SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Identify.Innovate.Implement
About Lyra Infosystems
1
We are a Enterprise Technology Services & IT Consulting Company, headquartered in
Bangalore with offices in Delhi, Mumbai and Singapore.
With more than 12+ years of practical industry experience, Lyra Infosystems has been
mainly focused in helping businesses in technology areas like Software Composition
Analysis, Open Source Security, OS Compliance, OS Audits, Opensource Vulnerability
Assessment, Open Source Support, Open Source Monitoring, Legal re-mediation,
DevOps/DevSecOps, Remote Support, Priviledge Identity & Access Management,
Collaboration suite & Cybersecurity.
Lyra Infosystems is the first Indian company to achieve Open Chain conformant 1.0
status with extensive experience of helping companies globally to adopt Open Source
software. We are also Open Chain 2.0 Conformant.
Lyra's Growth Story
“Bomgar Certification”
for excellent customer
service
Launched in
Bangalore
‘Partner of the Year’
Award – Bomgar
2007
Extended
operations to Delhi
Inaugurated office in
Mumbai
2014 2015
‘Partner of the Year’
Award – BlackDuck
2013
‘Partner of the Year’
Award – BlackDuck
‘Partner of the Year’
Award – BlackDuck
2016
First Overseas office
in Singapore
2
Gold Partner with
Verizon Digital Media
Services
Partnership with Flexera
2017 20182012 2019
Flexera- SAM & SVM
2010 2019
Partnership with Icinga
& Lark
3
Happy Customers
289+ and Counting...
Technology Partners
4
Service Offerings
Lyra's Capabalities
SCA and Audit
Services
Legal
Remediation
Open Source
CRM & ERP
Solutions
DevOps/
DevSecOps
Consulting
Open Source
monitoring
Services
Open Source
Support
Services
Consultin
g
Services
Remote
Support
Management,
PIM and PAM
Unified
Collaboration
and
Communication
suite
Consulting Services
We understand your consulting needs from a holistic perspective. Our deep, functional expertise, enables
efficient resolution of critical issues across any scale.
Manage
• Operational risks
• Defects, bugs, and
vulnerabilities
• Process improvement
• Product enhancement
• Changes and
improvement to policies
Assess
• Open Source security &
compliance
• DevOps needs of an
organization
• Ongoing and new RSM,
PIM and PAM needs
• Open Source software
usage and practices
• CRM and ERP practices in
place
Implement
• OS Policies and practices
• End-to-end DevOps
• New RSM solutions or
upgrade existing ones
• Open Source
technologies, manage &
maintaining them
• Customized services for
existing & new ERP and
CRM systems
Support
• Dedicated team for 24/5
premium level support
6
Open Source Support Services
• Whether you are using community editions, commercial products, individual packages or a complex software stack, Lyra
can provide expert guidance and enterprise support for your open source ecosystem.
• We extend our deep, functional expertise in FOSS software to enable efficient resolution of critical open source issues
across any scale.
• We are committed to the idea of free software and we are one of the few organizations that focuses exclusively on
services, support and consulting in the Open Source environment.
• We also consult organizations on which OSS packages could be optimized or best-suited for your specific project.
• Lyra helps to reduce your dependency on vendors by providing solutions that improve productivity while simultaneously
shielding against Intellectual Property Rights (IPR) infringements.
• Lyra also provides professional support, consultation, integration services, implementation, upgrades, operations and
support on any free open source software.
7
Open Source Components We provide Support
8
Open Source Components We provide Support
9
Open Source Components We provide Support
10
Open Source Audit Services
11
OSS Audits and Compliance
OSS Audits by Lyra provides you information about
• What open source software (OSS) is present in your code.
• What Licenses that OSS falls under.
• Mitigating legal risks and protect your IP by finding unknown or undeclared open source software (OSS) and third
party code.
• Whether you’re adhering to all of your License requirements.
• Discovering conflicts or obligations in licenses or compliance issues, security vulnerabilities and other high impact
risks that may affect your software.
• Assisting you in creating and setting up a open source policy for your organization.
X i m p l e w a r e V e r s a t a A m e r i p r i s e
A m e r i p r i s e
F r a n c h i s e e /
c o n t r a c t o r s
I n d e p e n d e n t
P a t e n t
I n f r i n g e m e n t
C o p y r i g h t
i n f r i n g e m e n t
$
300M
2014
OSS Non-Compliance can prove to be COSTLY!
Case from 2014
12
What are you concerned about ?
I P
S e c u r i t y
B r a n d
R e p u t a t i o n
13
See the light with Flexera!
L y r a h e l p s
t o S t a y
C L E A N
Select
Secure OSS Components
Man age
OSS Vulnerabilities
Comply
With OSS Licenses
Track
OSS Usage
Stay Alert
To New OSS Vulnerabilities
A single integrated solution for OSS License Compliance and Vulnerability Risk
14
What can you achieve with Flexera
