is recognized as the first firm to focus on end-to-end IT Solutions that enhance business productivity while addressing possible risks and security concerns that may harm company s information assets, the main decision making drivers. In today's demanding and competitive business environment, ensuring Information Security and Risk Management are integrated with the best technologies has become essential for large and small enterprises. Once implemented, there is a continuous need for auditing and testing these systems and controls to ensure that the organisation remain conformant to the best industrial practices and regulators requirements. 3 P a g e

Our services are: IT Security; Firewalls Intrusion detection and prevention systems Vulnerability scan and Penetration testing Access Control Systems Intruder detection and Fire-alarm Corporate Antivirus IT Infrastructure Management Services Infrastructure Monitoring and Capacity Management Exchange Messaging Infrastructure Active Directory Services Data and Voice Network Backup and Storage Patch Management Virtualization Audio and Video Solutions Audio Conferencing Video Conferencing / Telepresence Court recording Systems CCTV/Surveillance Systems IT Governance Frameworks; IT Policies, Processes, Standards and guidelines IT Audit and Risk Management Services 4 P a g e

Compliance Solutions Voice Logger Whistle Blowing IT Project Management Services Asset Management solutions Call Center Solutions The company is also looking to focusing on the following solutions in the next 12 months. Data Center Infrastructure & Hosted Services Electronic Payment Solutions Our deep industry knowledge enables us to provide customers with effective solutions that help them improve security, compliance, system reliability and productivity. We deliver on our commitments, so that our customers can build strong relationships and trust with their customers to achieve profitable growth and win in the marketplace. 5 P a g e

Our Approach: How We Do It Our solutions are built around proven industrial practices and security solutions. We have partnership with industrial known best solution providers and security companies. This helps us guide, implement and maintain IT Solutions and security services for our customers. Because CITS aims into providing complete IT Solutions and provide a risk free business environment to its customers, it does not only bring IT Solutions and Information Security to organisations but also skills required to plan, assess, identify, quantify, monitor, manage, control and mitigate risks. CITS strives into exceeding its customers expectations without compromising the project s quality, cost and time. Long life relationship and capacity building to our customers is the compass that drives CITS. CITS is flexible to client s requirements in that it does not represent any software or hardware vendor, but is open into providing technical recommendations. We normally share insights in regard to our solutions with our prospective clients and discuss how we can create a risk free business environment to their businesses. CITS s performance and success in this highly competitive industry is due to careful adherence to our core values: Clients First, Service Excellence. When contracted, CITS does not dictate what technology to be deployed but the clients decide what 'IT Solutions' and 'Information Security' means in their own language by defining their high level requirements and available technologies. Before we begin the project, we normally do a walk-through of the area together, and the client will tell us what standards we need to meet. Then we put those standards in writing, so that the client is assured of getting a high quality service always. 6 P a g e

Our Client Base: 1. National Bank of Commerce (NBC) Ltd www.nbctz.com 2. FINCA Tanzania http://www.finca.org 3. Financial Sector Deepening Trust (FSDT) www.fsdt.or.tz 4. Maendeleo Bank (Sub-contracted by Computer Complex Center) 5. Mkombozi Commercial Bank www.mkombozibank.com 6. Akiba Commercial Bank www.acbtz.com 7. Tujijenge Tanzania http://www.tujijengeafrika.org/ttzindex.htm 8. Stanbic Bank www.stanbicbank.co.tz 9. Tanzania National Roads Agency (Tanroads) www.tanroads.org 10. Abbott Fund ( http://www.abbottfund.org ) on Muhimbili National Hospital (www.mnh.or.tz ) Lab project 7 P a g e