Tomorrow’s So lut ions , Today.
Company Prof i le
2
Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime IT products, to provide innovative solutions of technology know-how, to respond to the vast demand of Egyptian market, covering: • End-To-End IT infrastructure • Information Security Assessment Service • Cloud Computing & As A Service consultancy • Building Automation Systems
MCS was able to earn market appreciation and became a trusted consultant in 100+ mega IT projects, for diversified business sectors such as: • Hospitality and Real estate compounds • Aviation • Oil and petroleum industry • Central Government • Transportation • Financial sector
Established with Information Security focus, progressively broadening IT coverage since 2006, MCS has been providing turn-key
solutions to tackle Information Security, Computing, Data Storage, and Networking. Coupled with premier Value Added Services
including hands-on implementation, authorized training, and more.
Human development has always been the highest return investment, thus, we offer licensed training solutions in cooperation with the leading technology vendors, including Palo Alto networks, Juniper, and ForcePoint, in addition to other major technology providers. Working in conjunction with a multitude of prestigious technology corporations, we provide up-to-date learning solutions that can help IT professionals gain a deep understanding of a range of emerging technologies.
Corporate FactsHeadquarter: Cairo, EgyptFounded: 2006 Number of Employees: 50+ Average Annual Growth for the last three years: 35 % Website: www.mcsholding.comAwards: Best Value added distributor McAfee (2014 & 2015)
ABOUT
3
Our Vision
To become the leading regional IT Solutions Provider
that aims to enhance Distribution business model
to add values with perceived quality thresholds for
channels and enterprises
Our Mission
As a leader in security business, we commit to deliver
a competitive portfolio of security solutions & reliable
services to enterprises and Channels.
Our team of professionals creates innovative business
solutions that aim to fulfill customer’s needs, builds
long term partnership with suppliers; while applying
ethical business practices and maximizing return on
investment rate.
Our Philosophy
Is to provide strategic IT vision, leadership, quality,
and enterprise solutions to our professionals to meet
their goals, deliver results, and enhance the company’s
position in Egypt and the Middle East markets.
Our Values
• Showing integrity and respect.
• Passion to satisfy our customers, partners, and our
technology providers.
• To be coherent and integrated.
• Constructive self-criticism, self-improvement, and
personal excellence.
• Accountability to customers, shareholders, partners,
employees, and the community for commitments,
results, and quality.
• Openness and transparency are key ingredients to
build accountability and trust
4
Next Generation Firewalls (NGFW)
The next-generation firewall classifies all traffic, including
encrypted traffic, based on application, application function, user
and content.
The next-generation firewalls are architected to safely enable
applications and prevent modern threats.
Flexible deployment options and native integration with the
next-generation firewall platform extend the policy enforcement
and cyberthreat prevention to everywhere your users and data
are located: in your network, on-premise or cloud.
Security information and event management (SIEM)
Security information and event management (SIEM) technology
supports threat detection and security incident response through
the real-time collection and historical analysis of security events
from a wide variety of event and contextual data sources. It
also supports compliance reporting and incident investigation
through analysis of historical data from these sources. The core
capabilities of SIEM technology are a broad scope of event
collection and the ability to correlate and analyze events across
disparate sources.
Next Generation Intrusion Prevention System (NGIPS)
Next generation intrusion prevention systems (NGIPS) build upon
the traditional IPS deep packet inspection technologies that
have become commonplace in enterprise security deployments,
adding features such as application awareness, user control
and integration with external threat intelligence sources. NGIPS
technology continues to distinguish itself by focusing on high-
speed throughput, low latency, and detection through signature-
less methods, including sandboxing, contextual awareness, and
other forms of traffic analysis.
OURSOLUTIONSCYBERSECURITY
5
Data Protection
Data Protection Solutions are designed to detect
potential data breaches / data ex-filtration
transmissions and prevent them by monitoring,
detecting and blocking sensitive data while in-
use (endpoint actions), in-motion (network traffic),
and at-rest (data storage). In data leakage incidents,
sensitive data is disclosed to unauthorized personnel
either by malicious intent. Such sensitive data can
come in the form of private or company information,
financial or patient information, credit-card data, and
other information depending on the business and
the industry.