Discover and Track All Open Source
Hardcore Analysis — High Level to Detailed
• Patented scan and analysis flexibility for varying business needs
Set and Enforce Policies
• Automate the Open Source approval process, and set usage & remediation guidance
S O F T W A R E
P A C K A G E S
C O N T A I N E R S
B U I L D
D E P E N D E N C I E S
S O U R C E
C O D E
B I N A R I E S
M U L T I M E D I A
F I L E S
C O P Y +
P A S T E D
S O U R C E
C O D E
C O M M E R C I A L
C O D E
15
It's easy to get started!
Integrate security scanning early in your build/development cycle
16
Security Scans
Get Automated high level analysis of all your Code
17
3 Levels of Depth of Analysis
Low Risk
Package Analysis
Build Dependencies
Medium
Risk
+ Scan Evidence for
Prioritized Analysis
High Risk
+ Source code
fingerprint analysis
18
End-to-End visibility of Open Source Use
Detailed dashboards to identify and track open source assets
Get answers to questions like
where:
• Am I exposed to a specific vulnerability?
• Am I exposed to P1 licenses issues and high
severity vulnerabilities?
• Are my components outdated?
• Should I focus my limited analysis resources?
19
Remaediation Services
• Vulnerability - Fixing
• Porting - Product re-architecting
• Version - Product re-architecting
• Educating - Guide the development team for FOSS usage
• Compliance - Seek exceptional permissions from the Contributors
• Anonymous license negotiations on behalf of clients
20
FOSS Consultation for OSS Compliance
The lack of training, support and consultation by vendors is a major hurdle in the adoption of OSS. At Lyra, we don’t just
extend these services but we also pro-actively keep you abreast of all developments, so you stay ahead of the market.
We provide services/consultation in the following areas,
• Setting up custom open source governance policy
• Harnessing open source best practices
• Setting up initiatives to enhance effectiveness, timeliness and ROI
• Training on FOSS
21
Unlock Great Software with GitLab
One CI/CD product that covers your entire
software development DevOps lifecycle!
22
GitLab is a complete DevOps platform!
Spend less time on your toolchain and more
time on what matters: releasing great
software.
DevOps Consulting and Support
Lyra has helping numerous businesses inculcate a DevOps culture by extending thorough consultation, deployment, engineering
services, integration, implementation, maintenance and end-to-end support services.
From version control to developer collaboration to continuous integration to continuous deployment, Lyra can help you drive
your DevOps initiatives forward by uniting teams in their quest for automation and continuous delivery.
Our partnership with leading DevOps automation providers enables us to extend seamless DevOps adoption across
organizations of varied capacities.
23
DevOps Consulting - Tools Expertise
24
DevOps Consulting - Tools Expertise
25
DevOps Consulting - Tools Expertise
26
DevOps Consulting - Tools Expertise
27
DevOps Consulting - Tools Expertise
28
DevOps Consulting - Tools Expertise
29
DevOps Consulting - Tools Expertise
30
DevOps Consulting - Tools Expertise
31
About BeyondTrust (Bomgar)
The fastest, most secure way for experts to access
and support the systems that need them.
• Trusted by more than 13,000 Companies
• 15 year history of innovation
• 280+ Employees across US, EMEA, & APAC
• Leader in secure remote support and access
management
32
Secure Remote Support with BeyondTrust
The #1 Solution to securely access and support any device or system, anywhere in the world!
With BeyondTrust's Remote Support you can,
• Troubleshoot issues and fix end systems off your network with remote control & screen sharing
• Drive team productivity within your helpdesk with features like Bomgar Chat, skills based routing to help your
technicians work more efficiently
• Automatically record all session activity, monitor activity in real time, and produce a detailed audit log for your next
audit
• Build brand awareness & foster trust with your end users by customizing & branding your support portal
• Sync up with Active Directory, your ITSM tools, third-party authentication solutions, SIEM tools, or password managers
• Inject credentials into end servers and systems with just one click with RS and Vault integration
• Provide support anytime anywhere via the Bomgar thick client, browser based console, or mobile app
• End users can initiate support requests from your support portal, Windows applications, or Bomgar Buttons
33
ON-PREMISES
DMZ
Š2020 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE
34
SECURE CLOUD
Š2020 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE
35
36
BeyondTrust Privileged Access Management Solution
The fastest way to protect your most critical assets from cyber threats!
PRIVILEGED ACCESS
Manage and monitor
privileged access to
critical systems…
without the need of
VPN.
PRIVILEGED IDENTITY
Continuous, automated
account discovery
protects privileged
credentials at scale.
BeyondTrust Privileged Identity
Discover Privileged
Credentials
Continuously identify and
