Upload
others
View
18
Download
0
Embed Size (px)
Citation preview
OUR PROFILE
SADAT ALJAWDAH PROFILE AND ACTIVITIES
SADAT ALJAWDAH EST is name which stands for innovation in Saudi Arabia's trading and supplying the
material and equipment sector.
With a number of highly dedicated and qualified staff, SADAT ALJAWDAH provides services to the customers
throughout the Kingdom of Saudi Arabia and abroad. To cope up with the local requirements, SADATALJAWDAH
located in Dammam, SaudiArabia.
SADAT ALJAWDAH is highly experienced in handling large, medium and small orders with regard to qualified
manpower, infrastructure, facilities, vehicles and equipment's.
SADAT ALJAWDAH is built and maintained to meet the day to day requirements in the field. With the
expertise, know-how and good association with many reputed companies all over the world.
SADAT ALJAWDAH POLICY
The goal of SADAT ALJAWDAH EST is to meet client's
needs accurately, correctly, first time, every time at the right
place, and in the required time, also to carry out work which
consistently satisfies the requirement of our clients.
Our strategy is to focus on our customer satisfaction
(in the field of oil and gas petrochemicals, utilities, and
instrumentation, communication and information
technology) and improvement in business process
including development of Human Resource
SADAT AL-JAWDAH EST.
Availability
Fast Responding
Best Offer
On Time Delivery
Best Brands
Best Products
=>
=>
=>
=>
=>
=>
OUR VALUES
MISSION
SADAT Al-JAWDAH’S MISSION IS TO
1. Provide best quality, reliable and safe crane and equipment services.
Consistently satisfy the expectations of customers.
Position "AHEL" in the most attractive market segments with sustainable market share.
Continuously improve organizational capabilities.
Empower, motivate, develop and foster an inclusive workforce to be the most preferred employer of theKingdom Satisfy Stakeholders expectations.
2.
3.
4.
5.
Man Power SupplySadat Al-Jawdah Est is providing a full service of man power supply for industrial services and other specialist andtechnically qualified to various clients in Saudi Arabia. We are a company serving the environmental engineering, andconstruction communities throughout the Kingdom of Saudi Arabia, years of leadership in supplying qualified manpower in various field such as, technical, engineering, document controlling, office administration, combined withskilled equipment operators which makes SadatAl-Jawdah Est the reliable choice for all your projects.
Our experience and unique supply of manpower team and equipment capabilities provide solutions to your projectsunique challenges in a timely and cost effective manner. We provides skilled personnel to ensure that your relatedsupport services exceed your expectations.
Our skilled Man Power approach every customer , project, and job site with respect, positive attitude, careful attentionto detail and sense of pride in our work.
Our Products
OIL & GAS
ITAG
Valves & Oilfield Products GmbH
With over 500 employees, the ITAG Group is an internationally well-known service company and provides a widerange of services for the oil and gas industry and geothermal energy providers. Founded in 1912 by the German oilpioneer Hermann von Rautenkranz, ITAG is one of the most experienced drilling contractors in Europe.Also, ITAG is aglobal oilfield equipment manufacturer with a large state-of-the-art product range. In 2001 the prominent Qatarbusinessman Dr. Jaber A. Al-Marri - under AIPC holding - purchased the company. With his leadership and vision theITAG Group has developed new markets in the MENA region. One example is the new multi-use facility in Doha Qatarwhere ITAG now can offer a range of services to complement the ITAG Celle operations.
Arjay Engineering has been designing and manufacturing process and environmental controls for over 30 years.
Our main facility is located in Toronto. Support facilities are located in Vancouver and Beijing.Arjay is also supported bya network of product representatives throughout NorthAmerica and in various regions of the world.
In addition to our manufactured products, Arjay is able to provide custom design and engineering services and controlpanel assembly.
ARJAY Engineering Ltd.
ClampOnClampOn is the leading worldwide supplier of topside and subsea non-invasive ultrasonic intelligent sensorsfor particle, PIG, leak, vibration and corrosion-erosion monitoring and spectrum analysis.
