CYBER-i Corporate Dossier

AGC Networks Ltd
AGC Networks LtdAGC Networks Ltd

Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable. Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business. Know more about AGC Networks here: http://www.agcnetworks.com/in/en/cyber-i

AGC Networks Limited.
CYBER-i
Corporate Dossier
AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help
organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve
employee productivity by embedding Communications and securing their business processes.
AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests
in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With
a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica,
UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to
foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision,
global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger
client base for AGC.
2
FIREWALL
SPYWARE
PASSWORD
UPDATE
VIRUS
PHISING
HACKER
SPAM
IDENTITY
INTERNET
AGC
Quadrants
CORPORATE INFORMATION
● IP Communications
● Collaboration
● Contact Center
● Multimedia Integration
Unified Communications Network Infrastructure
& Data Center
● UC Applications
● IoT
● Digital Applications
● CRM & ERP Integration
Enterprise ApplicationsCyber Security ( )
● Switching & Routing
● Wireless & Mobility
● Virtualization
● Data Center
● Audit & Risk Assessment
● Certification
● Application & Data Security
● SIEM & SCADA Capability
3
CYBER-i Managed Security Services
Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are
looking to improve efficiency of compliance and security initiatives, we understand that business requirements
can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.
Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD,
social media, web applications and big data can pose risks as well as create inefficiencies if not properly
managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED
SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed
services designed to meet the unique demands of your business.
Do Security Your Way
AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install,
configure and tune your solutions so that it can be controlled internally or managing a complete program for your
organization.
Elevate Your Security Posture
Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your
managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like
threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware
and more.
Drive Intelligence
Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today.
Trustwave performs threat research and analysis that can help you better understand, detect and prevent security
breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global
Threat Database.
Expert Support
Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals.
All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also
holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE,
etc. All of our security analysts have real-world network security experience which they leverage to fully investigate
and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct
their duties with a singular purpose, to safeguard your IT environment. As part of
Get Sustainable
We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view
your programs in real-time, access all your managed services, make support requests, see event history, run reports
and manage your account, all through one easy-to use dashboard.
CUSTOM MANAGED SERVICES
CYBER-i helps augment your security strategy in key
areas to help you evolve processes, elevate data
protection or advance the way you manage threats.
With deep security expertise and unmatched global
threat intelligence, we can design a program that
supports your specific needs, while giving you
complete visibility and control.
PACKAGED MSS BUNDLES
Simplify your security program, operationalize your
expenses and keep your team focused on business
priorities. With packaged solution bundles, expert
management and automated tools, we remove the
day-to-day complexity of compliance and data
protection, so you can get back to what you’re
passionate about – your business.
MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES
SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident
Management Alert & Notification I CXO Report I Compliance Report
Security Solution
Monitoring
(On-site / Remote)
Policy Management I Change Management I Configuration Management I
Signature Updates Device Fine Tuning I Version Upgrade I Reporting
Security Solution
Management
(On-site / Remote)
Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature
Updates I Compliance Management Deviation Reporting I Uniform Policy
Management I Configuration Management
Managed Endpoint
Security Services
Web Application Malware Monitoring I Web Application Malware I
Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware
4
5
SERVICES PORTFOLIO
SOLUTION PORTFOLIO
CYBER-i
SOLUTIONS Portfolio
Data Security
• Advanced Threat
Protection
• Information Rights
Management
• Mobile Device
Management
• Vulnerability Management
Application
Security
• Web
Application
Firewall
• Database
Access
Management
Advance Security
• Network Immune
System
• ICS Security
Identity &
Access
• Two Factor
Authentication
• Privilege
Identity
Management
End Point
Security
• Antivirus, End
Point Protection
Network Security
• Firewall
• NG Firewall
• IPS
• UTM
• Enterprise Security
• IOT Security
• Cloud Security
Security
Monitoring
• SIEM
• Data Leakage
Protection
• Network Access
Control
Audit
• Vulnerability
Assessment
• Penetration
Testing
• Network
Audits
& Assessment,
Security Audit
• Application
Audits & Source
Code Review
• Internal Audits
• Digital
Forensics
Management
• Compliance Mgmt
• Security Operations
Center Management
• Vulnerability
Management
• Security Solutions
Implementation &
Management
• Staff Augmentation
Implementation
• SIEM
• APT
• DLP
• NAC
• Bandwidth
Management &
WAN Accelerator
• Wireless Security
• Risk Management
Compliance Tool
CYBER-i
SERVICES Portfolio
Compliance
• HIPAA
• SOC 2
• Data Privacy
• COBIT / ITIL
Framework
Certifications
• ISO 9001
• ISO 20000
• ISO 22301
• ISO 27001
• PCI DSS
• PA DSS
CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance,
Information Security Management, Service Management & Business Continuity Management, Product
Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking
assignments in the field of Security.
• Consultants possess the contemporary best industry recognized certifications such as:
- Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001,
20000, 22301 and 27001)
- Technical (CEGIT, CEH, OCSP)
- Various Vendor Certifications
- PMP©
• Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering,
Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises.
• Consultants have vast experience in implementing the management system frameworks, governance
frameworks & maturity models as well as auditing the same.
• Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of
which provides a thorough understanding of our clients’ needs.
• Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure
Software Development, Access Control, etc. which matters while assessing, discovering and providing
solutions.
• Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right
choice.
CORE COMPETENCIES
AGC CYBER-i SKILL MATRIX
6
ISO 27001
BS 25999
ISO 20000
SOX
COBIT
HIPAA
PCI DSS
SAS 70
Data Privacy
ISO 9001
ISO 38500
OHSAS 18001
ISO 14001
4%
22%
14%
18%
4%
2%
9%
9%
3%
9%
2%
2%
2%
CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational
requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading
partners include the following:
7
ASSOCIATIONS
OEM PARTNERSHIPS
• Vast experience of cross functional domains
• Experience to handle very complex and large projects
• Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the
relevant qualifications and industry experience
• An ISO 9001, SOC2 Type I and ISO 27001 certified company
• Close association with the ISACA (USA) Pune and Mumbai chapters
• Strong association with DSCI (Data Security Council of India)
• Work closely with international management system certification bodies such as TUV (Germany), DNV
(Norway) and BSI (UK)
• Empaneled with Computer Emergency Response Team (India) as information security auditing organization
OUR DIFFERENTIATORS
8
GLOBAL CLIENTELE
DOMESTIC CLIENTELE
9
This is confidential and proprietary information of AGC Networks Ltd.
Contact Us
AGC Networks Ltd.
Equinox Business Park, Tower 1,
Off BKC, LBS Marg, Kurla (West),
Mumbai - 400 070, Maharashtra, India
T: +91 22 66617272
Ketal Sheth
Cyber Security - Solution Architect
ketal.sheth@agcnetworks.com
T: +91 9833537390
E: info@agcnetworks.com | W: www.agcnetworks.com
GLOBAL FOOTPRINT
ABOUT AGC
Global & India HQ
US HQ
AUSTRALIA
- Melbourne
- Sydney
NORTH AMERICA
Dallas
- Florida
- Minneapolis
- Philadelphia
KENYA
- Nairobi
ETHIOPIA
RWANDA
NIGERIA
SOUTH AFRICA
PHILIPPINES
- Manila
NEW ZEALAND
- Auckland
SAUDI ARABIA
- Riyadh
UAE
- Dubai
INDIA
> Mumbai
- Bangalore
- Chennai
- Gandhinagar
- Gurgaon
- Hyderabad
- Kolkata
- Pune
SINGAPORE
UK
- London
AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified
Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise
Applications to evolve the customer’s digital landscape.
AGC’s ability to tailor solutions across quadrants is strengthened through delivery of
seamless customer support services.
A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North
America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers.
In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and
Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating
customers’ business.