BDS: Malware ProtectionModern malware is at the heart of many of today’s most sophisticated network attacks and is increasingly customized to avoid traditional security solutions. The integrated approach has been developed that addresses the full malware life cycle, which includes preventing infections, identifying zero-day malware (undiscovered malware), or targeted malware (malware targeting a specific industry or corporation), as well as pinpointing and disrupting active infections.The APT engine exposes zero-day and targeted malware through direct observation in a virtual environment within the system. The APT also makes extensive use of the App-ID technology by identifying file transfers within all applications, not just email attachments or browser-based file downloads.
Content SecurityMCS provides the leading email and web security solution to help reduce the threat of email and web-based malware. Our solutions are designed to monitor both inbound and outbound traffic and block emails or websites with malicious intent.
Breach Detection Systems (BDS)
Breach detection systems provide protection against zero day
attacks and designed to discover malware that is bypassing
traditional security technologies by examining various
indicators to determine whether files are malicious. BDS are
typically deployed at the network layer and provide deeper
insight into potentially malicious files and traffic than do
traditional application layer security products.
BDS: Advanced Endpoint Protection
Traditional antivirus (AV) is not the solution for endpoint
security – it’s the problem. AV can no longer stop today’s threats.
Advanced endpoint protection is the only solution offering
that replaces AV with “multi-method prevention”: a proprietary
combination of malware and exploit prevention methods that
pre-emptively block both known and unknown threats.
advanced endpoint protection, with its unique combination
of the most effective, purpose-built, malware and exploit
prevention methods, prevents known and unknown threats
before they compromise an endpoint.
6
Data Center Networking solutions
Data center networking is the process of establishing and
interconnecting the entire physical and network-based devices
and equipment within a data center facility.
It enables a digital connection between data center
infrastructure nodes and equipment to ensure that they can
communicate and transfer data between each other and on an
external network or Internet.
Network Virtualization solutions
The goal of Network Virtualization as an overlay network is the
decoupling of the physical topology from the logical topology,
to allow connectivity between compute (virtual or physical)
and network services (virtual or physical) regardless of where
they may reside within the datacenter.
IP Storage and Big Data Networking solutions
The networking demands of big data analytics, flash-based and
scale out storage, and hyper-converged compute solutions
are driving a migration from legacy fiber channel to next
generation IP-based storage networks. These next generation
storage applications require an open, programmable, lossless
and highly available IP storage networking solution in order to
support their unique traffic patterns.
Cloud Enabled Enterprise
The attributes of Cloud Networking : Scalable, Low Latency,
Open APIs, Programmable Management, Self-Healing
Resiliency.
Software-defined networking (SDN)
Software-defined networking (SDN) is an umbrella term
encompassing several kinds of network technology aimed
at making the network as agile and flexible as the virtualized
server and storage infrastructure of the modern data center. The
goal of SDN is to allow network engineers and administrators to
respond quickly to changing business requirements.
Cloud Control
Contrail Cloud Platform releases are aligned with OpenStack
community releases to maintain API compatibility and strong
community support.
Automated resource provisioning for configuration and
operation of compute, storage, and networking resources
needed by cloud applications minimizes manual intervention
and improves operational.
NETWORKING& CLOUD CONTROL
7
Hybrid Converged solutions
• Make use of already-invested server infrastructure to create
SDS (Software Defined Storage).
• Approximately 50% cheaper compared to SAN approach.
• Up to 9GB cash.
• Up to 100GB port speed.
• Ultra-high tolerance. Have storage controllers as many as
number of servers available.
• No vendor lock-in, use any server, any HDD.
• Its an architecture that tightly integrates compute,
storage, networking and virtualization resources and other
technologies from scratch in a commodity hardware box
supported by a single vendor.
Software Defined Storage (SDS)
The storage landscape is evolving from premium priced
proprietary hardware and software solutions to open industry
standard hardware and the benefits are significant: reduced
vendor lock-in, significantly open innovation with new
technologies like all NVMe solutions.
Maximum Efficiency - High capacity 1U-4U form factors.
Leading the industry with up 95% efficient Platinum level
power supplies.
Maximum Performance and expandability - All NVMe support
with hybrid expander and delivering up to 20 GB/s throughput
Mission Critical Reliability - Capable of fully redundant and
fault-tolerant operation with supplies, fans and redundant
serverboards with remote management.
Proven Compatibility - in addition to Lab validated hardware
configurations optimized for high duty cycles workloads.
High-performance computing (HPC) Solutions
Make use of parallel processing for running advanced
application programs efficiently, reliably and quickly. Systems
that function above a teraflop or 1012 floating-point operations
per second.