document critical IT assets,
their privileged accounts &
their interdependencies.
Enforce and Automate
Least Privilege
Assign granular access
to privileged accounts
so that only appropriate
personnel can log into
critical systems and
infrastructure.
Remediate
Inconsistencies
Enforce rules for
password complexity,
diversity, and change
frequency, and
synchronize changes
across all
dependencies.
Meet Compliance
Mandates
Automatically log access
activity to satisfy audit
and compliance
requirements, quickly
and effectively.
37
• Super-user login accounts
• Service accounts
• Application-to-application
passwords
• SSH Keys
• Cloud identities
Secure and Manage Passwords for All
Privileged Users
Discover, rotate and manage credentials for
38
BeyondTrust Privileged Access
• Eliminate a cybersecurity threat vector
• Meet privileged access compliance requirements
• Give users a privileged access solution they’ll love
39
• Perpetual
• Per node
ON-PREMISE
• Subscription
• Per node
CLOUD
Virtual appliance
Bomgar Secure Cloud
Hardened Physical appliance
Deploy Privileged Access
On-Site or in the Cloud
40
What can you do with Automated Privileged Identity and Access Management?
• Proactively mitigate cyber threats that bypass traditional enterprise defenses
• Mount an adapative, automated, and rapid cyber defense when under attack
• Manage the life cycle of privileged credentials across the enterprise data center and cloud
• Automates the privileged identity management process at scale
• Protect application logins and record session activity (on-premise, cloud or the web)
• Quickly remediate advanced threats - including pass-the-hash and golden ticket attacks
• Mitigate Auditor Findings and compliance cost and stay compliant within the mandates of PCI DSS, HIPPA, NIST,
FISMA etc
• Improve IT Staff Efficiency
41
Odoo - The #1 Open Source ERP and CRM
• Odoo previously known as OpenERP, is a license free all-in-one ERP software which combines all the features of
traditional ERP as well as providing additional modules for integrating internal business processes of your
organization.
• Odoo suite of open source business apps covers all your company needs : CRM, website/eCommerce, Billing,
Accounting, Inventory, Manufacturing, Warehouse - and project management, inventory management, Point of
sale and many more. It's easy to use, flexible cloud based fully integrated all-in-one management software.
• We specialize in providing Odoo Support ( L1, L2 and L3) and Maintenance, Development, Odoo Business Process
Automation, Consulting (version 6 to version 13),Customization, Modules development, Integrations, Migrations,
Implementation, Installation, Hosting and Training.
42
Easy to use, flexible, cloud based fully integrated all-in-one management software!
Odoo Features
4343
https://www.lyrainfo.com/Services/odoo-services/
69% of workers waste
up to 60 minutes
switching between
usually 4
collaboration tools
Hard to keep everyone
on the same page,
correspondence is slow,
still relying on email
notifications
Only 49% claimed to use
mobile devices
for collaboration 92%
think it is important
Too much
software
Disengaged
workforce
Difficulty working
“on the go”
Worktools challenge!
Source: Report from Harvard business review, Bit.AI
44
By uniting a wide variety of interactive features, Lark creates highly-productive
collaboration experiences for optimal team efficiency.
The Real Aall-in-one collaboration and communication platform
45
Message Thread Emoji’s Chat History Urgent
Messages
Make a Call Quickswitcher Chat Bots
Unified Communication
46
Subscribe to
multiple calendars
Invite Groups
to meetings
Scheduling
a room
Meeting room chat Public Calendar Calendar Assistant
Smart Shared Calendar
47
1TB to unlimited
Docs Sheets
MindNote (coming soon) Cloud Storage
Creation and Space
48
3 Simple StepsCreate approval form
Approval
49
Digitalized all work flows Leave Management
Approval
50
Digitalized all work flows Leave Management
Attendance
Customize Tools
• Set clock-in rules
• Set rules for different teams
• Holiday schedule
• Attendance method (wifi or gps)
• Viewing & exporting data /
reports
• API Integration
• On mobile + desktop
51
Digitalized all work flows Leave Management
Helpdesk
Setup efficient internal Helpdesk Types of Helpdesk
Admin on call
IT on call
HR on call
Payroll on call
Security on call
Travel on call
52
Get in touch with us
Corporate Headquarters
Lyra Infosystems Pvt. Ltd.
Ph: +91 80 4040 8181 | +91 80 4146 8078
Address: #149, 3rd floor, 1st Block
Koramangala, Bangalore - 560034,
Karnataka, India
India West
Lyra Infosystems Pvt. Ltd.
Ph: +91 22 6608 9618 | +91 22 6608 9553
Address: Suite 226, Regus Times Square,
Level 02, Unit 1, B Wing, Andheri-Kurla Road,
Mumbai - 400059, India
India North
Lyra Infosystems Pvt. Ltd.
Ph: +91 63 6654 4722 | 01245025483
Address: WeWork Forum, Suite 05-143, DLF Forum,
DLF Cybercity, Phase III,
Gurugram, HR 122002, India
Singapore
Lyra Infosystems Pte. Ltd.
Ph: +65 9232 7520
Address: 10 Anson Road, #05-17, International Plaza,
Singapore - 079903
Mail us at: sales@lyrainfo.com

