SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Company Overview 
www.dts-solution.com 
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
DTS Solution
DTS Solution- Overview 
DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. 
We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. 
DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. 
The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
DTS Solution - Vision 
Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
DTS Solution - Services 
www.dts-solution.com 
PRE-SALES SERVICES 
STRATEGIC CONSULTING 
PROFESSIONAL SERVICES 
COMPLIANCE CONSULTING 
SECURITY ASSESSMENT
DTS Solution - Domains
Network Security
Data Security
Infrastructure Security
System Security
Application Security
Mobility / Wireless Security
Compliance Monitoring
Advance Threat Protection
Telecom Security
Cloud Security
SCADA / ICS Security
Security Operations Center
DTS Solution – Technology Partners
DTS Solution – Key Differentiators 
HIGH TECHNICAL COMPETENCY AND EXPERTISE 
TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS 
DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING 
BOTTOM-UP ORGANIZATION
DTS Solution – Services
DTS Solution – Service Offering 
Presales Services 
 RFP and RFI Documentation Services 
 Technical Requirements Gathering 
 Vendor Selection Process
Professional Services Architectural Design 
 Information Security Consulting 
 Documentation Services 
 Security Architecture Design 
 High Level Design 
 Low Level Design Deployment, Implementation and Operate 
 Implementation Services 
 Firewall Migration Services 
 Information and Service Flow Analysis 
 Network Security Audit On-site support 
 Resident Engineering Services 
DTS Solution – Service Offering
DTS Solution – Service Offering 
Information and Service Flow Analysis
DTS Solution – Service Offering 
Strategic Consulting 
 Capacity Planning 
 Cloud Computing Macroeconomics 
 Infrastructure Monitoring 
 IPTV Security Assessment 
 IPv4 to IPv6 transition 
 IPv6 Security 
 Management and Provisioning Platforms 
 Security Services Monetization
•ISO27001 
•ISA-99 / IEC-62443 
•PCI-DSS 3.0 
•Cloud Security Alliance – STAR 
•ADSIC – Abu Dhabi 
•ISR - Dubai
DTS Solution – Assessment Services 
Security Assessment Services 
Penetration Testing and Vulnerability Assessment 
Black Box Ethical Testing 
Vulnerability Management 
Unified Communications Audit 
VoIP / UC / Tele-presence security 
SCADA Security Evaluation Toolkit 
Industrial Control Systems Security Readiness 
Mobile Network Security 
UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce 
Fixed Mobile Convergence – SeGW and IMS Security 
Endpoint IP Discovery and Network Leakage Detection 
Rogue and Unknown Network Detection 
Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) 
Availability Assessment 
DDoS Protection – Botnet / Zombie Detection 
Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation 
Core Network Security 
MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion 
VPLS – Spanning Tree, ARP poisoning, MAC spoofing 
Social Engineering and Physical Security Review
DTS Solution – Some Key Facts +
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
DTS Security Research Labs – http://labs.dts-solution.com
DTS Solution – Some Key Facts + 
•UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure 
•Development of a Security Operations Center for the largest O&G company worldwide 
•Design and Deployment of largest NAC solution in the Middle East 
•Middle East’s first Security Architecture integrating with SDN based Fabric Data Center 
•Development of SCADA/ICS Security Operations Center 
•Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR 
•Largest Firewall Management and Compliance Solution Deployment in the region 
•Security Design of Largest ISP data centers in the region (80 racks) 
•Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services 
•Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure 
… and more…..
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Weitere ähnliche Inhalte