C O M P U T I N G
8
Full Fledge Server portfolio
• Full Range of Rack-mount, Workstation & Tower Chassis and
blades- mini-1U, 1U, 2U, 3U & 4U
• Uncompromising Quality Control
• Widest Variety of Application Optimized Solutions, from High
End Clusters
• Optimized thermal design: better cooling performance, less
power consumption
• Best Performance per-Watt, per-Square-Foot, and per-Dollar
• Special attention to Micro-Blade generation
It represents an entirely new type of computing platform. It is
a powerful and flexible extreme-density 6U/3U all-in-one total
system that features 28/14 hot-swappable Micro-Blade Servers
supporting 28/14 Newest Dual-Node Xeon UP systems with
Intel E3-1200 v5 family configurations with up to 2 SSDs/1 HDD
per Node. The 6U/3U Micro-Blade enclosure can incorporate
up to 2 Chassis Management Modules, and up to 2 Switch
Modules for efficient, high-bandwidth communications. It
can incorporate up to 8 redundant (N+1 or N+N) 1600/2000W
high-efficiency (95%/96%) power supplies with cooling fans.
This innovative new generation architecture includes micro-
server, networking, storage, and unified remote management
for Cloud Computing, Video Streaming, Content Delivery, Social
Networking, Desktop Virtualization and Remote Workstation
applications.
Big Data
Hadoop Solutions have been created to focus on getting a
powerful and balanced cluster up and running-as quickly as
possible, enabling rapid and efficient innovation. Working
closely with customers, Hadoop distribution companies, and
data engineering companies
Virtual Desktop & Gaming
Get responsive, scalable and secure VDI infrastructure while
simplifying operations, and reducing the costs of computing.
Identify your vulnerabilities before they doMCS RedTeam is your trusted information security partner, helping you to stay prepared to advanced emerging threats, safeguard your most valuable assets, and improve your overall security posture. Today on the work side, a dynamic workplace environment, highly mobile workforce, and rapidly changing workers’ expectations have blurred the concept of a network perimeter. This puts organizations at high risk by increasing the surface of attacks which makes them subject to the more advanced targeted attacks. Accordingly, this needs more advanced intelligent way that accurately identifies security strengths, weaknesses and common configuration faults.MCS RedTeam believe in “One size doesn’t fit all”, so we have developed our own methodology that puts all your security defenses and infrastructure in a controlled cyber-attack, which puts your defenses in a truly up-to-date real life attack scenarios to determine the extent of vulnerabilities within your Infrastructure.Therefore, we work closely with your team to understand your business, study the current infrastructure, and know future plans.
9
MCS RedTeam services portfolio balances between information security, future planning and compliance in order to support IT corner stone role in modern organization
THREATINTELLIGENCE
BUILDTHREAT MODEL
DEVELOPTESTING CASES
ASSESSMENTEXECUTION
CALCULATE RISKS
REPORTING
STUDYCUSTOMER
INFRASTRUCTURE
INFOSEC
AVAILABILITY
CONFIDENTIALITY INTEGRITY
PLANNING COMPLIANCE
Why MCS RedTeamMCS Holding has more than ten years of trusted experience and strong commitments in Information Security field. In MCS, we have the right calibers, with the typically needed technology, in the exact time. Our calibers have a sharpen knowledge in most of information security field which is used in very sophisticated assessments within critical environments. MCS believes that knowledge transfer is an integral part with technology delivery in our philosophy. Based on this, we deeply think that by educating market, we will get a better safe world.
RedTeam Information Security Services• Penetration Testing• Vulnerability Assessment• Network Security Configuration Audit• Network Architecture Review• Social Engineering• Network Security Assessment
RedTeam Planning Services• Network & Security Capacity Planning
RedTeam Compliance Services• Security Controls Evaluation
Learn More about USContact us on e-mail [email protected].
10
SwitchingImprove the economics of networking
with carrier-class, high-density switches
for branch, campus, and data center.
RoutingA comprehensive, scalable, and secure
portfolio of routers for enterprise and
service provider networks.
SecurityAn advanced suite of applications that
provides service agility, reduces OpEx, and
optimizes the network infrastructure.
Juniper delivers a high-performance network that is
an enabler to the business, accelerating growth and
innovation, while creating operational efficiencies and
overall savings. today’s demanding environments, where
the number of users and devices types are exploding
and multi-media applications, such as video, are placing
unprecedented demands on the network, there can be no
compromises. With Juniper, customers are not forced to
make sacrifices.
