6
v it o Innovating Security

Ovit Brochure Web

Embed Size (px)

DESCRIPTION

Our Set of Services

Citation preview

  • v ito Innovating Security

    210 983 5124 211 800 8299 75 Ilia Iliou Av. [email protected] Neos Kosmos, 117 44

    www.ovitsec.com Athens, Greece

  • Ovit is strictly a security oriented company. Our mandate is to protect customers by oering a holistic security view. Ovit is unique in that it operates both in the physical and cyber security domain.

    By unifying those seemingly dierent worlds, we oer a completely new product in terms of perspective. Furthermore we expand the existing know how by oering more sophisticated services, knowledge and expertise.

    Our mandate can provide signicant value to this unique Industry that nowadays is segmented and often operates under low standards.

    Once a company decides to cooperate with Ovit, a series of procedures will be implemented to its facilities and infastractures, with scope to minimize the risk exposure and enhance the quality of life, with minimum business disruption. Ovits accredited sta, will examine what would constitute a model secure facility or IT infastructure for you and apply the appropriate measures and tactics in order to realize it. The model will identify your core functions, your critical assets, the threats and vulnerabilities that may be exploited, and it will state the appropriate measures to mitigate them.

    We follow specic and ISO 27001 certied, risk assessment guidelines & management methodologies for protecting buildings and infrastructures. The responsible personnel who will execute these procedures consists of experienced, former military ocers that have executed similar projects for numerous military and commercial facilities; the Hellenic National Defense General Stu and the European Space Agency, being among them.

    Information Security Management Systems (ISO 27001,Common Criteria)

    physical Security Services cyber Security Services

    Guarding Services

    Physical Security Risk Assessment

    Intrusion Scenarios & Security Evaluation

    0604Physical SecurityTechnologies Implementation

    Risk Assessments

    Security Awareness Training

    Cyber Security Technology Solutions

    Threat and vulnerability Management

    Continuity and Resilience

    Managed Security Services

    Ethical Hacking

    Security Consulting

    Close Protection Services

    Corporate Security Training

  • At MilShield, we prove our expertise. Before undertaking any project, we execute procedures such as:

    Vulnerability Assessment Threat Analysis Facility Characterization Threat Impact & Consequence Analysis Security System Eectiveness Assessments Risk Estimations & Risk Reduction Strategies

    threat analysis - risk assessment

    security policy enforcement / implementation - evaluation

    After we shall draft and provide a series of plans & procedures, tailored to facilitys risk exposure & clients specic needs,according to risk assessments & threat analysis ndings. Security Master Plan Drafting Job Descriptions Emergency Responce Plans-Procedures

    security planning - security policy creation

    With the completion of planning the stage of implementation starts. Our core procedures, in order to improve security personnel competitiveness and wellbeing include:

    OPQ tests from licensed SHL assessors Background personnel checks Rotational assignments Performance Appraisals Perks Teambuilding activities Job Description & Continuous training Physical condition tests

    monitor & security management - intrusion & detection

    After planning and implementation a series of technologies are implemented in order to monitor and improve the level of security with Next Gen Patrol Management & Live Reporting System, ISO 9001 & ISO 27001 certied. We implement cutting edge technology in order to monitor, control and, if necessary, remediate security on-the-job. Our solutions provide the ability to interact with the security personnel even from a smartphone, through a 24/7 web based, interactive channel. They include:

    Live-time, Video & Audio le transferring Patrol, timetable and route, conguration via checkpoints mounting on designated spots, or geolocation. Alerts, if a patrol checkpoint is checked out of the designated timetable, or if the checkpoint is missed. GPS triangulation and patrol route mapping, displayed live on Google Maps. Signal accuracy can bereduced to less than 7-9 meters, if WiFi connection exists. Panic Button. Live Reporting, instantly available for viewing, upon completion & uploading. Easy access to reports history, even for a year back. Live employee shift monitoring, for current and upcoming shifts.

    OVIT

    2

    PHYSICAL Security Servicesvito We oer a broad range of services that enable organizations in reaching their business objectives, throught a unique security approach.

    With the mandate that protecting assets is not not only another human resource management service but the cornerstone for the proper functioning of any organization, OVIT species security through a set of procedures & functions

    that corresponds to the basic need for security.

    Cert No 11433

  • Security Risk Assessments

    OVIT Security Risk assessment services focus on assessing and quantifying the exposure to events that compromise the assets, operations and objectives of your company. Security Risk Assessment is a process for dening and analyzing the dangers posed by potential natural and human-caused

    adverse events. A successful Security Risk Assessment approach can prevent breaches, reduce the impact of realized breaches and eectively gauge and

    communicate monetary impact to related risks. OVIT consultants can help your organization identify risks maximizing support of business functions, minimiz-

    ing operational disruptions in the most cost-eective manner.