Recomendados

Scalar_Managed_Security_Services_2016 von
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
244 views4 Folien
Cyber security infotech pvt ltd von
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber Security Infotech
298 views21 Folien
Csa summit who can protect us education for cloud security professionals von
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionalsCSA Argentina
1.2K views39 Folien
Csa summit seguridad en el sddc von
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
1.1K views44 Folien
Csa summit argentina-reavis von
Csa summit   argentina-reavisCsa summit   argentina-reavis
Csa summit argentina-reavisCSA Argentina
1.1K views27 Folien
Cyber Security For Organization Proposal Powerpoint Presentation Slides von
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
919 views36 Folien

Más contenido relacionado

Was ist angesagt?

Ransomware webinar may 2016 final version external von
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
1.9K views26 Folien
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience von
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
920 views40 Folien
Pöyry ICS Cyber Security brochure (English) von
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
297 views3 Folien
How to minimize threats in your information system using network segregation? von
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
1.5K views25 Folien
DTS Solution - Company Presentation von
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
482 views17 Folien
To MSSP or not to MSSP IISF 2015 von
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
1.2K views13 Folien

Was ist angesagt?(20)

Ransomware webinar may 2016 final version external von Zscaler
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler1.9K views
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience von Shah Sheikh
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Shah Sheikh920 views
Pöyry ICS Cyber Security brochure (English) von Pöyry
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
Pöyry297 views
How to minimize threats in your information system using network segregation? von PECB
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB 1.5K views
DTS Solution - Company Presentation von Shah Sheikh
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh482 views
To MSSP or not to MSSP IISF 2015 von Paul Hogan
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
Paul Hogan1.2K views
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ? von michaelbasoah
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah1.7K views
Assessing the Security of Cloud SaaS Solutions von Digital Bond
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
Digital Bond5.2K views
DTS Solution - Company Presentation von Shah Sheikh
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh12.2K views
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) von Shah Sheikh
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh597 views
Pactera - Cloud, Application, Cyber Security Trend 2016 von Kyle Lai
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
Kyle Lai584 views
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers... von Priyanka Aash
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
Priyanka Aash400 views
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ... von CSA Argentina
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
CSA Argentina1.1K views
(SACON) Vandana Verma - Living In A World of Zero Trust von Priyanka Aash
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
Priyanka Aash502 views
Scalar Security Roadshow - Calgary Presentation von Scalar Decisions
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions1.1K views
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration...... von centralohioissa
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
centralohioissa1.3K views
DTS Solution - Cyber Security Services Portfolio von Shah Sheikh
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh3.1K views

Destacado

2016-11-11 08-32 página #6 von
2016-11-11 08-32 página #62016-11-11 08-32 página #6
2016-11-11 08-32 página #6rcastrovera
24 views1 Folie
Marketing von
Marketing Marketing
Marketing salihaasad
1K views49 Folien
First Day Of School (Ready, Set, Go!!!) von
First Day Of School (Ready, Set, Go!!!)First Day Of School (Ready, Set, Go!!!)
First Day Of School (Ready, Set, Go!!!)Shirkethia Walker
109 views14 Folien
USHARANI R von
USHARANI RUSHARANI R
USHARANI RUsha Rani R
227 views3 Folien
Presentation about SIBL von
Presentation about SIBLPresentation about SIBL
Presentation about SIBLmarufx066
2.8K views46 Folien
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT von
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & ITSite24x7
1.8K views56 Folien

Destacado(12)

2016-11-11 08-32 página #6 von rcastrovera
2016-11-11 08-32 página #62016-11-11 08-32 página #6
2016-11-11 08-32 página #6
rcastrovera24 views
Presentation about SIBL von marufx066
Presentation about SIBLPresentation about SIBL
Presentation about SIBL
marufx0662.8K views
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT von Site24x7
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
Site24x71.8K views
AMD Opteron A1100 Series SoC Launch Presentation von Low Hong Chuan
AMD Opteron A1100 Series SoC Launch PresentationAMD Opteron A1100 Series SoC Launch Presentation
AMD Opteron A1100 Series SoC Launch Presentation
Low Hong Chuan2.2K views
El Anglo-Sionismo controla Iberoamérica von Ramón Copa
El Anglo-Sionismo  controla IberoaméricaEl Anglo-Sionismo  controla Iberoamérica
El Anglo-Sionismo controla Iberoamérica
Ramón Copa2.6K views
USRP Project Final Report von Arjan Gupta
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
Arjan Gupta1.9K views
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016 von Digiday
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Digiday222 views

Similar a CYBER-i Corporate Dossier

Advanced IT and Cyber Security for Your Business von
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
859 views24 Folien
GPS - Corporate Overview von
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate OverviewTawnia Beckwith
58 views2 Folien
Brochure Security von
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
131 views2 Folien
Cyber Security and Cloud Security von
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
574 views4 Folien
MCGlobalTech Service Presentation von
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
457 views12 Folien
Micro Focus Corporate Overview von
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
2.3K views29 Folien

Similar a CYBER-i Corporate Dossier (20)

