NSS Corporate Presentation
Total Page:16
File Type:pdf, Size:1020Kb
TM Corporate Presentation Our Concept www.nss.gr 2 01 Founded by Engineers 01 02 02 Values (Flexibility, Trust, Effectiveness) 03 Solutions Oriented 06 03 04 Value Added Distributor 05 Method (Specialization, Improvement, Innovation) 05 04 06 Motto (Affordable Cutting Edge) It’s Been a Long Journey for us JUNE 2005 Serve with heart, no matter what We started in a basement, NSS has been created by a group of with only 3 persons enthusiasts in IT innovation with a primary focus in IT Integrated Solutions and Services. DEC We became 5 people in 2005 December DEC Have moved to NEW 2007 OFFICES being 8 people JAN MAR 2008 2008 Becomes a TRUE 100% Have started our first Value Added Distributor EXPORTS in Cyprus Selling ONLY Indirectly NOV Becomes SOPHOS Distributor 2011 focused in the area of SE Europe NOV Decided to include Strategic 2012 Focus to Enterprise Market MAR Created Mobile Office Unified TM 2014 Communications Cloud Service NOV Becomes GLOBALSIGN Distributor 2015 and Territory Preferred Partner OCT Becomes CYBERARK Distributor 2016 MAY Becomes TRUSTWAVE Distributor 2017 We Love to Work We Know Our Job Serve with heart, no matter what NSS is a true Value Added Distributor investing in KNOWLEDGE whereas stocking distributors invest in Inventory. We are an active TRAINING & SUPPORT Center officially for all of our Vendors NSS is a neutral & knowledgeable VAD in the area of Southeast Europe, working with all the important System Integrator Partners in 13 Different Countries Our Added Value www.nss.gr 7 Design Educate Plan & Architect Train the Reseller Turnkey Solutions Workforce and create Field Engineers Strategize Implement Support Provide Strategic Integrated Technologies Maintain & Support Guidance & Advice according to Customer Ongoing Operations Preferences Quality Management www.nss.gr 8 NSS Data Assurance Policy NSS places a high level of importance in protecting the data of the company and its customers as well as ensuring the quality of service it provides, according to the standards of ISO 27001:2013 and ISO 9001:2008 respectively. NSS Quality Objectives ★ Absolute specialization in the fields of its business activity. ★ Continuous qualitative and quantitative improvement of the quality of products and services. ★ Modern and responsible treatment of all customers needs. Countries of Engagement www.nss.gr 9 3500 13 CUSTOMERS COUNTRIES SLOVENIA ROMANIA BOSNIA & SERBIA HERZEGOVINA CROATIA KOSOVO BULGARIA MONTENEGRO FYROM ALBANIA 200 62m RESELLERS PEOPLE MALTA GREECE CYPRUS Service Delivery Process www.nss.gr 10 MAINTAIN STATUS QUALITY ASSURANCE NSS Relation with the We are continuously assuring that the projects are delivered Customer is NON EXISTENT according to the best practices BEST STATUS SERVICE DELIVERY Partners are Trained Properly NSS Relation with the to deliver Services following the Customer is UNNECESSARY best implementation alternatives BETTER STATUS ON-JOB TRAINING NSS Relation with the Partner is delivering Services with the Help of NSS learning Customer is USEFUL actively the solution GOOD STATUS QUICKSTART NSS Relation with the NSS is delivering the Services to the Customer on behalf of Customer is NECESSARY the Partner for a quickstart “We believe that Professional Services Quality is one of the most important aspects in successful business activities. We continuously try to leverage our partners’ skills by continuous training, so that they can deliver excellent field services and ensuring successful implementations at the same time” Product Portfolio www.nss.gr 11 NSS products are always following the Affordable Cutting Edge principle @ www.nss.gr 12 Synchronized Security Sophos Security Products are working Simple and can be .exe Malware Malicious integrated, working together and URLs being Synchronized working Sophos Central Mgmt. Non-.exe together as One Malware Exploits ⦿ Unified Security concept for all solutions Root Cause Analysis ⦿ Endpoint Security for Workstations & Servers Synchronized Security Script-based Malware Removable ⦿ Data Encryption for Media, Net Shares, Cloud Media ⦿ Nextgen Web Security & Application Control Phishing ⦿ Email Security & Data Leakage Protection Attacks Unauthorized Apps ⦿ Mobile Security for Phones & Tablets ⦿ Support for all Operating Systems ⦿ Synchronized Security and Analytics www.nss.gr 13 Privileged Account Security CyberArk provides a critical new layer in the overall security strategy, controlling the path of Privileged Account Security, the origin & target of every attack ⦿ Discover, protect and manage all the privileged account credentials in Organizations ⦿ Control, isolate and monitor privileged access and activity on servers and databases ⦿ Use real-time privileged account analytics to detect and