+ All Categories
Home > Technology > CYBER-i Corporate Dossier

CYBER-i Corporate Dossier

Date post: 07-Jan-2017
Category:
Upload: agc-networks-ltd
View: 86 times
Download: 0 times
Share this document with a friend
9
AGC Networks Limited. CYBER-i Corporate Dossier
Transcript
Page 1: CYBER-i Corporate Dossier

AGC Networks Limited.CYBER-iCorporate Dossier

Page 2: CYBER-i Corporate Dossier

AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve employee productivity by embedding Communications and securing their business processes.

AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica, UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision, global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger client base for AGC.

2

FIREWALL

SPYWARE

PASSWORD

UPDATE

VIRUS

PHISING HACKER

SPAM

IDENTITY

INTERNET

AGCQuadrants

CORPORATE INFORMATION

● IP Communications

● Collaboration

● Contact Center

● Multimedia Integration

Unified Communications Network Infrastructure& Data Center

● UC Applications

● IoT

● Digital Applications

● CRM & ERP Integration

Enterprise ApplicationsCyber Security ( )

● Switching & Routing

● Wireless & Mobility

● Virtualization

● Data Center

● Audit & Risk Assessment

● Certification

● Application & Data Security

● SIEM & SCADA Capability

Page 3: CYBER-i Corporate Dossier

3

CYBER-i Managed Security Services

Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.

Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business.

Do Security Your WayAGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install, configure and tune your solutions so that it can be controlled internally or managing a complete program for your organization.

Elevate Your Security PostureOur expertise in high-value managed security services can take you beyond the basics. Sure, you may have your managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware and more.

Drive Intelligence Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today. Trustwave performs threat research and analysis that can help you better understand, detect and prevent security breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global Threat Database.

Expert Support Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals. All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE, etc. All of our security analysts have real-world network security experience which they leverage to fully investigate and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct their duties with a singular purpose, to safeguard your IT environment. As part of

Get Sustainable We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view your programs in real-time, access all your managed services, make support requests, see event history, run reports and manage your account, all through one easy-to use dashboard.

CUSTOM MANAGED SERVICES

CYBER-i helps augment your security strategy in key areas to help you evolve processes, elevate data protection or advance the way you manage threats. With deep security expertise and unmatched global threat intelligence, we can design a program that supports your specific needs, while giving you complete visibility and control.

PACKAGED MSS BUNDLES

Simplify your security program, operationalize your expenses and keep your team focused on business priorities. With packaged solution bundles, expert management and automated tools, we remove the day-to-day complexity of compliance and data protection, so you can get back to what you’re passionate about – your business.

Page 4: CYBER-i Corporate Dossier

MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES

SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident

Management Alert & Notification I CXO Report I Compliance ReportSecurity SolutionMonitoring(On-site / Remote)

Policy Management I Change Management I Configuration Management I

Signature Updates Device Fine Tuning I Version Upgrade I ReportingSecurity Solution Management (On-site / Remote)

Virus / Malware / Spyware Monitoring I Outbreak Prevention I SignatureUpdates I Compliance Management Deviation Reporting I Uniform Policy Management I Configuration Management