Weitere ähnliche Inhalte

Was ist angesagt?

Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterpriseRogue Wave Software
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
4 techprofessionals
4 techprofessionals4 techprofessionals
4 techprofessionalscdcfaccounting
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Synopsys Software Integrity Group
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...Black Duck by Synopsys
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?Black Duck by Synopsys
 
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
The Good, the Bad and the Ugly of the Ultrasonic Communications EcosystemThe Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
The Good, the Bad and the Ugly of the Ultrasonic Communications EcosystemPriyanka Aash
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Black Duck by Synopsys
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 

Was ist angesagt? (20)

Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterprise
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
4 techprofessionals
4 techprofessionals4 techprofessionals
4 techprofessionals
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
The Good, the Bad and the Ugly of the Ultrasonic Communications EcosystemThe Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 

Ähnlich wie Lyra Infosystems IT Consulting & Services

#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...Paris Open Source Summit
 
Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Kunal P
 
DeepSource Modernizing Code Analysis for Software Engineers.4.pptx
DeepSource Modernizing Code Analysis for Software Engineers.4.pptxDeepSource Modernizing Code Analysis for Software Engineers.4.pptx
DeepSource Modernizing Code Analysis for Software Engineers.4.pptxEntrepreneurFirstMed
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policyiasaglobal
 
Open Source BI (OSBI)
Open Source BI (OSBI)Open Source BI (OSBI)
Open Source BI (OSBI)Fru Louis
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullGreat Wide Open
 
Company Overview (condensed version)
Company Overview (condensed version)Company Overview (condensed version)
Company Overview (condensed version)Roxanne Pierrus
 
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...South Tyrol Free Software Conference
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
 
InfoSeption Corporate Presentation
InfoSeption Corporate PresentationInfoSeption Corporate Presentation
InfoSeption Corporate PresentationInfoSeption
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoMark Walker
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Shr solution offshoring services
Shr solution offshoring servicesShr solution offshoring services
Shr solution offshoring servicesEklavya Nagar
 
Web and Mobile Experts - Noto It Solutions
Web and Mobile Experts - Noto It SolutionsWeb and Mobile Experts - Noto It Solutions
Web and Mobile Experts - Noto It SolutionsAshish Sharma
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2DianaGray10
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020FortySeven Software Professionals | IT consulting and Outsourcing Services 2020
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020FortySeven Software Professionals
 
How a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market FasterHow a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market FasterCodeScience
 
About : Radius knowledge Labs
About : Radius knowledge LabsAbout : Radius knowledge Labs
About : Radius knowledge Labslabradius
 

Ähnlich wie Lyra Infosystems IT Consulting & Services (20)

#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Technorishi's Corporate Presentation
Technorishi's Corporate Presentation Technorishi's Corporate Presentation
Technorishi's Corporate Presentation
 
DeepSource Modernizing Code Analysis for Software Engineers.4.pptx
DeepSource Modernizing Code Analysis for Software Engineers.4.pptxDeepSource Modernizing Code Analysis for Software Engineers.4.pptx
DeepSource Modernizing Code Analysis for Software Engineers.4.pptx
 
Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
Open Source BI (OSBI)
Open Source BI (OSBI)Open Source BI (OSBI)
Open Source BI (OSBI)
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Company Overview (condensed version)
Company Overview (condensed version)Company Overview (condensed version)
Company Overview (condensed version)
 