Founded: 1996Headquarters: Sunnyvale, CaliforniaEmployees: 9,300+Offices: 88 locations in 43 countriesRevenue: USD $4.8 billion (2015)Website: www.juniper.net
TECHNOLOGY
11
Palo Alto Networks is the global cybersecurity leader, known
for always challenging the security status quo. Our mission
is to protect our way of life in the digital age by preventing
successful cyberattacks. Our pioneering Security Operating
Platform safeguards your digital transformation with continuous
innovation that combines the latest breakthroughs in security,
automation, and analytics. By delivering you a true platform and
empowering a growing ecosystem of change-makers like us, we
provide you highly effective and innovative cybersecurity across
clouds, networks, and mobile devices.
Headquarters: Santa Clara, U.S.Website: www.Paloaltonetworks.comFounded in 2005; first customer shipment in 2007Experienced team of 4,500+ employeesQ4FY17: 1.8 Billion revenue, a 28% YoY increase growth that significantly outpaced the industry.+50,000 customers in 150+ countries Over 85 of the Fortune 100 and more than 63% of the Global 2000.Enterprise firewall market leader by Gartner for the sixth year in a row.
Preventing attacks at every stage of the attack lifecycle
Breach the perimeter1 Deliver the malware2 Lateral movement3 Exfiltrate data4
URL FilteringPrevent use of social engineeringBlock known malicious URLs and IP addresses
Next-Generation Firewall / GlobalProtect
Visibility into all traffic, including SSL Enable business-critical applications Block high-risk applicationsBlock commonly exploited file types
Threat PreventionBlock known exploits, malware and inbound command-and-control communications
WildFire
Send specific incoming files and email links from the internet to public or private cloud for inspection Detect unknown threatsAutomatically deliver protections globally
Next-Generation Firewall / GlobalProtect
Establish secure zones with strictly enforced access control
Provide ongoing monitoring and inspection of all traffic between zones
Threat Prevention
Block outbound command-and-control communications Block file and data pattern uploads DNS monitoring and sinkholing
Traps / WildFire
Block known and unknown vulnerability exploits Block known and unknown malwareProvide detailed forensics on attacks URL Filtering
Block outbound communication to known malicious URLs and IP addresses
WildFireDetecting unknown threats pervasively throughout the network
12
Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies
– cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks
and data while eliminating the inefficiencies involved in managing a collection of point security products.
Headquarters: Austin, TexasWebsite: www.forcepoint.com Founded: 1994Employees: 2,000Revenue: $361.5 millionGartner Market Leader (2015)
Modern business is all about safely connecting users to data
DATA
NETWORKS
Mobile
Office
OtherLocations
Partners &Supply Chain
Customers
Cloud Apps
Corp Servers
Websites
EndpointMedia
IN THE CLOUD, ON THE ROAD, IN THE OFFICE
USERS
A unified, cloud-centric security platform for safe guarding users, data & networks
Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than five million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.
Headquarters: Santa Clara, U.S.Website: www.arista.comFounded: 2004 Revenue:837 million USD (2015)1200 + employees (70% of employees are engineers3500 + customers 7 of 8 of the largest cloud titans run on Arista Networks 8 of 10 of the largest Financial Services firms run on Arista Gartner Market Leader (2017)
Extensible Operating SystemArista Extensible Operating System (EOS) is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary software image across the Arista switching family. Architected for resiliency and programmability, EOS has a unique multi-process state sharing architecture that separates state information and packet forwarding from protocol processing and application logic.
• Interoperability / no vendor lock-ins.• Fewer tiers is better than more tiers.• Modern infrastructure should be run active/active.
• Scale-out designs enable infrastructure to start small and evolve over time.• Designs should be agile and allow for exibility in port speeds. • Large buffers are important. Consistent features and OS.
100 to 2,000 100 to 10,000 100 to 100,000+ 100 to 100,000+
Layer 2 / MLAG Layer 3 / ECMP Spline™
Servers Servers Middle of Row Servers Servers Servers
13
14
As a global leader in security, Trend Micro develops innovative
security solutions that make the world safe for businesses and
consumers to exchange digital information. With 25+ years of
security expertise, Trend Micro was recognized as the market
leader in server security , cloud security , and small business
content security . Trend Micro solutions protect end users , secure
today’s evolving data center, and protect against sophisticated
targeted attacks. We deliver top-ranked client, server and cloud-
based protection that fits our customers’ and partners’ needs,
stops new threats faster, and protects data in physical, virtual
and cloud environments. No matter what the security need, or
how it may evolve over time, Trend Micro is the smart security
choice.