respond to in-progress attacks www.nss.gr 14 Smart Security on Demand Trustwave helps businesses fight cybercrime, protect data and reduce security risk, using many integrated technologies and SpiderLabs research team ⦿ Trustwave WAF delivers advanced, continuous protection for all Web applications. ⦿ Trustwave Database Security solutions enable companies to secure their relational databases and big data stores with sensitive data. ⦿ Trustwave NAC is a scalable solution designed to protect any network infrastructure, offering full protection for all endpoints. www.nss.gr 15 Security Analytics & Response Orchestration Enorasys is a Security platform enabling continuous Situational Awareness and Targeted Response to threats to advanced cyber threat attacks ⦿ Enorasys SOCStreams is streamlining all core Security Operations Center (SOC) and Cyber Incident Response Center (CIRT) processes ⦿ Enorasys Security Analytics delivers early compromise detection by analyzing the logic and exploitation paths of an attack ⦿ Enorasys SIEM is a scalable solution for both log management and real time security analysis www.nss.gr 16 Web Security, Analytics & MDM iboss Web Security goes beyond protecting the browser and is designed to secure any device anywhere, anytime, directly to cloud ⦿ Next Generation Web Security Gateway ⦿ FICO™ Behavioral Cyber Scoring Anti-Fraud ⦿ Malware Scanning & Behavioral Sandboxing ⦿ Network Anomaly Detection & Visibility ⦿ App Prioritization & Bandwidth Optimization ⦿ Risk Management & Threat Isolation ⦿ Incident Response / Logging & Reporting ⦿ MobileEther MDM Integrated Solution www.nss.gr 17 Document Classification Using Boldon James Data classification companies can take decisions about how data is managed, protected and shared, both within and outside. ⦿ Improve data security awareness ⦿ Enforce corporate security policy ⦿ Identify and secure valuable data ⦿ Increase effectiveness of DLP & IRM ⦿ Demonstrate regulatory compliance ⦿ Empower users and transform company security culture www.nss.gr 18 Document Security SealPath allows companies to Protect its Critical Documents wherever they are without high costs or complex technologies allowing them to be controlled ⦿ Protect critical and confidential documents ⦿ Distribution & Access monitoring of documents ⦿ Private data environment controlled globally ⦿ Modify restriction policies dynamically ⦿ Revoke access to the documents in real time, whenever & wherever they are www.nss.gr 19 PKI Solutions & Identity Services GlobalSign Identity and Security Solutions enable enteprises around the world to conduct secure online communications ⦿ Globalsign Certificates are trusted by any Browser, OS, Device and Application and are used for Server Identification, Digital Document Signing, Digital IDs, Timestamping etc. ⦿ GlobalSign Access Control & Authentication Control which users, machines and devices can access corporate networks and services ⦿ Code Signing certificates certify that a signed application is legitimate and comes from a known software vendor www.nss.gr 20 SIEM & Log Management LogPoint is a simple but super powerful SIEM platform, with a straightforward architecture, categorization and a simple search language ⦿ Easy Integration & High Performance ⦿ Supporting many Vendor Devices by Templates including Normalizations & Dashboards ⦿ Complex Processing with Simple Methodology ⦿ Easy deployment and Maintenance ⦿ High availability, Scalability & Decentralization ⦿ Affordable in Price www.nss.gr 21 Web Application Security Scanning Netsparker finds and reports Web Application Vulnerabilities, with unique and accurate Proof- Based Scanning Technologies producing a Proof of Concept to without false positives. ⦿ Fully automated (pre-scan and post-scan) ⦿ Automatically detects security issues in websites, web applications and web services. ⦿ Detects SQL Injection, Cross-site Scripting and other Web Application Vulnerabilities ⦿ Provides vulnerability remediation solutions ⦿ Easy deployment and Maintenance www.nss.gr 22 DDoS Protection & Mitigation Services Corero Network Security is dedicated to improving the security and availability of the Internet with innovative DDoS & Network Security Solutions ⦿ Protect against DDoS attacks and cyber threats ⦿ Combination of signature matching and protocol behavioral analysis to safeguard against zero-day attacks ⦿ Comprehensive attack visibility and forensics ⦿ Behavioral & Multi-Layer Defense analysis ⦿ Available for the Enterprise or Carriers with Modular Increments of 10 Gbps www.nss.gr 23 Server Load Balancing, Secure GW, WAN Optimization Array Networks creates Network Optimization solutions that can increase employee Productivity and business agility with dramatic cost savings ⦿ Array’s secure access solutions seamlessly External connect