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
InfoSeption Corporate Presentation
InfoSeption Corporate PresentationInfoSeption Corporate Presentation
InfoSeption Corporate Presentation
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software Demo
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Shr solution offshoring services
Shr solution offshoring servicesShr solution offshoring services
Shr solution offshoring services
 
Web and Mobile Experts - Noto It Solutions
Web and Mobile Experts - Noto It SolutionsWeb and Mobile Experts - Noto It Solutions
Web and Mobile Experts - Noto It Solutions
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
software.pptx
software.pptxsoftware.pptx
software.pptx
 
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020FortySeven Software Professionals | IT consulting and Outsourcing Services 2020
FortySeven Software Professionals | IT consulting and Outsourcing Services 2020
 
How a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market FasterHow a PDO Can Help Get You to Market Faster
How a PDO Can Help Get You to Market Faster
 
About : Radius knowledge Labs
About : Radius knowledge LabsAbout : Radius knowledge Labs
About : Radius knowledge Labs
 

Mehr von Lyra Infosystems Pvt. Ltd

Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020Lyra Infosystems Pvt. Ltd
 
Lyra Infosystems - Open Source ERP & CRM Expertise
Lyra Infosystems - Open Source ERP & CRM ExpertiseLyra Infosystems - Open Source ERP & CRM Expertise
Lyra Infosystems - Open Source ERP & CRM ExpertiseLyra Infosystems Pvt. Ltd
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsLyra Infosystems Pvt. Ltd
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems Pvt. Ltd
 
GitLab Capabilities Sheet - Lyra Infosystems
GitLab Capabilities Sheet - Lyra InfosystemsGitLab Capabilities Sheet - Lyra Infosystems
GitLab Capabilities Sheet - Lyra InfosystemsLyra Infosystems Pvt. Ltd
 
GitLab - Concurrent DevOps Datasheet - Lyra Infosystems
GitLab  - Concurrent DevOps Datasheet - Lyra InfosystemsGitLab  - Concurrent DevOps Datasheet - Lyra Infosystems
GitLab - Concurrent DevOps Datasheet - Lyra InfosystemsLyra Infosystems Pvt. Ltd
 

Mehr von Lyra Infosystems Pvt. Ltd (6)

Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020
 
Lyra Infosystems - Open Source ERP & CRM Expertise
Lyra Infosystems - Open Source ERP & CRM ExpertiseLyra Infosystems - Open Source ERP & CRM Expertise
Lyra Infosystems - Open Source ERP & CRM Expertise
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra Infosystems
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
 
GitLab Capabilities Sheet - Lyra Infosystems
GitLab Capabilities Sheet - Lyra InfosystemsGitLab Capabilities Sheet - Lyra Infosystems
GitLab Capabilities Sheet - Lyra Infosystems
 
GitLab - Concurrent DevOps Datasheet - Lyra Infosystems
GitLab  - Concurrent DevOps Datasheet - Lyra InfosystemsGitLab  - Concurrent DevOps Datasheet - Lyra Infosystems
GitLab - Concurrent DevOps Datasheet - Lyra Infosystems
 

KĂźrzlich hochgeladen

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

KĂźrzlich hochgeladen (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Lyra Infosystems IT Consulting & Services

