21
ZS Infotech IT SUPPORT SERVICES AND SECURITY SOLUTIONS Copyrights reserved @ ZS Infotech sdn bhd (1055149-A)

ZS Infotech v1.0

Embed Size (px)

Citation preview

Page 1: ZS Infotech v1.0

ZS Infotech

IT SUPPORT SERVICES AND SECURITY SOLUTIONS

Copyrights reserved @ ZS Infotech sdn bhd (1055149-A)

Page 2: ZS Infotech v1.0

About us

ZS Infotech sdn bhd. is an IT support services and Security solution provider located in

Selangor, Malaysia.

The company offers a full range of IT services, customized to any businesses needs at an

affordable rate.

We can be your very own IT department or supplement your already existing IT staff. From

assessment to design, implementation to maintenance, problem resolution to on-going

help desk support, we will meet and exceed the requirements of any businesses IT

infrastructure.

Page 3: ZS Infotech v1.0

Our services

IT Staff augmentation

Endpoint Security

Cyber security

Risk management

Infrastructure Management.

Page 4: ZS Infotech v1.0

IT Staff augmentation

IT staff augmentation allows a company to add staff to

their teams based on the additional skills required to

support their initiatives.

Companies may easily ramp up and down to meet

changing demand without shouldering the cost and

liabilities of additional full time employees.

AN EMERGING BEST PRACTICE

Page 5: ZS Infotech v1.0

Benefit of IT Staff augmentation

Control over staff: When there is a need to closely manage resources, staff augmentation is ideal.

Integration with internal processes: Companies can find it more effective to

integrate staff augmentation resources with existing business processes than to

align those processes with external project teams. After all, an individual can

adapt more quickly to the processes of an organization than two separate

organizations can align with each other.

Leverages existing resources: By adding new skill sets to the team, a company

can take advantage of both external and internal resources for the completion

of their IT projects.

Specialist expertise: When project team gaps mainly consist of specialized skills, staff augmentation can efficiently fill those gaps.

Rapidly changing staffing needs: Companies with staffing needs in constant

flux can meet those needs through staff augmentation. It’s relatively easy to

add or subtract resources to match demand.

Page 6: ZS Infotech v1.0

Benefit of IT Staff augmentation continue…

Reduce cost of acquiring skills: Avoids the cost of investing in internal skill development.

Reduce employer burdens: Avoids costs and liabilities of

direct employees.

Meet aggressive project timelines: When an active project

has a need for more resources in order to be completed on

time, staff augmentation is typically the best option, and

is often the only option.

Internal acceptance: Existing employees often embrace a staff augmentation model more than a project outsourcing model. Existing employees are less likely to feel threatened by augmenting staff with a few

individuals than by outsourcing entire projects.

Ease of adoption: It’s easier to adopt a staff augmentation model than a project outsourcing model.

Companies are already used to hiring employees. Staff augmentation is just a small shift from what

companies already do.

Page 7: ZS Infotech v1.0

Scope of IT Staff augmentation

Resource can be local or foreigner based on company budget and project requirement.

Client can select resource pool from L1 level to L3 level expertise.

Resource availability based on scope of work or time basis.

Client can take interview to meet their expectations.

Hyades provide experts consulting or additional resources whenever required.

Client can select resources from onsite, offsite or hybrid support. In Hybrid support resource can visit client

site on weekly or bi-weekly basis.

Client can select resources for 24*5, 24*7 or 9-6 pm shift.

Client can ask resource to travel other geographical location with prior intimation to Hyades.

Page 8: ZS Infotech v1.0

Endpoint Security

Endpoint systems are nothing but users/employees

desktop, laptops or Mobile phones.

Endpoint systems are always a target of Hackers,

because they have lack of security controls and

awareness.

BREAK THE ATTACK CHAIN

Page 9: ZS Infotech v1.0

Why Endpoint Security needed

Cyber crimes are becoming more sophisticated and they

can easily fool Antivirus application.

Now a days Antivirus in not enough to protect against zero

day attack, data loss and device control etc.

Hence current era of technology demand advance level

of security for workstations (desktops, laptops, mobile

phones) And Endpoint security fulfill this expectations with

various types of benefits.

Endpoint security an essential layer in an organization's

security defense apparatus.

Page 10: ZS Infotech v1.0

Benefit of Endpoint Security

Prevent Breaches & InfectionsProtect company networks with Antivirus, antispyware

and antispam protection that minimizes system slowdowns

and comes with a range of customization options.

Prevent Loss of Confidential Data

Conserve bandwidth by blocking access to websites

with high volume of traffic. Protect company network

against breaches with two-way firewall, and control

unauthorized media and devices in the network.

Minimize Management complexity

Oversee security across the entire network from a single

location. Enlist a range of customization and reporting

features to tweak the system security as you need.

Page 11: ZS Infotech v1.0

Benefit of Endpoint Security continue…

Improve Performance and ProductivityBlock unwanted network traffic at workstation level and utilize

bandwidth effectively.