Advanced IT and Cyber Security for Your Business von Infopulse
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse859 views
Brochure Security von bryanpsu
Brochure SecurityBrochure Security
Brochure Security
bryanpsu131 views
Micro Focus Corporate Overview von Micro Focus
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
Micro Focus 2.3K views
Cyber security service portfolio of Future Data Ltd von Sabrina Chan
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
Sabrina Chan95 views
About graycon von martyrj
About grayconAbout graycon
About graycon
martyrj437 views
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf von IIBA-IT
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
IIBA-IT21 views
Security Transformation Services von xband
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
xband2.1K views
IT Risk Management & Compliance von rhanna11
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
rhanna11439 views
Skytron company profile von Pasi Ankit
Skytron company profileSkytron company profile
Skytron company profile
Pasi Ankit739 views
20161021 JS Cybersecurity Service Proposal von Carl Bradley Pate
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate922 views

Más de AGC Networks Ltd

AGC Cloud Services_USA von
AGC Cloud Services_USA  AGC Cloud Services_USA
AGC Cloud Services_USA AGC Networks Ltd
1.6K views18 Folien
AGC Networks’ Profile von
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ ProfileAGC Networks Ltd
345 views1 Folie
AGC Networks' Corporate Presentation 2016 von
AGC Networks' Corporate Presentation 2016AGC Networks' Corporate Presentation 2016
AGC Networks' Corporate Presentation 2016AGC Networks Ltd
481 views18 Folien
AGC Fact Sheet von
AGC Fact SheetAGC Fact Sheet
AGC Fact SheetAGC Networks Ltd
8.8K views1 Folie
Hospitality Solution Offering - AGC Networks von
Hospitality Solution Offering - AGC NetworksHospitality Solution Offering - AGC Networks
Hospitality Solution Offering - AGC NetworksAGC Networks Ltd
787 views8 Folien
Information Tehcnology Infrastructure Library von
Information Tehcnology Infrastructure LibraryInformation Tehcnology Infrastructure Library
Information Tehcnology Infrastructure LibraryAGC Networks Ltd
339 views4 Folien

Más de AGC Networks Ltd(7)

Último

20231123_Camunda Meetup Vienna.pdf von
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
49 views73 Folien
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
178 views15 Folien
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
59 views13 Folien
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
97 views28 Folien
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... von
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
69 views29 Folien
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
56 views10 Folien

Último(20)

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... von ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue69 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool von ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue56 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE67 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 views
NTGapps NTG LowCode Platform von Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue149 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson142 views
The Role of Patterns in the Era of Large Language Models von Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li74 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue75 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... von ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue120 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue von ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10110 views