  • 2. About Lyra Infosystems 1 We are a Enterprise Technology Services & IT Consulting Company, headquartered in Bangalore with offices in Delhi, Mumbai and Singapore. With more than 12+ years of practical industry experience, Lyra Infosystems has been mainly focused in helping businesses in technology areas like Software Composition Analysis, Open Source Security, OS Compliance, OS Audits, Opensource Vulnerability Assessment, Open Source Support, Open Source Monitoring, Legal re-mediation, DevOps/DevSecOps, Remote Support, Priviledge Identity & Access Management, Collaboration suite & Cybersecurity. Lyra Infosystems is the first Indian company to achieve Open Chain conformant 1.0 status with extensive experience of helping companies globally to adopt Open Source software. We are also Open Chain 2.0 Conformant.
  • 3. Lyra's Growth Story “Bomgar Certification” for excellent customer service Launched in Bangalore ‘Partner of the Year’ Award – Bomgar 2007 Extended operations to Delhi Inaugurated office in Mumbai 2014 2015 ‘Partner of the Year’ Award – BlackDuck 2013 ‘Partner of the Year’ Award – BlackDuck ‘Partner of the Year’ Award – BlackDuck 2016 First Overseas office in Singapore 2 Gold Partner with Verizon Digital Media Services Partnership with Flexera 2017 20182012 2019 Flexera- SAM & SVM 2010 2019 Partnership with Icinga & Lark
  • 6. Service Offerings Lyra's Capabalities SCA and Audit Services Legal Remediation Open Source CRM & ERP Solutions DevOps/ DevSecOps Consulting Open Source monitoring Services Open Source Support Services Consultin g Services Remote Support Management, PIM and PAM Unified Collaboration and Communication suite
  • 7. Consulting Services We understand your consulting needs from a holistic perspective. Our deep, functional expertise, enables efficient resolution of critical issues across any scale. Manage • Operational risks • Defects, bugs, and vulnerabilities • Process improvement • Product enhancement • Changes and improvement to policies Assess • Open Source security & compliance • DevOps needs of an organization • Ongoing and new RSM, PIM and PAM needs • Open Source software usage and practices • CRM and ERP practices in place Implement • OS Policies and practices • End-to-end DevOps • New RSM solutions or upgrade existing ones • Open Source technologies, manage & maintaining them • Customized services for existing & new ERP and CRM systems Support • Dedicated team for 24/5 premium level support 6
  • 8. Open Source Support Services • Whether you are using community editions, commercial products, individual packages or a complex software stack, Lyra can provide expert guidance and enterprise support for your open source ecosystem. • We extend our deep, functional expertise in FOSS software to enable efficient resolution of critical open source issues across any scale. • We are committed to the idea of free software and we are one of the few organizations that focuses exclusively on services, support and consulting in the Open Source environment. • We also consult organizations on which OSS packages could be optimized or best-suited for your specific project. • Lyra helps to reduce your dependency on vendors by providing solutions that improve productivity while simultaneously shielding against Intellectual Property Rights (IPR) infringements. • Lyra also provides professional support, consultation, integration services, implementation, upgrades, operations and support on any free open source software. 7
  • 9. Open Source Components We provide Support 8
  • 10. Open Source Components We provide Support 9
  • 11. Open Source Components We provide Support 10
  • 12. Open Source Audit Services 11 OSS Audits and Compliance OSS Audits by Lyra provides you information about • What open source software (OSS) is present in your code. • What Licenses that OSS falls under. • Mitigating legal risks and protect your IP by finding unknown or undeclared open source software (OSS) and third party code. • Whether you’re adhering to all of your License requirements. • Discovering conflicts or obligations in licenses or compliance issues, security vulnerabilities and other high impact risks that may affect your software. • Assisting you in creating and setting up a open source policy for your organization.
  • 13. X i m p l e w a r e V e r s a t a A m e r i p r i s e A m e r i p r i s e F r a n c h i s e e / c o n t r a c t o r s I n d e p e n d e n t P a t e n t I n f r i n g e m e n t C o p y r i g h t i n f r i n g e m e n t $ 300M 2014 OSS Non-Compliance can prove to be COSTLY! Case from 2014 12
  • 14. What are you concerned about ? I P S e c u r i t y B r a n d R e p u t a t i o n 13
  • 15. See the light with Flexera! L y r a h e l p s t o S t a y C L E A N Select Secure OSS Components Man age OSS Vulnerabilities Comply With OSS Licenses Track OSS Usage Stay Alert To New OSS Vulnerabilities A single integrated solution for OSS License Compliance and Vulnerability Risk 14
  • 16. What can you achieve with Flexera Discover and Track All Open Source Hardcore Analysis — High Level to Detailed • Patented scan and analysis flexibility for varying business needs Set and Enforce Policies • Automate the Open Source approval process, and set usage & remediation guidance S O F T W A R E P A C K A G E S C O N T A I N E R S B U I L D D E P E N D E N C I E S S O U R C E C O D E B I N A R I E S M U L T I M E D I A F I L E S C O P Y + P A S T E D S O U R C E C O D E C O M M E R C I A L C O D E 15