"Uncomplicated technology, modular design, easy installation and little or no calibration are keywordsdescribing our range of instruments. This range includes sand monitors, PIG detectors, vibration monitors,leak monitors, condition monitors and corrosion-erosion monitors – all reasonably priced.
The ClampOn Approach
GovanGovan Industries Pty Ltd. is a privately owned Electrical Engineering Company based in Melbourne,Australia. For over40 years, Govan Industries have used most advanced technology to manufacture explosion protection electricalequipment for installation in hazardous areas.
Taper-Lok CorporationZero Fugitive Emissions
Taper-Lok® pressure-energized connectors are engineered to provide the safest, most reliable seal of any boltedflange connection and offer unequaled design flexibility and engineering advantages.
Taper-Lok® is a connection specialist, providing a small, lighter weight, high integrity sealing technology. The Taper-Lok® technology excels in extreme conditions, such as: high pressure and temperature, cryogenics, and all hard tohold volatiles and low molecular.
IT & COMMUNICATION
Security Solutions:
BIT9:- At the core of the Bit9
solution is a policy-driven trust
engine in which you specify the
software that you trust to run in
your enterprise; everything else
by default is suspect or denied.
You define the software you trust
using a policy-based approach
that includes trusted publishers,
software distribution systems,
users, updaters, and more. You
also can use the file trust ratings
in the Bit9 Software Reputation
Service to set thresholds if you
allow users to download and
install their own software. These
trust policies drive the
application control and
whitelisting engine in Bit9 that
detects any untrusted software
that enters your environment
and protects you by stopping its
execution.
Istorage : Military Grade 256 AES
Encrypted PIN Operated Flash
drives and Hard disks with Anti
Hacking. Useful for individuals
and corporates who want they
data secured Visit www.istorage-
uk.com
NetSweeper: Net sweeper
solutions are well-suited to
the needs of today's
enterprises. The fastest web
content filtering and access
management solution in the
market that operates 'in-the-
core' of your network
without resulting in latency
and lagging performance
issues. Centralized web-
based administration tools
empower IT Managers to
control Internet access and
activity on a global, group or
per user level while also
delegating access controls to
other named staff. Detailed
reporting on Internet use
and activity to ensure usage
is in line with corporate
acceptable use
policies.Scalable, flexible and
reliable solution that will
integrate with your existing
infrastructure and will
support your business now
and in the future, without
the need for extensive
investment in hardware.
Provide zero-hour network
protection against web-
borne viruses, malware and
phishing threats to ensure
network reliability to
students and teachers.
Advanced web-based
IT SOLUTIONS & DISTRIBUTION
Summary
Our objective is to attain high
level of satisfaction for all the
stake holders namely
- CUSTOMER
- CHANNEL PARTNER &
- VENDOR
Partners deal with a dedicated
point of contact - their ‘Account
Manager’ who is well supported
by teams from different
departments and assists the
customer in every step of the
process.
Why us ?
- Focus on Network Security,
Enterprise Monitoring and
BuRRA technologies
- Knowledge of upcoming and
next generation technologies
- Strong partnerships with
leading product manufacturers
- Unique Value Added
Programs for customer/partner
engagement
On-going Relationships: We @
administration console,
enabling IT management
complete operational control
over application, including:
policy management,
reporting, administration
access, etc. Ability to better
manage network bandwidth
by controlling access to high
bandwidth resources. For
more info
visit www.netsweeper.com
Monitoring
Solutions:
Plixer International: NetFlow
monitoring solutions for IT
professionals Scrutinizer NetFlow
& sFlow traffic analysis and IPFIX
reporting solution for all types
and versions of flow analysis
including but not limited to:
Cisco Routers and Switches, Cisco
ASA NetFlow Juniper Jflow and
Juniper IPFIX SonicWALL Net
Flow and SonicWALL IPFIX
Checkpoint NetFlow Vyatta
NetFlow Riverbed NetFlow
nBox NetFlow and nBox IPFIX
Adtran NetFlow Enterasys
Netflow Citrix AppFlow
vSphere NetFlow Softflowd
NetFlow Palo Alto Net Flow .