Headquarters: Shibuya, Tokyo, JapanWebsite: www.trendmicro.com Founded: 1988Employees: 5,258 Revenue: US $1.0 billion
CENTRALIZED VISIBILITY & CONTROL
Unified Dashboard
User-Based Visibility
Forensics & Analytics
Policy Management
3rd Party SIEM, Provisioning, &
Operational Management
USERS SERVERS NETWORKS
SECURITY CAPABILITIES
Anti-Malware & Content Filtering
Application Control
Encryption & DLP
Integrity Monitoring
Behavior Monitoring & Sandboxing
Response & Containment
Intrusion Prevention
SHARED THREAT INTELLIGENCE
Local Threat Intelligence
Threat Activity Recording
3rd Party Threat Information
Extensible Operating System
15
Tenable Network Security transforms security technology
for the business needs of tomorrow through comprehensive
solutions that provide continuous visibility and critical context,
enabling decisive actions to protect your organization. Tenable
eliminates blind spots, prioritizes threats, and reduces exposure
and loss. With more than one million users and more than 20,000
enterprise customers worldwide, organizations trust Tenable
for proven security innovation. Tenable’s customers range
from Fortune Global 500 companies, to the U.S. Department
of Defense, to mid-sized and small businesses in all sectors,
including finance, government, healthcare, higher education,
retail and energy. Transform security with Tenable, the creators
of Nessus and leaders in continuous monitoring.
Headquarters: Columbia, MD, USAWebsite: www.tenable.comFounded: 2002Employees: 650+MARKET REACH: 20k+ customers, 1M+ users worldwide
• Physical & Virtual Devices• Applications & Databases• Mobile Devices• Cloud Services
• Vulnerability Assessment• Configuration Audit• Malware Detection
• Log Collection• Activity Monitoring• Packet Inspection• Threat Intelligence
• Event Correlation• Anomaly Detection• Behaviour Analysis• Attack Path Analysis
• Dashboards and Reports• Notification and Alerting• Remediation Workflow• Patch Management
• Patch Validation• Configuration Changes• Attack Surface Reduction
16
Nexthink is the innovator of Endpoint and User IT
Analytics for security, ITSM and transformation. Our
software uniquely provides enterprise-wide, real-time:
analytics covering all endpoints, users, applications
and network connections; and visualization of IT
infrastructure and service delivery. Nexthink helps IT
departments connect, communicate and collaborate
to achieve their major goals and to optimise
endpoint security, operations, support and workplace
transformation projects. Nexthink’s real-time analytics
and visualization extend help desk, server monitoring,
APM (application performance management) and
PCLM (PC lifecycle management) tools and provide
essential visibility for IT governance. Nexthink serves
the Global 5000 utilizing a leveraged partner model.
Nexthink is a private company headquartered in
Lausanne, Switzerland.
Headquarters: SwitzerlandWebsite: www.nexthink.comFounded: 2004Employees: 251 - 500Leadership: Pedro bados
17
Headquarters: Santa Clara, California United StatesWeb Site www.mcafee.comFounded 1987 432 million Total Endpoints103,000+ Corporate Customers7,330 Employee
McAfee is one of the world’s leading independent
cybersecurity companies. Inspired by the power of
working together, McAfee creates business and consumer
solutions that make the world a safer place for the
benefit of all. Our holistic, automated open security
platform allows all your disparate products to co-exist,
communicate, and share threat intelligence with each
other anywhere in the digital landscape. Where machine
automation is converged with human intelligence so
you can streamline workflows more efficiently. Where all
your security products adapt to new threats skillfully and
work synergistically to increase protection, and speed
up detection and correction—across the entire threat
defense lifecycle.
Security Connected Platform
CONTENT SECURITY
• Web Gateway• Data Loss Prevention
SECURITY RISK MANAGEMENT
• Enterprise Security Manager (SIEM)
• E-Policy Orchestrator• Threat Intelligence Exchange• McAfee Active Response
NETWORK SECURITY
• Advanced Malware Defense• Network Security Platform (IPS)
ENDPOINT SECURITY
• Endpoint Security Suites• Data Center Security Suites• Device Control• Endpoint Encryption
Threat Intelligence
Security Management
Analytics
Security RiskManagement
Context andOrchestration
Threat Defense Platform
18
Products
Give the next generation of workers a productivity boost by blending their business and personal worlds with just the right amount of company control.