  • 17. It's easy to get started! Integrate security scanning early in your build/development cycle 16
  • 18. Security Scans Get Automated high level analysis of all your Code 17
  • 19. 3 Levels of Depth of Analysis Low Risk Package Analysis Build Dependencies Medium Risk + Scan Evidence for Prioritized Analysis High Risk + Source code fingerprint analysis 18
  • 20. End-to-End visibility of Open Source Use Detailed dashboards to identify and track open source assets Get answers to questions like where: • Am I exposed to a specific vulnerability? • Am I exposed to P1 licenses issues and high severity vulnerabilities? • Are my components outdated? • Should I focus my limited analysis resources? 19
  • 21. Remaediation Services • Vulnerability - Fixing • Porting - Product re-architecting • Version - Product re-architecting • Educating - Guide the development team for FOSS usage • Compliance - Seek exceptional permissions from the Contributors • Anonymous license negotiations on behalf of clients 20
  • 22. FOSS Consultation for OSS Compliance The lack of training, support and consultation by vendors is a major hurdle in the adoption of OSS. At Lyra, we don’t just extend these services but we also pro-actively keep you abreast of all developments, so you stay ahead of the market. We provide services/consultation in the following areas, • Setting up custom open source governance policy • Harnessing open source best practices • Setting up initiatives to enhance effectiveness, timeliness and ROI • Training on FOSS 21
  • 23. Unlock Great Software with GitLab One CI/CD product that covers your entire software development DevOps lifecycle! 22 GitLab is a complete DevOps platform! Spend less time on your toolchain and more time on what matters: releasing great software.
  • 24. DevOps Consulting and Support Lyra has helping numerous businesses inculcate a DevOps culture by extending thorough consultation, deployment, engineering services, integration, implementation, maintenance and end-to-end support services. From version control to developer collaboration to continuous integration to continuous deployment, Lyra can help you drive your DevOps initiatives forward by uniting teams in their quest for automation and continuous delivery. Our partnership with leading DevOps automation providers enables us to extend seamless DevOps adoption across organizations of varied capacities. 23
  • 25. DevOps Consulting - Tools Expertise 24
  • 26. DevOps Consulting - Tools Expertise 25
  • 27. DevOps Consulting - Tools Expertise 26
  • 28. DevOps Consulting - Tools Expertise 27
  • 29. DevOps Consulting - Tools Expertise 28
  • 30. DevOps Consulting - Tools Expertise 29
  • 31. DevOps Consulting - Tools Expertise 30
  • 32. DevOps Consulting - Tools Expertise 31
  • 33. About BeyondTrust (Bomgar) The fastest, most secure way for experts to access and support the systems that need them. • Trusted by more than 13,000 Companies • 15 year history of innovation • 280+ Employees across US, EMEA, & APAC • Leader in secure remote support and access management 32
  • 34. Secure Remote Support with BeyondTrust The #1 Solution to securely access and support any device or system, anywhere in the world! With BeyondTrust's Remote Support you can, • Troubleshoot issues and fix end systems off your network with remote control & screen sharing • Drive team productivity within your helpdesk with features like Bomgar Chat, skills based routing to help your technicians work more efficiently • Automatically record all session activity, monitor activity in real time, and produce a detailed audit log for your next audit • Build brand awareness & foster trust with your end users by customizing & branding your support portal • Sync up with Active Directory, your ITSM tools, third-party authentication solutions, SIEM tools, or password managers • Inject credentials into end servers and systems with just one click with RS and Vault integration • Provide support anytime anywhere via the Bomgar thick client, browser based console, or mobile app • End users can initiate support requests from your support portal, Windows applications, or Bomgar Buttons 33
  • 35. ON-PREMISES DMZ Š2020 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE 34
  • 36. SECURE CLOUD Š2020 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE 35
  • 37. 36 BeyondTrust Privileged Access Management Solution The fastest way to protect your most critical assets from cyber threats! PRIVILEGED ACCESS Manage and monitor privileged access to critical systems… without the need of VPN. PRIVILEGED IDENTITY Continuous, automated account discovery protects privileged credentials at scale.
  • 38. BeyondTrust Privileged Identity Discover Privileged Credentials Continuously identify and document critical IT assets, their privileged accounts & their interdependencies. Enforce and Automate Least Privilege Assign granular access to privileged accounts so that only appropriate personnel can log into critical systems and infrastructure. Remediate Inconsistencies Enforce rules for password complexity, diversity, and change frequency, and synchronize changes across all dependencies. Meet Compliance Mandates Automatically log access activity to satisfy audit and compliance requirements, quickly and effectively. 37
