Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Al Shuaiba Consultingwww.alshuaibaconsulting.com
“The strength of the team iseach individual member. The
strength of each member is theteam.”
Phil Jackson
2
Michael Jordan
Talent wins games, butteamwork and intelligence win
championships.
3
4What we do5
Company Overview
6 Management
7 Our Team
8 Procurement
91314
Portfolio - Procurement
International Consulting
Portfolio - InternationalConsulting
19 Marketing Consulting
Content20
Web Developer21
Information Technology
22 Cyber Security
23 Pentesting
24 Social Engineering &Social Media Security
252627
Vulnerability Assessment
Code Review
SAP Security & GRC
28 SAP Security
29Artificial Intelligence30
GRC
31 Predictive Maintenance
32 Computer Vision
33 Intelligent Cyber Security
343537
Users Profiling
Regional Presence
Contacts
38 Conclusion
4Company Overview
The greatest barrier to success is the fearof failure.
Sven Goran Eriksson
Ductile, Versatile, capable to shape to the customer's needs, with a cross-market visionthat binds IT engineering, marketing, procurement and international consulting: this isAl Shuaiba’s DNA, born from the embrace of Middle Eastern culture, acute andpenetrating, with the Western vision, strategic and concrete. In this Melting Pot thewisdom of engineering, marketing and business science merge, creating a servicecompany ranging from International Development, Product's Procurement andPenetration testing.Al Shuaiba consulting, offers to the customer experience, professionalism andpunctuality. The team's heterogeneity allows to analyze the client needs from each andevery sides in order to increase the chances of success and implementation.
5What We Do
01 02 03ProcurementInternationalConsulting &Marketing
IT Consulting
We can source European andChinese products directly from themanufacturers.
We’re specialized in theinternational consulting for foreignpartners requiring to enter smoothlyin the market of Kuwait. as well weprovide the service for Kuwaiticompanies to source internationalpartners for agencies and jvagreement.
We provide consulting in severalareas like: web developing, Cybersecurity, SAP security and machinelearning.
6Management
Eng. Sulaiman Al-AbulSalamManaging Director
Engineer and Mba in internationalmarketing, expert in internationaltransaction for commodities. With hisEuropean vision represents the real jointbetween all the other members of theteam and the local customers.
7
Mr. Faisal MohammedBusiness Development Manager
Our Team
Ms. Cinzia PediconeMarketing Manager & Advisor
Mr. Alfredo GrecoInternational Business Manager
Mr. Vladimir PistacchioSales Expert
Eng. Christian BortoneCyber Security Manager
Mr. Gagan DarjiWeb Developer
Mr. Lucio PuglieseSAP Security Specialist
Mr. Matteo AlbertiArtificial Intelligence Specialist
8Procurement• Furniture for Home and Office
• Guard Rails
• HVAC & Cooling Towers
• Gas Valves
• Batteries
• Hospital equipment
• Interior and Fire doors
• LED Screens
• Lidar Security Technology
9
ELECTRICAL SUPPLIES
Client:ASA International Group
Portfolio - Procurement
10
HOSPITAL
Client:Missaglia S.p.A
Portfolio - Procurement
11
HVAC
Client:CARLIEUKLIMA srl
BATTERIES Army Furniture Supplies
Client:Metalway srl
Portfolio - Procurement
Client:Vipiemme S.p.A
12
ROAD SAFETY
Client:IMEVA
LED SCREENSLIDAR SECRUITY
Client:RPG
Portfolio - Procurement
13International Consulting• Oil&Gas
• Civil & Industrial Construction
• Road Construction
• Interior Design
• HVAC
• Electrical Works
14Portfolio - International Consulting
SH Group is a manufacturer and globalsupplier of tailor made handling systemsand deck equipment for the marine,offshore and wind industry. EpcContractor, Rigs Supply and Operation.
OIL & GAS
Client:SH Group
Short Brief:
15Portfolio - International Consulting
IG Operation and MaintenanceS.p.A. has wide capability gained in fortyyears of activity in the executionsof EPC contracts and O&Mcontracts inthe sectors of Oil & Gas.
OIL & GAS
Client:IG Operation and Maintenance
Short Brief:
16Portfolio - International Consulting
VS-trend is established in 2002 in Bihac,Bosnia and Herzegovina. Since 2002company has acquired an extensiveknowledge and experience in assemblyand production for cruise ship.
HVAC
Client:VS-TREND
Short Brief:
17Portfolio - International Consulting
The company develops its activity mainlyin the Infrastructure sector such asroads, railways, water plants andmethane pipe – lines.
CONSTRUCTION
Client:Favellato Claudio S.p.A
Short Brief:
18Portfolio - International Consulting
Turnkey power solutions, electricalinstallations of housing units, residentialcenters, shopping areas, malls andsupermarkets and industrial parks.
ELECTRICAL
Client:SC EL-MONT SRL
Short Brief:
19Marketing Consulting• Strategic Business Planning
• Strategic Marketing Development
• Research of new Business Partners
• Market Research
• Product Development/Implementation/Management
• Marketing Positioning
• Graphical arts and renderings
• Project Management for new products
• Social Media Marketing
20
Doors
Client:10 Rajeb
Hospital furnitures Kitchens
Client:Delta Cuisine
Portfolio – Marketing Consulting
Client:Mespa
21
IT Department
WEBDEVELOPMENT CYBER SECURITY SAP & GRC ARTIFICIAL
INTELLIGENCE
Information Technology
22
Web Development SEO Digital Marketing
We deal with designing app, websites,mobile sites and company sites, offeringcustomized and functional solutions.