Mehr von Shah Sheikh

DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 

Mehr von Shah Sheikh (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

DTS Solution - Company Profile

  • 1. Company Overview www.dts-solution.com Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
  • 3. DTS Solution- Overview DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
  • 4. DTS Solution - Vision Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
  • 5. DTS Solution - Services www.dts-solution.com PRE-SALES SERVICES STRATEGIC CONSULTING PROFESSIONAL SERVICES COMPLIANCE CONSULTING SECURITY ASSESSMENT
  • 6. DTS Solution - Domains
  • 17. SCADA / ICS Security
  • 19. DTS Solution – Technology Partners
  • 20. DTS Solution – Key Differentiators HIGH TECHNICAL COMPETENCY AND EXPERTISE TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING BOTTOM-UP ORGANIZATION
  • 21. DTS Solution – Services
  • 22. DTS Solution – Service Offering Presales Services  RFP and RFI Documentation Services  Technical Requirements Gathering  Vendor Selection Process
  • 23. Professional Services Architectural Design  Information Security Consulting  Documentation Services  Security Architecture Design  High Level Design  Low Level Design Deployment, Implementation and Operate  Implementation Services  Firewall Migration Services  Information and Service Flow Analysis  Network Security Audit On-site support  Resident Engineering Services DTS Solution – Service Offering
  • 24. DTS Solution – Service Offering Information and Service Flow Analysis
  • 25. DTS Solution – Service Offering Strategic Consulting  Capacity Planning  Cloud Computing Macroeconomics  Infrastructure Monitoring  IPTV Security Assessment  IPv4 to IPv6 transition  IPv6 Security  Management and Provisioning Platforms  Security Services Monetization
  • 26. •ISO27001 •ISA-99 / IEC-62443 •PCI-DSS 3.0 •Cloud Security Alliance – STAR •ADSIC – Abu Dhabi •ISR - Dubai
  • 27. DTS Solution – Assessment Services Security Assessment Services Penetration Testing and Vulnerability Assessment Black Box Ethical Testing Vulnerability Management Unified Communications Audit VoIP / UC / Tele-presence security SCADA Security Evaluation Toolkit Industrial Control Systems Security Readiness Mobile Network Security UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce Fixed Mobile Convergence – SeGW and IMS Security Endpoint IP Discovery and Network Leakage Detection Rogue and Unknown Network Detection Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) Availability Assessment DDoS Protection – Botnet / Zombie Detection Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation Core Network Security MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion VPLS – Spanning Tree, ARP poisoning, MAC spoofing Social Engineering and Physical Security Review
  • 28. DTS Solution – Some Key Facts +
  • 29. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 30. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 31. DTS Solution – Some Key Facts + DTS Security Research Labs – http://labs.dts-solution.com
  • 32. DTS Solution – Some Key Facts + •UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP •Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP •First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure •Development of a Security Operations Center for the largest O&G company worldwide •Design and Deployment of largest NAC solution in the Middle East •Middle East’s first Security Architecture integrating with SDN based Fabric Data Center •Development of SCADA/ICS Security Operations Center •Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR •Largest Firewall Management and Compliance Solution Deployment in the region •Security Design of Largest ISP data centers in the region (80 racks) •Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services •Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure … and more…..
  • 33. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Hinweis der Redaktion

  1. DTS Solution’s vision is based on simple ethos, our primary objective is to be seen as a trusted security advisor within the information and network security field. Providing best-in-class security services to your organization our aim is to ensure complete client satisfaction not only during project engagement but more importantly after the project delivery lifecycle.Providing a high degree of client confidence and assurance, value based security services, lateral security consulting approach and innovating in the security industry are a few of our key goals.Security is a dynamic operation and DTS is no different; our organization ethic is based on its ability to be elastic in nature and adapt to market needs. As we develop a strong portfolio of established technology vendors and niche security industry players, DTS is committed to provide a complete end-to-end solution delivery; ranging from pre-sales to post-sales services.
  2. Juniper – Network & SecurityFortinet – Security, UTM Specialist, Mail, Web, DBRadware – Application Delivery, Former AlteonLoadbalancerSipera – VOIP SecurityArbor Networks – DDOS, Traffic Management and VisualiztaionPalo Alto – Next Generation Firewall, Application ControlRadisys – Mobile Security, LTE, 3G, FemotocellFireEye – Malware Protection