A contemporary Network Access Control (NAC) solution built for the next generation of networks.
The best mobile VPN to enable secure access from any device to enterprise apps and services in the data center or cloud.
Headquarters: California, USAWebsite: www.pulsesecure.netFounded: 2014Employees: 201 - 500
Pulse Secure, LLC is a leading provider of secure access
and mobile security solutions to both enterprises and
service providers. Enterprises from every vertical and of all
sizes utilize the company’s virtual private network (VPN),
network access control (NAC) and mobile security products
to enable worker mobility securely and seamlessly in their
organizations. Pulse Secure’s mission is to deliver secure
access solutions for people, devices, things, and services.
19
Supermicro is a global leader in high performance, high efficiency server technology and innovation. they develop and provide end-to-end green computing solutions to the data center, cloud computing, enterprise IT, big data, high performance computing, or HPC, and embedded markets. The solutions offered by Supermicro range from complete server, storage, blade and workstations to full racks, networking devices, server management software and technology support and services.
Total Solution Lifecycle
Design: Total hardware, software and services solution
Integrate: Simplify and accelerate the design cycle, purchase and deployment (acquisition costs) with proven integrations, configurations and performance characterization
Maintain: Provide the management technology and services required to optimize the ongoing operational costs of the solution.
Headquarters: San Jose, California, United StatesWebsite: www.supermicro.comFounded: 1993Employees: 2,247Revenue: USD 1.99 billion (FY2015)
Converged Infrastructure Solutions
Virtualization:Grow your virtualized environment into a hyper-converged infrastructure with VMware vSphere & Virtual SAN to deliver a smart, cost efficient, resilient all-in-one solution.
Cloud:Accelerate your OpenStack deployment by choosing one of our pre-validated SuperMicro OpenStack solutions.
Software Defined Storage: The storage landscape is evolving from premium priced proprietary hardware and software solutions to software defined storage based on open industry standard hardware and the benefits are significant.
Converged Application Solutions
Big Data:Supermicro’s Solutions have been created to focus on getting a powerful and balanced cluster up and running-as quickly as possible, enabling rapid and efficient innovation.
Virtual Desktop & Gaming:Supermicro has developed a line of fully configured SuperServer® solutions to address the rapidly growing Virtual Desktop Infrastructure and featuring NVIDIA Tesla GRID K1 and K2 GPUs supporting hardware virtualization.
20
For more than three decades, Ivanti has built their reputation on helping IT professionals fix their security issues and optimize user experience. Ivanti sought-after systems are some of the best in the industry. From patch and asset management to IT service delivery and security, Ivanti software is everything you need to take your IT operations to the next level. They also ensure that supply chains and warehouse teams have the most up-to-date technology in order to perform their essential functions.
Headquarters: New Brighton, Minnesota, United StatesWebsite: www.Ivanti.comFounded: 1993Employees: 51 - 200
The Patch Management Process
21
Niagara Networks is a Network Visibility industry leader, with
emphasis in 1/10/40/100 Gigabit systems including Network
TAPs, Bypass Switches, and Network Packet Brokers that integrate
with monitoring systems, inline networking appliances, IPS, UTM,
Load Balancing, WAN acceleration, and other mission-critical
IT and security appliances. Formerly part of Interface Masters,
a leading Silicon Valley network solutions company, Niagara
Networks recently spun off from Interface Masters to focus on
its core competencies, and developed an independent company
identity.
Niagara Networks offers the highest port-density systems, the
most complete Network Visibility Systems, and the highest quality
and feature-rich Bypass Solutions in the market. Niagara’s unique
and modular designs, innovative Next-Generation Network
Visibility technology, including the 100 Gigabit-capable Network
Packet Broker, and the ability to tailor systems to exact customer
specifications, allow it to lead the industry with high quality,
innovative products and exceptional service.
Headquarter: United StatesFounded: 2016Website: www. niagaranetworks.comEmployees: 50 - 200
Network Bypass Technology Network TAP TechnologyNiagara Networks’
Network Operating Software
Niagara’s Bypass technology relies on Heartbeat frames to detect tool failures. Heartbeat frames are generated on the appliance ports and the tools are expected to bridge these frames. When heartbeat frames don’t appear where they’re expected, the Bypass function is activated and traffic is shunted around the failed appliance. Once the tool is restored to normal operation and heartbeats begin to flow again, the Bypass function is terminated and traffic is again directed through the tool.