Visit www.plixer.com
NETFORT-Know your network:
LANGuardian captures and
analyzes the traffic flowing
through your network switch,
stores it in a database, and
displays the details in a web
browser. Offering a depth of
insight into network activity that
is unmatched by products costing
ten times as much, LANGuardian
helps network administrators
troubleshoot bandwidth issues
right across the network,
perform network forensics on
past events, investigate activity
on Windows file shares, and keep
track of user activity on the
Internet .Visit www.netfort.com
ZYRION: Zyrion Traverse is a
breakthrough Cloud Monitoring,
Network Performance
Monitoring, Server Monitoring
and Systems Monitoring software
solution, with integrated
Business Service Management
(BSM) functionality. Traverse
provides real-time visibility into
the performance of IT
infrastructure and services, and is
an integrated platform with a
wide range of core, advanced
and innovative features.
Traverse’s innovative Business
Container technology and pre-
integrated IT monitoring
software capabilities enable
organizations to create flexible
and logical service-oriented
monitoring views, and makes the
alignment of infrastructure
technology with business
outcomes a reality. Traverse
facilitates decentralized network
monitoring, server monitoring
and cloud monitoring that is pro-
active and preventive rather than
reactive, giving all employee-
levels the control and
information they require based
on their specific responsibilities
and permissions. Traverse
network performance monitoring
software provides an intuitive
web-based user interface and is a
distributed, scalable, real-time,
and easy-to-manage platform.
www.zyrion.com
SANSENTINEL: Sentinel Navigator
is an agentless and non intrusive
reporting solution based on
native manufacturer API. This
mean that no third-party
software is needed to gather
array configuration information.
Data are correlated into a
relational database (Sentinel
Repository) and pushed to « pre-
defined » Dashboards and
Reports. Client/Server model :
Sentinel Navigator offer an
universal access to storage
information. Centralized
repository : All configuration
information are stored/updated
into a single point. Webstart
client : Any client on the network
can access Repository without
software installation.
www.sansentinel.com
Back Up,Restore,Recovery And
Archival Solutions:
Cryoserver :Email Archiving
Software Cryoserver a
permanent, email archiving
solution,Cryoserver allows your
organization to collect, secure
and catalog every e-mail and
instant message. The archive can
be searched rapidly and easily;
emails and attachments can be
retrieved in the same way they
were sent. Securely stored and
never removed, the Cryoserver
data permits forensic discovery
of a business’s whole email
history. The records are available
for any need in any legal
procedure – dispute resolutions,
HR investigations, subject access
requests, regulatory compliance,
or data protection. A sealed
email archiving appliance or
software package, Cryoserver
provides a thorough, audited,
tamper-evident repository of
emails sent to, from and within a
company. Cryoserver combines a
search-engine like investigatory
capacity with the ability to
preserve electronic
communications in a way similar
to a "black box" flight
recorder. Visit
www.cryoserver.com
Unitrends :Unitrends, the #1 all-
in-one backup appliance for
virtual, physical and cloud, is a
leader in enterpriselevel data
protection. Building on over 20
years of industry firsts, Unitrends
continues to lead the market.
Unitrends is used by IT
professionals for backup of their
virtual and physical servers and
for performing disaster recovery
to remote locations or to private
or public cloud. Unitrends not
only continues to set the
standard in virtual and physical
server data protection, but its
US-based support team boasts a
99% customer satisfaction rate,
further reinforcing its reputation
for quality Appliance Family
Finally: everything you need for
backup and disaster recovery, in
one appliance. No need to stitch
together hardware and software
solutions. No need for specific
products to protect your
applications or your virtual
infrastructure. Unitrends
Recovery Series provide one
solution, with one easy-to-use
interface. .10 sizes available: Use
our Appliance Selector to choose
the appliance or set of appliances
that fit your environment.
Appliances start at 1TB capacity
and go up to 31TB
capacity .Complete Unitrends
feature set: Every Recovery
appliance is equipped with our
entire set of features, from
Incremental Forever to No-Limits
Licensing .Fit your network:
Optional LVD/SAS SCI, 10GB
Ethernet, or 8GB Fibre
Channel Visit www.unitrends.com
SecureUSB 3.0
Portable Drive
“With real-time AES hardware encryption, software free design and a super speed
USB 3.0 connection, you can secure your data faster than ever
before.”
iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438
®
Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to 5Gbps.
Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1 ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics.
Drive Reset Feature: The diskAshur also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.
Auto-lock Feature: The unattended diskAshur can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when you’re away from your desk.
Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest.
Compact, Rugged Design: Perfect for taking your data on the road, the diskAshur‘s low powered design is perfect for using with notebooks and taking
your data on the road. Perfectly pocketable, the diskAshur’s compact, robust design features a 16-point omni-directional shock mounting system and rubberised paint, protecting the drive from drops and knocks. The convenient integrated USB 3.0 cable eliminates the need to carry around cords with you and allows you to be connected at the flick of a fingertip.
Why choose diskAshur?
Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it.
The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB hard drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this.
All trademarks and brand names are the property of their respective owners
RoHS
Works with
Technical Specifications Capacity 250GB, 320GB, 500GB, 640GB, 750GB,1TB Interface USB 3.0 - Up to 5Gbps Dimensions 19 mm x 84.5 mm x 120 mm Buffer size 8MB Approvals FCC CE, RoHS RPM 5400 Hardware
USB 3.0 super speed - compatibleAlso compatible with USB 2.0 and 1.1
Operating System compatibility Windows, MAC OS, LinuxHardware Data Encryption AES XTS Encryption Keys 128-bit or 256-bit AES iStorage Part Numbers IS-DG3-256-XXXX | IS-DG3-128-XXXX
iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438 – Email: [email protected] – web: www.istorage-uk.com
Features at a glance:
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing
• Super Speed USB 3.0 Connection
• Administrator Password Feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s)
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Drive Reset Feature
• Variable Time Circuit Technology
• OS and Platform Independent – Compatible with Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – Contact iStorage for further information
• 1-Year warranty
Power Supply Bus Powered
®
(X = Capacity)
Looking for a fast and effortless way to secure your data? The iStorage diskAshur DT is the ultimate desktop hard drive and secure storage system. Sporting a super fast USB 3.0 interface, you can access your data faster than ever before. With an easy-to-use keypad design and software free setup, the iStorage diskAshur DT enables you to access the drive with your own unique pin.
Military Grade FIPS PUB 197 Validated Encryption: Using AES-256-bit hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur DT provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The iStorage diskAshur DT is also backwards compatible with USB 2.0 and 1.1 ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics.
Sealed from Physical Attacks by Tough Epoxy Coating: In addition to
encrypting all of the PINs, data and the encryption key itself, the iStorage diskAshur DT adds another barrier between a between your data and a hacker. The encryption chip and circuitry of the iStorage diskAshur DT
are completely protected by a super tough epoxy compound, which is virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks.
Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest.
Auto Lock feature: Set the unattended drive to lock after a
pre-determined amount of time.
High quality aluminum, heat dissipating enclosure
iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438
SecureUSB 3.0
Desktop Drive
“The world’s first PIN operated portable
hard drive with built-in hardware encryption and
capacities of up to 3TB”
Why choose diskAshur?
Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it.
The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB hard drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this.
All trademarks and brand names are the property of their respective owners
RoHS
Works with
Technical Specifications Capacity 1TB, 2TB and 3TB Interface USB 3.0 - Up to 5Gbps Dimensions 114.3 mm x 182.88 mm x 38.1 mm Buffer size 8MB Approvals FC CE, RoHS RPM 7200 Hardware
USB 3.0 super speed - compatibleAlso compatible with USB 2.0 and 1.1
Operating System compatibility Windows, MAC OS, LinuxHardware Data Encryption AES XTS Encryption Keys 256-bit Hardware iStorage Part Numbers ISA-DA-256-XXXX (X = Capacity)
PRELIMINARY SPECIFICATION SHEETiStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438 – Email: [email protected] – web: www.istorage-uk.com
Features at a glance:
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing
• Super Speed USB 3.0 Connection
• Administrator Password feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s)
• Sealed from Physical Attacks by Tough Epoxy Coating
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Variable Time Circuit Technology
• OS and platform independent – compatible with Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – contact iStorage for further information
• 3-Year warranty
Power Supply 12V AC Adapter
SADAT AL-JAWDAH EST.
Always at your service