Upload
muhammad-zubair
View
142
Download
1
Embed Size (px)
Citation preview
ZS Infotech
IT SUPPORT SERVICES AND SECURITY SOLUTIONS
Copyrights reserved @ ZS Infotech sdn bhd (1055149-A)
About us
ZS Infotech sdn bhd. is an IT support services and Security solution provider located in
Selangor, Malaysia.
The company offers a full range of IT services, customized to any businesses needs at an
affordable rate.
We can be your very own IT department or supplement your already existing IT staff. From
assessment to design, implementation to maintenance, problem resolution to on-going
help desk support, we will meet and exceed the requirements of any businesses IT
infrastructure.
Our services
IT Staff augmentation
Endpoint Security
Cyber security
Risk management
Infrastructure Management.
IT Staff augmentation
IT staff augmentation allows a company to add staff to
their teams based on the additional skills required to
support their initiatives.
Companies may easily ramp up and down to meet
changing demand without shouldering the cost and
liabilities of additional full time employees.
AN EMERGING BEST PRACTICE
Benefit of IT Staff augmentation
Control over staff: When there is a need to closely manage resources, staff augmentation is ideal.
Integration with internal processes: Companies can find it more effective to
integrate staff augmentation resources with existing business processes than to
align those processes with external project teams. After all, an individual can
adapt more quickly to the processes of an organization than two separate
organizations can align with each other.
Leverages existing resources: By adding new skill sets to the team, a company
can take advantage of both external and internal resources for the completion
of their IT projects.
Specialist expertise: When project team gaps mainly consist of specialized skills, staff augmentation can efficiently fill those gaps.
Rapidly changing staffing needs: Companies with staffing needs in constant
flux can meet those needs through staff augmentation. It’s relatively easy to
add or subtract resources to match demand.
Benefit of IT Staff augmentation continue…
Reduce cost of acquiring skills: Avoids the cost of investing in internal skill development.
Reduce employer burdens: Avoids costs and liabilities of
direct employees.
Meet aggressive project timelines: When an active project
has a need for more resources in order to be completed on
time, staff augmentation is typically the best option, and
is often the only option.
Internal acceptance: Existing employees often embrace a staff augmentation model more than a project outsourcing model. Existing employees are less likely to feel threatened by augmenting staff with a few
individuals than by outsourcing entire projects.
Ease of adoption: It’s easier to adopt a staff augmentation model than a project outsourcing model.
Companies are already used to hiring employees. Staff augmentation is just a small shift from what
companies already do.
Scope of IT Staff augmentation
Resource can be local or foreigner based on company budget and project requirement.
Client can select resource pool from L1 level to L3 level expertise.
Resource availability based on scope of work or time basis.
Client can take interview to meet their expectations.
Hyades provide experts consulting or additional resources whenever required.
Client can select resources from onsite, offsite or hybrid support. In Hybrid support resource can visit client
site on weekly or bi-weekly basis.
Client can select resources for 24*5, 24*7 or 9-6 pm shift.
Client can ask resource to travel other geographical location with prior intimation to Hyades.
Endpoint Security
Endpoint systems are nothing but users/employees
desktop, laptops or Mobile phones.
Endpoint systems are always a target of Hackers,
because they have lack of security controls and
awareness.
BREAK THE ATTACK CHAIN
Why Endpoint Security needed
Cyber crimes are becoming more sophisticated and they
can easily fool Antivirus application.
Now a days Antivirus in not enough to protect against zero
day attack, data loss and device control etc.
Hence current era of technology demand advance level
of security for workstations (desktops, laptops, mobile
phones) And Endpoint security fulfill this expectations with
various types of benefits.
Endpoint security an essential layer in an organization's
security defense apparatus.
Benefit of Endpoint Security
Prevent Breaches & InfectionsProtect company networks with Antivirus, antispyware
and antispam protection that minimizes system slowdowns
and comes with a range of customization options.
Prevent Loss of Confidential Data
Conserve bandwidth by blocking access to websites
with high volume of traffic. Protect company network
against breaches with two-way firewall, and control
unauthorized media and devices in the network.
Minimize Management complexity
Oversee security across the entire network from a single
location. Enlist a range of customization and reporting
features to tweak the system security as you need.
Benefit of Endpoint Security continue…
Improve Performance and ProductivityBlock unwanted network traffic at workstation level and utilize
bandwidth effectively.
Reports, Logs & Notifications
Granular report structure for complete control over
workstations. Continuous log monitoring and trigger notification
whenever require.