    OVIT technology solutions portfolio oers a holistic approach on cyber security:

    Endpoint Protection Compliance Enforcement and Monitoring Network Security Network Compliance and Risk Control Mobile Security and Management Data Classication Security Information and Event Management

    Our solutions include:

    Cyber security technology solutions

    ethical hacking The primary objective of the oered services is to identify the risk level of your organization so that an appropriate set of responses to those threats can be developed. OVIT approach provides the following advantages:

    OVIT approach provides the following advantages:

    Information Security Management Systems (ISO 27001, Common Criteria)

    Gain a better understanding of potential security vulnerabilities that may be visible from the Internet and other Extranets. Evaluate existing security controls. Detect potential threats and exploitable vulnerabilities. Evaluate the security associated with web applications and/or Infrastructure Systems. Prevent nancial loss through fraud (hackers, extortionists and disgruntled employees). Protecting the corporate image by avoiding loss of consumer condence and business reputation.

    An Information Security Management System is both a comprehensive plan and operational services, based on a risk management

    process, to protect critical applications and IT Infrastructure, ensure systems availability and data integrity, comply with external

    regulations and protect individual privacy. A successful information security management system supports business and aligns with the agencys mission, goals and

    objectives. OVIT consultants can help your organization create, establish and maintain a solid ISMS maximizing support of business

    functions, minimizing operational disruptions and implementing corporate strategy in the most cost-eective manner.

    ovit approach :

    2

    Cyber Security Servicesv ito

  • 2Security Awareness Training

    Threat and vulnerability Management

    Managed Security Services

    Continuity and Resilience

    OVIT approach to Security Awareness Training includes the following processes :

    Security Awareness Training Services are designed to educate employees on the security policy of your organization and help foster

    an understanding of how the policy protects the business, the employee and the customers. OVIT consultants can help your organization

    design, create and implement a security training program tied to existing security directives and policies.

    Plan, assess and design. Awareness programmes must be designed with the organization mission in mind. It is important that

    they support the business needs of the organization and be relevant to the organizations culture and IT architecture. Execute and manage. This process includes any activity necessary to implement an information security awareness programme. Evaluate and adjust. Formal evaluation and feedback mechanisms are critical components of the security awareness programme.

    Once the baseline requirements have been solidied, a feedback strategy will be designed and implemented.

    Keeping the infrastructure security posture up-to-date, scanning the infrastructure for identication of new issues or vulnerabilities

    that could potentially lead to a security compromise, taking corrective measures in case of a likely compromise, eectively managing

    infrastructure that inherently is risk prone and delivering a fast response in case of compromise are essential characteristics of the

    Threat & Vulnerability function. OVIT Best Practices represent contemporary understanding in this eld that includes evolving practices around Threat &

    Vulnerability management, emerging technical solutions and layered approaches towardsThreat & Vulnerability managementthat

    entails strategic, tactical and operational perspective.

    OVIT M.S.Services puts select resource-intensive security operations under management of experienced OVIT specialists,

    enhancing their existing security program, infrastructure and personnel while relieving the information security and compliance burden

    Services oerings include:

    Security Monitoring Servicesreal-time security monitoring and network analysis Security Device Managementchanges to security device congurations, recommended by remote professionals, as new threats

    emerge OVIT Vulnerability Assessment Servicesremote vulnerability management and scanning to identify network vulnerabilities,

    prioritize remediation eorts and maintain worldwide regulatory compliance

    OVIT Managed Security Services oers a higher level of protection for mission critical information assets. Your organization improves

    continuity, scalability and eciency of its security operations by leveraging world-class analytics and expertise.

    OVIT Continuity and Resilience services focus on ensuring that critical business functions will remain operational after a security

    incident through a robust Business Continuity Management System. A successful Business Continuity approach includes three key

    elements :

    Resilience: critical business functions and the supporting infrastructure are designed and engineered in such a way that they

    are materially unaected by most disruptions. Recovery: arrangements are made to recover or restore critical and less critical business functions. Contingency: the organization establishes a generalized capability and readiness to cope eectively with whatever major incidents

    and disasters occur, including those that were not, and perhaps could not, have been foreseen.

    OVIT consultants can help your organization build an eective Business Continuity Management System aiming at maximum support

    of business functions and minimizing operational disruptions in the most cost-eective manner.

    Cyber Security Servicesv ito

    Cert No 11433

  • o 210 983 5124 211 800 8299 75 Ilia Iliou Av. [email protected] Neos Kosmos, 117 44 www.ovitsec.com Athens, Greece

    v i tInnovating Security

    Cert No 11433