  • 39. • Super-user login accounts • Service accounts • Application-to-application passwords • SSH Keys • Cloud identities Secure and Manage Passwords for All Privileged Users Discover, rotate and manage credentials for 38
  • 40. BeyondTrust Privileged Access • Eliminate a cybersecurity threat vector • Meet privileged access compliance requirements • Give users a privileged access solution they’ll love 39
  • 41. • Perpetual • Per node ON-PREMISE • Subscription • Per node CLOUD Virtual appliance Bomgar Secure Cloud Hardened Physical appliance Deploy Privileged Access On-Site or in the Cloud 40
  • 42. What can you do with Automated Privileged Identity and Access Management? • Proactively mitigate cyber threats that bypass traditional enterprise defenses • Mount an adapative, automated, and rapid cyber defense when under attack • Manage the life cycle of privileged credentials across the enterprise data center and cloud • Automates the privileged identity management process at scale • Protect application logins and record session activity (on-premise, cloud or the web) • Quickly remediate advanced threats - including pass-the-hash and golden ticket attacks • Mitigate Auditor Findings and compliance cost and stay compliant within the mandates of PCI DSS, HIPPA, NIST, FISMA etc • Improve IT Staff Efficiency 41
  • 43. Odoo - The #1 Open Source ERP and CRM • Odoo previously known as OpenERP, is a license free all-in-one ERP software which combines all the features of traditional ERP as well as providing additional modules for integrating internal business processes of your organization. • Odoo suite of open source business apps covers all your company needs : CRM, website/eCommerce, Billing, Accounting, Inventory, Manufacturing, Warehouse - and project management, inventory management, Point of sale and many more. It's easy to use, flexible cloud based fully integrated all-in-one management software. • We specialize in providing Odoo Support ( L1, L2 and L3) and Maintenance, Development, Odoo Business Process Automation, Consulting (version 6 to version 13),Customization, Modules development, Integrations, Migrations, Implementation, Installation, Hosting and Training. 42 Easy to use, flexible, cloud based fully integrated all-in-one management software!
  • 45. 69% of workers waste up to 60 minutes switching between usually 4 collaboration tools Hard to keep everyone on the same page, correspondence is slow, still relying on email notifications Only 49% claimed to use mobile devices for collaboration 92% think it is important Too much software Disengaged workforce Difficulty working “on the go” Worktools challenge! Source: Report from Harvard business review, Bit.AI 44
  • 46. By uniting a wide variety of interactive features, Lark creates highly-productive collaboration experiences for optimal team efficiency. The Real Aall-in-one collaboration and communication platform 45
  • 47. Message Thread Emoji’s Chat History Urgent Messages Make a Call Quickswitcher Chat Bots Unified Communication 46
  • 48. Subscribe to multiple calendars Invite Groups to meetings Scheduling a room Meeting room chat Public Calendar Calendar Assistant Smart Shared Calendar 47
  • 49. 1TB to unlimited Docs Sheets MindNote (coming soon) Cloud Storage Creation and Space 48
  • 50. 3 Simple StepsCreate approval form Approval 49
  • 51. Digitalized all work flows Leave Management Approval 50
  • 52. Digitalized all work flows Leave Management Attendance Customize Tools • Set clock-in rules • Set rules for different teams • Holiday schedule • Attendance method (wifi or gps) • Viewing & exporting data / reports • API Integration • On mobile + desktop 51
  • 53. Digitalized all work flows Leave Management Helpdesk Setup efficient internal Helpdesk Types of Helpdesk Admin on call IT on call HR on call Payroll on call Security on call Travel on call 52
  • 54. Get in touch with us Corporate Headquarters Lyra Infosystems Pvt. Ltd. Ph: +91 80 4040 8181 | +91 80 4146 8078 Address: #149, 3rd floor, 1st Block Koramangala, Bangalore - 560034, Karnataka, India India West Lyra Infosystems Pvt. Ltd. Ph: +91 22 6608 9618 | +91 22 6608 9553 Address: Suite 226, Regus Times Square, Level 02, Unit 1, B Wing, Andheri-Kurla Road, Mumbai - 400059, India India North Lyra Infosystems Pvt. Ltd. Ph: +91 63 6654 4722 | 01245025483 Address: WeWork Forum, Suite 05-143, DLF Forum, DLF Cybercity, Phase III, Gurugram, HR 122002, India Singapore Lyra Infosystems Pte. Ltd. Ph: +65 9232 7520 Address: 10 Anson Road, #05-17, International Plaza, Singapore - 079903 Mail us at: sales@lyrainfo.com

Hinweis der Redaktion

  1. http://www.ifross.org/en/artikel/versata-saga-settled-prejudice-1
  2. BT Identity Management identifies, safeguards and manages the privileged credentials found throughout the datacenter, including Super-user login accounts utilized by individuals to change config settings, run programs etc Service accounts that require privileged login IDs and passwords to run Application-to-application passwords, the credenials used by web services, custom software etc SSH Keys used to authenticate individuals and applications on Linux, Unix systems Cloud identities on a wide range of platforms including Office 365, Azure, AWS etc