The tasks of the SEO specialistconsultant are to analyze thecompetition and the target audience,determine the most suitable andperforming keywords to be found bypotential customers and act directly inthe code and contents of the website inorder to optimize it and make it valuablefor the positioning on search engines.
Our Digital marketing service allows youto implement a complete DigitalMarketing Strategy, now essential forcreating a successful website.
Web Development
23Cyber Security
Services
Web Application Pentesting
Vulnerability Assessment
Social Engineering Analysis
Code Review
Network Pentesting
Reporting
Social Media Security
Security Tutoring
24Cyber Security
Pentesting
The penetration testing service is intended to be an effectivesolution to respond to the need to protect the company bytesting the level of security of the infrastructure and trying toviolate it, just as a hacker would do. The attacks that will becarried out not only affect the technological aspect, but alsoextent in the branch of hacking that focuses not on technologybut on what is often the real weak link in the system: thehuman factor. This translates into the use of unconventionalattack techniques such as Social Engineering. The outputproduced by the Pen testing service is expressed in a reportthat describes in detail all the vulnerabilities that have beenidentified and how it has been possible to exploit them.
25
Social Engineering &Social Media Security
The simplest method to break into an organization is regularlyto trick the people. This method to gain sensible information iscall social engineering. This technique has been the door forhuge attacks in the last few years. The collapse for someorganization. Social Engineering can be use even on socialmedia like Facebook or Twitter. Social Media is often the faceof your company, if social media accounts are compromisedthis can cause huge damage to your business and reputation.It's very important today test the effectiveness of your staff'ssecurity awareness.
Cyber Secruity
26Cyber Security
Vulnerability Assessment
The Vulnerability assessment service offers an advancedanalysis of the infrastructure, with the aim of providing a clearand detailed view of the vulnerabilities on the systems andservices, calculating the impact level, evaluating the riskrelated to the business and suggesting corrective actions.
27
Code Review
The Code Review process aims to identify vulnerabilitieswithin the source code. It represents one of the mostimportant phases for the development of secure applications,allowing to identify any security issues before the softwaregoes into production significantly reducing costs. The processbasically consists of two phases, in the initial one the wholeapplication is examined by one or more static analysis tools. Inthe next phase, the code is analyzed manually, focusing on themost delicate parts of the application, in order to identify allthe various vulnerabilities that are not immediatelyidentifiable.
Cyber Security
28SAP Security & GRC
Services
SAP SECURITY GRC CONSULTING
29SAP Security & GRC
SAP Security
• Management of SAP security requests (User Management,Roles Management), execution of Preventive SOD analyzes (inorder to limit the introduction of risks during the ordinarymanagement of authorizations).
• Customizing transaction and authority check
• Access control, process control and identity management.
• Maintenance of the SAP GRC system.
30
Governance, RiskManagement andComplianceGRC counseling service helps to create an integrated cycle ofGovernance, Risk and Compliance (GRC) initiatives.
IT Governance – Creating governance frameworks to achievethe ability to monitor and manage your organization.
Risk – Identify, mitigate, and monitor enterprise risk, witch canhave a negative impact on an organization.
IT Compliance – Manual and Automated validation services todetermine policy violation with predefined standards.
SAP Security & GRC
31Artificial Intelligence
Applications
PREDICTIVEMAINTENANCE
COMPUTERVISION
INTELLIGENTCYBER SECURITY USERS PROFILING
32Artificial Intelligence
Predictive Maintenance
Machine Learning can monitorate and predict in real time allIoT devices, predict failures, schedule efficient maintenanceand improve productivity.
• Real-Time monitoring of all your platform without thehuman intervention.
• Predict system failures.
• Schedule efficient maintenance and reduce costs.
• Interactive Dashboard as support of Engineers and Managers.
33
Computer Vision
With advance neural networks is possible to develop solutionsfor:• Security and Face Detection.• Tracking Users and Objects.• Self-Driving Drones for predictive maintenance.
With Deep Learning applications and Computer VisionsAlgorithms is possible to support Security Systems with Real-Time face Detection and People Tracking.
SAP Security & GRC
34Artificial Intelligence
Intelligent Cyber Security
Cyber Security and Deep Learning Solutions for customizedmalware analysis, treat analysis and Real-Time monitoringarchiving the human- level detection.
• Deep speed up real time system monitoring of all devicedevices and take action immediately.
• State of the art solution for hackers attack detection.
35
Users Profiling
Combining Computer vision algorithms and Data Analytics ispossible to extract value from important data maximizing thevalue of IoT solutions and profiling clients.
• Profiling your client, predict new tendencies.
• Optimize your store, magazine and furnitures.
•Offer always best solutions and Product Recommandation.
Artificial Intelligence
36
Kuwait CityHeadquarter
Regional Presence
37
Wien
Messina
MadridBucharestMilan
Per Year
Regional Presence
38
Coming together is a beginning;keeping together is progress;working together is success.
Edward Everett Hale
Conclusion
39
Contacts
ADRESS
3A Abdulaziz Hamad Al Saqer St,Mirqab - Kuwait City - Kuwait
PHONE
Mobile: +965 909 56 330
SOCIAL
www.alshuaibaconsulting.com
Al Shuaiba Consultingwww.alshuaibaconsulting.com
“The strength of the team iseach individual member. The
strength of each member is theteam.”
Phil Jackson