Network TAPs are a critical element of any Network Visibility infrastructure. Just like a telephone wiretap, Network TAPs provide a means to observe network traffic for security, network performance monitoring, and diagnostic purposes.There are many flavors of Network TAPs, just as there are many types of network media. TAPs must be specifically designed to match the media, speed and mode of the network links into which they will be deployed. Niagara’s Network Packet Brokers support all types of media, including Copper Ethernet (100-baseT & 1000-baseT), as well as 10, 40, and 100Gb fiber-optic cable.
Niagara Networks’ Network Operating Software provides the intelligence required for improving performance, monitoring and security of networks. As the enabler of multiple applications, the NOSE can groom, trim, optimize and manipulate any packet that is sent from the production network to Niagara Networks’ distributed architecture.
22
Every day at FireEye, we see firsthand the impact of
cyber attacks on real people—not just the financial cost
to governments, corporations and individuals, but the
human cost in time, peace of mind, and a sense of control
over one’s environment. This is what inspires us to fulfill
our mission to relentlessly protect our customers from
the impact and consequences of these attacks.
FireEye is the only cyber security company that does this
by combining the automation of world-class technology
with the power of unparalleled frontline human
expertise, including industry-recognized services and
nation-state grade threat intelligence. We put it all at
your fingertips in a unified security operations platform
called Helix that integrates and analyzes data from your
security assets in order to give you real answers about
the threats that matter. Best of all, with FireEye’s Expertise
On Demand, our experts can function as an extension
of your security team— on a click, by phone, or in your
corner when you need them most.
Headquarters: 601 McCarthy Blvd. Milpitas, CAWebsite: www.fireeye.comFounded: 2004Employees: 3,500+
InnovativeTechnology
FrontlineHumanExpertise
23
The FireEye ECOSYSTEM
Managed Defense
FireEye Helix Security Operations Platform
FireEye andThird-Party Apps
FireEyeMarket
FireEye Expertise
Threat IntelligenceMandiant Services
ExpertiseOn Demand
FireEyeEmail
Security
FireEyeNetwork Security
and Forensics
FireEyeEndpointSecurity
Third-Party
Solutions
Alerts / CaseManagement
ComplianceReporting
ContextualIntelligence
Next GenerationSIEM
Orchestration& Automation
FireEye HelixA security operations platform that allows organizations to take control of any incident from alert to fix. FireEye Helix integrates disparate security tools and augments them with SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security in
FireEye Network Security and ForensicsAn advanced threat protection and breach detection solution with visibility into the world’s most sophisticated attacks that protects networks, assets and users with confidence from known and unknown threats.
FireEye Endpoint SecurityA comprehensive endpoint solution that protects users with multiple combined engines to block malware and exploits, detecting advanced attacks and providing response tools and techniques developed by the world’s leading frontline responders.
FireEye Email SecurityAn email protection solution that stops email-borne threats with first-hand knowledge of attacks and attackers before they can cause any harm. The solution blocks not only malware and suspicious URLs, but also phishing and impersonation techniques
FireEye Expertise On Demand A prepaid, annual subscription that provides flexible, pay-per-use access to FireEye’s industry-recognized security expertise, ensuring you and have the capabilities you need, when you need them most.
FireEye Threat Intelligence A portfolio of Intelligence services that goes far beyond increasing a security product’s blocking capabilities by adding the forward-looking, highly contextual information organizations need to build proactive defenses, prioritize alerts, allocate resources and improve incident response.
FireEye Managed Defense A managed detection and response (MDR) service that combines industry-recognized cyber security expertise, FireEye technology and unparalleled knowledge of attackers to identify threats early in the attacker lifecycle to minimize the potential impact of a breach.
FireEye Mandiant A world-renowned incident response and assessment, enhancement and transformation consulting services to protect vital organizational assets. Mandiant reduces business risk with a deep understanding of attacker behavior, unmatched threat intelligence, and purpose-built technology.
24
Certification MCS has cemented partnerships with world`s leading network and security product vendors and technology suppliers. We offer the widest range of courses, certifications and product training programs across Egypt as well as the Middle East region. Our award winning combination of instructors and state-of-the-art Lab facility at Cairo/Egypt has established as one of the most sought after technical training centers in the country.
Palo Alto Networks Palo Alto Networks partners with MCS for Training and Education. Authorized Palo Alto Networks training from MCS provides the next-generation firewall knowledge you need to secure your network and safely enable applications. In our courses that feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cybersecurity attacks. Our convenient delivery formats, including in classrooms, live online in virtual classrooms, and in private groups at your location.