CYBER-i Corporate Dossier

  • 2. AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve employee productivity by embedding Communications and securing their business processes. AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica, UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision, global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger client base for AGC. 2 FIREWALL SPYWARE PASSWORD UPDATE VIRUS PHISING HACKER SPAM IDENTITY INTERNET AGC Quadrants CORPORATE INFORMATION ● IP Communications ● Collaboration ● Contact Center ● Multimedia Integration Unified Communications Network Infrastructure & Data Center ● UC Applications ● IoT ● Digital Applications ● CRM & ERP Integration Enterprise ApplicationsCyber Security ( ) ● Switching & Routing ● Wireless & Mobility ● Virtualization ● Data Center ● Audit & Risk Assessment ● Certification ● Application & Data Security ● SIEM & SCADA Capability
  • 3. 3 CYBER-i Managed Security Services Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable. Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business. Do Security Your Way AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install, configure and tune your solutions so that it can be controlled internally or managing a complete program for your organization. Elevate Your Security Posture Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware and more. Drive Intelligence Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today. Trustwave performs threat research and analysis that can help you better understand, detect and prevent security breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global Threat Database. Expert Support Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals. All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE, etc. All of our security analysts have real-world network security experience which they leverage to fully investigate and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct their duties with a singular purpose, to safeguard your IT environment. As part of Get Sustainable We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view your programs in real-time, access all your managed services, make support requests, see event history, run reports and manage your account, all through one easy-to use dashboard. CUSTOM MANAGED SERVICES CYBER-i helps augment your security strategy in key areas to help you evolve processes, elevate data protection or advance the way you manage threats. With deep security expertise and unmatched global threat intelligence, we can design a program that supports your specific needs, while giving you complete visibility and control. PACKAGED MSS BUNDLES Simplify your security program, operationalize your expenses and keep your team focused on business priorities. With packaged solution bundles, expert management and automated tools, we remove the day-to-day complexity of compliance and data protection, so you can get back to what you’re passionate about – your business.
  • 4. MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident Management Alert & Notification I CXO Report I Compliance Report Security Solution Monitoring (On-site / Remote) Policy Management I Change Management I Configuration Management I Signature Updates Device Fine Tuning I Version Upgrade I Reporting Security Solution Management (On-site / Remote) Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature Updates I Compliance Management Deviation Reporting I Uniform Policy Management I Configuration Management Managed Endpoint Security Services Web Application Malware Monitoring I Web Application Malware I Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware 4
  • 5. 5 SERVICES PORTFOLIO SOLUTION PORTFOLIO CYBER-i SOLUTIONS Portfolio Data Security • Advanced Threat Protection • Information Rights Management • Mobile Device Management • Vulnerability Management Application Security • Web Application Firewall • Database Access Management Advance Security • Network Immune System • ICS Security Identity & Access • Two Factor Authentication • Privilege Identity Management End Point Security • Antivirus, End Point Protection Network Security • Firewall • NG Firewall • IPS • UTM • Enterprise Security • IOT Security • Cloud Security Security Monitoring • SIEM • Data Leakage Protection • Network Access Control Audit • Vulnerability Assessment • Penetration Testing • Network Audits & Assessment, Security Audit • Application Audits & Source Code Review • Internal Audits • Digital Forensics Management • Compliance Mgmt • Security Operations Center Management • Vulnerability Management • Security Solutions Implementation & Management • Staff Augmentation Implementation • SIEM • APT • DLP • NAC • Bandwidth Management & WAN Accelerator • Wireless Security • Risk Management Compliance Tool CYBER-i SERVICES Portfolio Compliance • HIPAA • SOC 2 • Data Privacy • COBIT / ITIL Framework Certifications • ISO 9001 • ISO 20000 • ISO 22301 • ISO 27001 • PCI DSS • PA DSS
  • 6. CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance, Information Security Management, Service Management & Business Continuity Management, Product Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking assignments in the field of Security. • Consultants possess the contemporary best industry recognized certifications such as: - Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001, 20000, 22301 and 27001) - Technical (CEGIT, CEH, OCSP) - Various Vendor Certifications - PMP© • Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering, Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises. • Consultants have vast experience in implementing the management system frameworks, governance frameworks & maturity models as well as auditing the same. • Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of which provides a thorough understanding of our clients’ needs. • Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure Software Development, Access Control, etc. which matters while assessing, discovering and providing solutions. • Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right choice. CORE COMPETENCIES AGC CYBER-i SKILL MATRIX 6 ISO 27001 BS 25999 ISO 20000 SOX COBIT HIPAA PCI DSS SAS 70 Data Privacy ISO 9001 ISO 38500 OHSAS 18001 ISO 14001 4% 22% 14% 18% 4% 2% 9% 9% 3% 9% 2% 2% 2%
  • 7. CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading partners include the following: 7 ASSOCIATIONS OEM PARTNERSHIPS • Vast experience of cross functional domains • Experience to handle very complex and large projects • Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the relevant qualifications and industry experience • An ISO 9001, SOC2 Type I and ISO 27001 certified company • Close association with the ISACA (USA) Pune and Mumbai chapters • Strong association with DSCI (Data Security Council of India) • Work closely with international management system certification bodies such as TUV (Germany), DNV (Norway) and BSI (UK) • Empaneled with Computer Emergency Response Team (India) as information security auditing organization OUR DIFFERENTIATORS
  • 9. 9 This is confidential and proprietary information of AGC Networks Ltd. Contact Us AGC Networks Ltd. Equinox Business Park, Tower 1, Off BKC, LBS Marg, Kurla (West), Mumbai - 400 070, Maharashtra, India T: +91 22 66617272 Ketal Sheth Cyber Security - Solution Architect ketal.sheth@agcnetworks.com T: +91 9833537390 E: info@agcnetworks.com | W: www.agcnetworks.com GLOBAL FOOTPRINT ABOUT AGC Global & India HQ US HQ AUSTRALIA - Melbourne - Sydney NORTH AMERICA Dallas - Florida - Minneapolis - Philadelphia KENYA - Nairobi ETHIOPIA RWANDA NIGERIA SOUTH AFRICA PHILIPPINES - Manila NEW ZEALAND - Auckland SAUDI ARABIA - Riyadh UAE - Dubai INDIA > Mumbai - Bangalore - Chennai - Gandhinagar - Gurgaon - Hyderabad - Kolkata - Pune SINGAPORE UK - London AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise Applications to evolve the customer’s digital landscape. AGC’s ability to tailor solutions across quadrants is strengthened through delivery of seamless customer support services. A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers. In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating customers’ business.