Employee Effectiveness
Prevent employee access to non-work-related websites. Keep
company computers running smoothly and extend the lifetime
of hardware.
Scope of Endpoint Security
ZS Infotech needs to install Endpoint client to each selected workstations manually.
We are responsible to update each client with latest virus definition.
We monitor every client on daily basis.
We can restrict USB access to workstations as per client requirement.
Applications can be restricted based on client requirement.
Any technical issue related of Endpoint will be attended (excluding week-end, public holidays) in 48 hour with NO cost to the client.
Bandwidth management can be perform based on feasibility of client network.
ZS Infotech can provide weekly, monthly, quarterly summary reports to the clients.
ZS Infotech can provide detail logs on daily, weekly, and monthly basis.
Workstation inventory can be manage by us based on requirement.
Cyber security
Cyber security – defined as the protection of
systems, networks and data in cyberspace – is a
critical issue for all businesses.
Cyber security will only become more important as
more devices, ‘the internet of things’, become
connected to the internet.
MAINTAIN YOUR BUSINESS DIGNITY
Why Cyber security needed
Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming
from both physical and cyber threats and hazards.
Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and
money and are developing capabilities to disrupt, destroy, or threaten the delivery of
essential services.
A range of traditional crimes are now being perpetrated through cyberspace. This includes
banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences.
Cyberspace is particularly difficult to secure due to a number of factors: the ability of
malicious actors to operate from anywhere in the world, the linkages between cyberspace
and physical systems, and the difficulty of reducing vulnerabilities and consequences in
complex cyber networks.
Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject
to sophisticated cyber intrusions that pose new risks.
As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-
consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend.
In light of the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an
important as security mission.
Impact of lack of Cyber Security in 2015
Malaysian biggest airline career website hacked in 2015
Company not only faced financial loss but also their reputation for customers and stake holders.
Comcast:
Comcast Corporation, an American multinational mass media company found its users’ login credentials sold on the dark web. The company confirmed that over 200,000 users were affected from the breach. However, the company failed to catch the culprit behind the breach
Ashley Madison
Back in July, hackers breached the security of the online dating portal “Ashley Madison”. The hackers were able to leak data from the site including site’s database, internal emails and source code in relation to some of their internal apps.
VTech
VTech is a Chinese company which builds and develops learning toys faced a data breach that leaked private information of 4.8 million parents and 200,000 children. Those numbers increased later on to 6.7 million.
OPM
OPM (Office of Personnel Management) manages records for all government employees including military personnel in the US.
The data breach of OPM took place in March but came to light in June and investigations showed an increase of 4 million breached records.
T-Mobile via Experian
This was an unusual hack because the company itself (in this case T-mobile) didn’t have a data breach rather Experian (a credit reporting company) had a data breach which leaked T-mobile’s consumers’ data.
Scope of Cyber Security
Security posture assessment.
Penetration testing (black box, while box).
3rd party vendor audit.
Datacenter assessment.
System, website or devices vulnerability management.
Cloud security services
Application assessment and baseline security audit.
Policy review
business continuity and disaster recovery plan
Forensic investigation.
Hacking incident analysis.
Fraud detection and analysis.
Road map designing
Risk management (RM)
Risk management is the process of identification,
analysis and either acceptance or mitigation of
uncertainty.
RM Systems are designed to do more than just
identify the risk.
RISK IS PART OF ALL OUR LIVES
Risk Management…the What, Why, and How
RM involves understanding,
analyzing and addressing risk to
make sure organizations achieve
their objectives.
So it must be proportionate to the
complexity and type of
organization involved.
Enterprise risk management (ERM) is an integrated and joined up
approach to managing risk across
an organization and its extended
networks.
Risk Management is the process of identifying, analyzing and responding to risk factors, it implies control of
possible future events and is proactive rather than reactive.
Proper risk management will
reduce not only the likelihood of
an event occurring, but also the
magnitude of its impact.
RM is a continuous process and
as such must not only be done at
the very beginning of the project,
but continuously throughout the
life of the project.
IT Infrastructure management (ITIM)
ITIM help enterprises design, build, run,
and manage their IT infrastructure
services in an agile manner that allows
for better integration with the existing
processes and operations at optimum
costs.
ALWAYS-ON-ALWAYS-AVAILABLE
Offerings services of ITIM
Web: www.zsinfotech.com.my
Email: [email protected]
Contact:
Muhammad Zubair +60 16 620 1878
Adam Aryan +60 17 273 5302
WE ARE ALWAYS READY TO HELP YOU…!