Reports, Logs & Notifications

Granular report structure for complete control over

workstations. Continuous log monitoring and trigger notification

whenever require.

Employee Effectiveness

Prevent employee access to non-work-related websites. Keep

company computers running smoothly and extend the lifetime

of hardware.

Page 12: ZS Infotech v1.0

Scope of Endpoint Security

ZS Infotech needs to install Endpoint client to each selected workstations manually.

We are responsible to update each client with latest virus definition.

We monitor every client on daily basis.

We can restrict USB access to workstations as per client requirement.

Applications can be restricted based on client requirement.

Any technical issue related of Endpoint will be attended (excluding week-end, public holidays) in 48 hour with NO cost to the client.

Bandwidth management can be perform based on feasibility of client network.

ZS Infotech can provide weekly, monthly, quarterly summary reports to the clients.

ZS Infotech can provide detail logs on daily, weekly, and monthly basis.

Workstation inventory can be manage by us based on requirement.

Page 13: ZS Infotech v1.0

Cyber security

Cyber security – defined as the protection of

systems, networks and data in cyberspace – is a

critical issue for all businesses.

Cyber security will only become more important as

more devices, ‘the internet of things’, become

connected to the internet.

MAINTAIN YOUR BUSINESS DIGNITY

Page 14: ZS Infotech v1.0

Why Cyber security needed

Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming

from both physical and cyber threats and hazards.

Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and

money and are developing capabilities to disrupt, destroy, or threaten the delivery of

essential services.

A range of traditional crimes are now being perpetrated through cyberspace. This includes

banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences.

Cyberspace is particularly difficult to secure due to a number of factors: the ability of

malicious actors to operate from anywhere in the world, the linkages between cyberspace

and physical systems, and the difficulty of reducing vulnerabilities and consequences in

complex cyber networks.

Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject

to sophisticated cyber intrusions that pose new risks.

As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-

consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend.

In light of the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an

important as security mission.

Page 15: ZS Infotech v1.0

Impact of lack of Cyber Security in 2015

Malaysian biggest airline career website hacked in 2015

Company not only faced financial loss but also their reputation for customers and stake holders.

Comcast:

Comcast Corporation, an American multinational mass media company found its users’ login credentials sold on the dark web. The company confirmed that over 200,000 users were affected from the breach. However, the company failed to catch the culprit behind the breach

Ashley Madison

Back in July, hackers breached the security of the online dating portal “Ashley Madison”. The hackers were able to leak data from the site including site’s database, internal emails and source code in relation to some of their internal apps.

VTech

VTech is a Chinese company which builds and develops learning toys faced a data breach that leaked private information of 4.8 million parents and 200,000 children. Those numbers increased later on to 6.7 million.

OPM

OPM (Office of Personnel Management) manages records for all government employees including military personnel in the US.

The data breach of OPM took place in March but came to light in June and investigations showed an increase of 4 million breached records.

T-Mobile via Experian

This was an unusual hack because the company itself (in this case T-mobile) didn’t have a data breach rather Experian (a credit reporting company) had a data breach which leaked T-mobile’s consumers’ data.

Page 16: ZS Infotech v1.0

Scope of Cyber Security

Security posture assessment.

Penetration testing (black box, while box).

3rd party vendor audit.

Datacenter assessment.

System, website or devices vulnerability management.

Cloud security services

Application assessment and baseline security audit.

Policy review

business continuity and disaster recovery plan

Forensic investigation.

Hacking incident analysis.

Fraud detection and analysis.

Road map designing

Page 17: ZS Infotech v1.0

Risk management (RM)

Risk management is the process of identification,

analysis and either acceptance or mitigation of

uncertainty.

RM Systems are designed to do more than just

identify the risk.

RISK IS PART OF ALL OUR LIVES

Page 18: ZS Infotech v1.0

Risk Management…the What, Why, and How

RM involves understanding,

analyzing and addressing risk to

make sure organizations achieve

their objectives.

So it must be proportionate to the

complexity and type of

organization involved.

Enterprise risk management (ERM) is an integrated and joined up

approach to managing risk across

an organization and its extended

networks.

Risk Management is the process of identifying, analyzing and responding to risk factors, it implies control of

possible future events and is proactive rather than reactive.

Proper risk management will

reduce not only the likelihood of

an event occurring, but also the

magnitude of its impact.

RM is a continuous process and

as such must not only be done at

the very beginning of the project,

but continuously throughout the

life of the project.

Page 19: ZS Infotech v1.0

IT Infrastructure management (ITIM)

ITIM help enterprises design, build, run,

and manage their IT infrastructure

services in an agile manner that allows

for better integration with the existing

processes and operations at optimum

costs.

ALWAYS-ON-ALWAYS-AVAILABLE

Page 20: ZS Infotech v1.0

Offerings services of ITIM

Page 21: ZS Infotech v1.0

Web: www.zsinfotech.com.my

Email: [email protected]

Contact:

Muhammad Zubair +60 16 620 1878

Adam Aryan +60 17 273 5302

WE ARE ALWAYS READY TO HELP YOU…!