International Certification Security Academy As the era of NG security is known for their vast threat and dynamic attacks vectors. The Middle East market became in need for calibers with exceptional knowhow to be able to perfectly utilize NG security capabilities in securing organizations against modern advanced threats.
Driven by this need, MCS has announced “ICSA” as a pioneer in InfoSec knowledge sharing.At ICSA, MCS introduces tailored InfoSec courses to improve caliber skills and increase their awareness of new threats and technologies. Those customized courses cover wide scope of skills, starting from essential skills to specialized technical ones, such as Risk and Compliance, APT Protection, Securing Virtual Environments, Datacenter and Perimeter Protection.
Juniper We offer a wide range of training and certification courses to deliver Juniper training for routers, JUNOS, policy, VPNs, MPLS, ScreenOS, SSL, IDP, firewalls, and more. Our consultants and instructors are the best at what they do, which is why we have worked with so many large and small businesses and organizations in the Egypt to deliver their training and consulting needs.
ForcepointForcepoint has two comprehensive training programs: one for clients who use Forcepoint products, and another for their global partners who resell Forcepoint products. Our programs help maximize the investment or expertise in Forcepoint solutions in order to deliver Forcepoint services most efficiently, Validate your mastery and proficiency in Forcepoint technologies Promote enthusiastic adoption of the products by your users (as a customer) and Stand out from your competition and increase your sales (as a partner).
EDUCATION
25
MCS Support Portal https://support.mcsholding.com
In 2013, MCS has launched its first non-vendor online support
portal to enable its customers to add their technical issues
online. MCS Support Center is a private portal hosted in our
datacenter that requires an invitation to access it. There are
currently 2 levels of users; master user and regular user. The
master user can view and interact with all cases opened by his
organization while the regular user can only see and interact
with his own cases. Products listed in the Support Center are
ones purchased through MCS and has valid vendor support.
Email Support [email protected]
MCS provides email support on nights, weekends and holidays
when our office is closed. Our customers can directly send their
issues and hence, our team will immediately take their actions
to solve it.
Customer Premises SupportThe time gap between problem incidence and finding a
support specialist to solve that issue has been declined due to
the increase use of technology. When the customer request on-
site support, MCS technical team is ready to move immediately
to repair the issue.
Call SupportWhen customers use call support, an agent of MCS technical
team will work on their issues immediately.
Inside Egypt: 0800-SUPPORT
INITIATIVESMCS support was built with RASE(Reliable , Available , Secure and Efficient) model in Mind
Support and Automation
26
OverviewIn 2006, Solace Penetrated the Egyptian Market adding great value to home automation business in MENA region. Our competitive
edge can be summarized in one word which is “Integration” where you can control all your home aspects at a single touch of a
button. Since Solace home control launched, Our Research and Development Team has been working enthusiastically to deliver the
latest features and technologies to the market, aiming to transfer your dream home into reality.
At the beginning of 2015, Solace announced the delivery of its technology to the business sector by creating integrated Smart
Conference Rooms. As SOLACE has a vision for making meetings better, and a passion for delivering the solutions that make it
happen. SOLACE believes that meeting room technology needs to work out much more than its basic task of delivering content to
displays or projector screens. Our main concept is to let SOLACE take control of the technology, so you can focus on your meeting.
Partners
www.solaceautomation.com
27
Residential AutomationSolace Home Control gives you control over every aspect of
your home, linking them all together for your convenience
through your TV, Computer, Touch Panels or even your cell
phone.
Solace wants you and your family to experience the freedom
and peace of mind you deserve to enjoy:
The luxury to adjust the light settings and room temperature in
each room to your desired taste.
The comfort of knowing that your home has the highest
security whether you are at home or away.
The freedom to watch whatever you want, whenever you want,
and wherever you want.
Commercial AutomationSimplify and streamline the technology in your boardrooms,
conference rooms or throughout the facility.
Integrated solutions from SOLACE® simplify installation and
practical usage, as well as maintenance and scalability.
SOLACE® has evolved far beyond the touch panel and control
system, becoming the definitive source for centrally and
globally controlling, managing and presenting information.
28
Tomorrow’s Solutions, Today.www.mcsholding.com
Mideast Communication Systems26A Ibn Malka St, off Mostafa Kamel Axis - behind Mobil Gas StationFirst Settlement , New Cairo
Mideast Communication Systems-MCS
MCSholding