Managed EndpointSecurity Services

Web Application Malware Monitoring I Web Application Malware I

Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware

4

Page 5: CYBER-i Corporate Dossier

5

SERVICES PORTFOLIO

SOLUTION PORTFOLIO

CYBER-iSOLUTIONS Portfolio

Data Security• Advanced Threat

Protection• Information Rights

Management• Mobile Device

Management• Vulnerability Management

Application Security• Web

Application Firewall

• Database Access Management

Advance Security• Network Immune

System

• ICS Security

Identity & Access• Two Factor Authentication• Privilege

Identity Management

End Point Security

• Antivirus, End Point Protection

Network Security• Firewall• NG Firewall• IPS• UTM

• Enterprise Security• IOT Security• Cloud Security

SecurityMonitoring

• SIEM

• Data Leakage Protection

• Network Access Control

Audit • Vulnerability

Assessment• Penetration

Testing• Network

Audits & Assessment, Security Audit

• Application Audits & Source Code Review

• Internal Audits• Digital

Forensics

Management• Compliance Mgmt• Security Operations

Center Management• Vulnerability

Management• Security Solutions

Implementation & Management

• Staff Augmentation

Implementation• SIEM• APT• DLP• NAC• Bandwidth

Management & WAN Accelerator

• Wireless Security• Risk Management

Compliance Tool

CYBER-iSERVICES Portfolio

Compliance• HIPAA• SOC 2• Data Privacy• COBIT / ITIL

Framework

Certifications• ISO 9001• ISO 20000• ISO 22301• ISO 27001• PCI DSS• PA DSS

Page 6: CYBER-i Corporate Dossier

CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance, Information Security Management, Service Management & Business Continuity Management, Product Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking assignments in the field of Security.

• Consultants possess the contemporary best industry recognized certifications such as:

- Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001, 20000, 22301 and 27001)

- Technical (CEGIT, CEH, OCSP)

- Various Vendor Certifications

- PMP©

• Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering, Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises.

• Consultants have vast experience in implementing the management system frameworks, governance frameworks & maturity models as well as auditing the same.

• Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of which provides a thorough understanding of our clients’ needs.

• Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure Software Development, Access Control, etc. which matters while assessing, discovering and providing solutions.

• Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right choice.

CORE COMPETENCIES

AGC CYBER-i SKILL MATRIX

6

ISO 27001

BS 25999

ISO 20000

SOX

COBIT

HIPAA

PCI DSS

SAS 70

Data Privacy

ISO 9001

ISO 38500

OHSAS 18001

ISO 14001

4%

22%

14%

18%

4%

2%

9%

9%

3%

9% 2%2%

2%

Page 7: CYBER-i Corporate Dossier

CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading partners include the following:

7

ASSOCIATIONS

OEM PARTNERSHIPS

• Vast experience of cross functional domains

• Experience to handle very complex and large projects

• Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the relevant qualifications and industry experience

• An ISO 9001, SOC2 Type I and ISO 27001 certified company

• Close association with the ISACA (USA) Pune and Mumbai chapters

• Strong association with DSCI (Data Security Council of India)

• Work closely with international management system certification bodies such as TUV (Germany), DNV (Norway) and BSI (UK)

• Empaneled with Computer Emergency Response Team (India) as information security auditing organization

OUR DIFFERENTIATORS

Page 8: CYBER-i Corporate Dossier

8

GLOBAL CLIENTELE

DOMESTIC CLIENTELE

Page 9: CYBER-i Corporate Dossier

9This is confidential and proprietary information of AGC Networks Ltd.

Contact UsAGC Networks Ltd.Equinox Business Park, Tower 1,Off BKC, LBS Marg, Kurla (West),Mumbai - 400 070, Maharashtra, IndiaT: +91 22 66617272

Ketal Sheth Cyber Security - Solution [email protected] T: +91 9833537390

E: [email protected] | W: www.agcnetworks.com

GLOBAL FOOTPRINT

ABOUT AGC

Global & India HQ

US HQAUSTRALIA- Melbourne- Sydney

NORTH AMERICA Dallas- Florida- Minneapolis- Philadelphia

KENYA- Nairobi

ETHIOPIA

RWANDA

NIGERIA

SOUTH AFRICA

PHILIPPINES- Manila

NEW ZEALAND- Auckland

SAUDI ARABIA- Riyadh

UAE- Dubai

INDIA> Mumbai- Bangalore- Chennai- Gandhinagar- Gurgaon- Hyderabad- Kolkata- Pune

SINGAPORE

UK- London

AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise Applications to evolve the customer’s digital landscape.

AGC’s ability to tailor solutions across quadrants is strengthened through delivery ofseamless customer support services.

A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers.

In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating customers’ business.


Recommended