2017
Design by: webandmedia.com | Beirut - Lebanon | +961 3 236 423
PORTFOLIO & PROFILE
The Global Provider for
Cyber Security Products & Services
IRISE Tower, Office 17-C8, Barsha Heights, Dubai, U.A.E. | Tel: +971 4 431 0761 | E-Mail: info@ICITechnology.com
@ICITechnology
2
Overview What is Cyber Security? Cyber security, is the body of technologies and informa on technology securi es, that focuses on protec ng computers, networks, programs, and data from unintended or unauthorized access, change, or destruc on. It involves as well, protec ng informa on and systems from major cyber threats, such as cyber terrorism, cyber warfare, and cyber espionage. Our Cyber Security Engineering Team researches and creates products and services related to security and survivability throughout the development and/or through the pre-developed systems. As a value added service, we perform special assessments and studies from the anatomy of a cyber a ack to the cost of a data breach – and why you need to protect your organiza on. Our daily life, economic vitality, and na onal security depend on a stable, safe, and resilient cyberspace. Every aspect of our daily rou ne life is governed by security measures. From government agencies, public services, u li es, banks, hospitals, financial ins tu ons, industries, private firms, media, malls, stores and all the way to social networks that has become an essen al habit to use everyday. Never underes mate hackers, social engineers and criminals and the numbers of increasing cyber crimes that yearly cost billions of dollars to both private and public sectors.
Services Penetra on Tes ng Cyber Security Awareness Training Secure Coding & Training for Developers Threat Hun ng Resource Management & IT Outsourcing Data Loss Preven on (DLP) Video Analy cs –VsaaS
About ICIT offers best of breed IT solutions supplying technology services to all business sectors, Public, Corporate, and SMBs. Wellversed experienced consultants with a wealth of knowledge and expertise to transform the technology to a business lingo, anyone within the corporation can understand. ICIT makes it simple! Our vision is to create an integrated flexible standard base business that delivers value to our customers. Our mission is the empowerment of businesses to improve prospects for its sponsors through the delivery of structure and comprehensive services.
Governance, Audi ng Training, & Assessments Digital Solu ons @ICITechnology www.ICITechnology.com
IRISE Tower, Office 17-C8, Barsha Heights, Dubai, U.A.E. | Tel: +971 4 431 0761 | E-Mail: info@ICITechnology.com
3
Penetra on Tes ng Penetra on Tes ng services mimic an a acker seeking to access sensi ve assets by exploi ng security weaknesses exis ng across mul ple systems, which helps our clients to determine:
Security weaknesses Test the organiza on's security policy compliance The employees' security awareness The organiza on's ability to iden fy and respond to security incidents
Our team performs: Targeted Tes ng, External Tes ng, Internal tes ng, Blind Tes ng, Network Penetra on Tes ng, Web applica on Penetra on Tes ng, Secure Coding Pen Tes ng.
Cyber Security Awareness Training A high-quality web-based interac ve training combined with common traps, live demonstra on videos, short comprehension tests and scenariobased Danger Zone exercises. Social Engineering Assessment (Phishing Campaigns): The main objec ve of this service is to target the users and worksta ons and test defense mechanisms, detec on and reac on capabili es. These Phishing emails would be highly customized for your organiza on deliverables:
Quan ta ve and qualita ve results Enumera on of the a acks Proof of Compromise
Secure Coding& Training for Developers An innova ve gamified approach to measuring the security posture of your development community. A suite of hands-on, interac ve learning scenarios that enable developers to master secure coding techniques in different development languages and frameworks.
@ICITechnology www.ICITechnology.com
IRISE Tower, Office 17-C8, Barsha Heights, Dubai, U.A.E. | Tel: +971 4 431 0761 | E-Mail: info@ICITechnology.com
4
Threat Hun ng Industry reports indicate organiza ons are struggling to mely detect and respond to cyber security incidents. Is your organiza on currently compromised? An easy ques on but unfortunately it turned out that the response is not that easy. ICI Technology offers the most advanced incident response packages, cyber security incident detec on & response capability. Verizon Data Breach Inves ga ons Report
FireEye M-Trends: Beyond the breach
100%
Time from Earliest Evidence of Compromise to Discovery of Compromise 75%
67% 56% 55% 61% 67% 62% 67% 89% 62% 76% 62% 84%
31% Vic ms discovered the breach internally
Median number of days that threat the groups were present on a vic m’s network before detec on
50%
% where “days or less”
205
How compromises are being detected
24 days less than 2013 25%
69% Vic ms no fied by an external en ty
Longest Presence: 2,982 Days 0% 2005
2007
2009
2011
2013
2015
The graph illustrates how long it takes a ackers to compromise a target versus the me it takes the defenders to detect it.
The above illustra on highlights two interes ng sta s cs: The median number of days before detec on of an intrusion is 205 (almost 7 months) - Only 31% of breaches are discovered internally
Resource Management & IT Outsourcing Informa on Technology plays a key role in your daily business Opera ons. However some mes you won't have me to fix a problem or make technology work in the way you want. If you're a new business owner, IT could be a daun ng task that consumes me you would rather spend focusing on your business. Perhaps the costs of employing a dedicated team, with different skills to look a er your technology, is something you don't want the hassle of handling . ICIT offers a range of proac ve, managed IT support contracts that take cares of all your technology needs so you can concentrate on your core business.
Data Loss Preven on (DLP) A mul ple Scalable Data Loss Preven on suites that has an excellent track record of deployment in highly distributed environments and for monitoring thousands of users and devices. At the other end of the scale, there is a small business version that u lizes a single server for all func ons.
@ICITechnology www.ICITechnology.com
IRISE Tower, Office 17-C8, Barsha Heights, Dubai, U.A.E. | Tel: +971 4 431 0761 | E-Mail: info@ICITechnology.com
5
Video Analy cs – VsaaS Our unique enterprise-class PSIM solu ons simplify and synchronize your IP and analog security and non-security systems. We u lize your exis ng security and data infrastructure in very powerful new ways. The so ware works seamlessly with virtually all IP-based cameras and encoders and runs on COTS servers, worksta ons, and mobile pla orms. Our standardsbased, open architecture allows for extremely robust integra on of 3rd party security and IT systems including analog and IP cameras, access control, biometrics, mobile smart devices, radar, video analy cs, and many more technologies.
Governance, Audi ng Training, & Assessments ITIL Training: Informa on Technology Infrastructure Library training is a best prac ce framework that has been drawn from both the public and private sectors interna onally. It describes how IT resources should be organized to deliver business values, documen ng the processes, func ons and roles of IT Service Management (ITSM). COBIT Training: COBIT is the only business framework for the governance and management of enterprise IT. COBIT helps maximize the value of informa on by incorpora ng the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, prac ces, analy cal tools and models to help increase the trust in, and value from, informa on systems.
Digital Solu ons Social Media strategy management, content crea on, apps, and campaigns Online marke ng: SEO, SEM, Adwords and others. Web solu on & Web hos ng: (Website design/development, CMS, E-commerce & Bespoke web applica on) Corporate/Product Video Presenta on/Documentary Mobile app solu ons (iOS, Android & Windows Phone)
@ICITechnology www.ICITechnology.com
IRISE Tower, Office 17-C8, Barsha Heights, Dubai, U.A.E. | Tel: +971 4 431 0761 | E-Mail: info@ICITechnology.com