Beka Technology

46
BEKA TECHNOLOGY Good day Welcome to our From Presentation Interactive

description

please find our company intro.

Transcript of Beka Technology

  • 1. BEKA TECHNOLOGY Good day Welcome to our FromPresentation Interactive

2. Head Office in ABU DHABI We are also in DUBAI and INDIA 3. 25+ Employees ~ formed by a group of young well experienced technical engineers. ~ managed by well known management gurus with proven track records. Strength ~ backed by business legends. ~ supported by market leading product vendors. ~ 200+ man years of experience So we are here to make the real difference 4. 150 % increase in clients 125 % increase in revenue 70 % increase in profit 50 % increase in locations 40 % increase in manpower growth 5. We Play with 6. Solutions Retail Schools Inventory Management Systems RFID Asset ManagementHealthcare RFID Patient Tracking RFID Security System for Guard Tours Industrial Parking Management System Construction Vizbee produces comprehensive RFID solutions and RTLS systems for locating and tracking assets and people, allowing rapid and riskless deployment of projects in various vertical markets. Schoolchildren protection Logistics Security RFID 7. Solutions Retail V-SHOP, Solutions for chain stores .Inventory in a matter of minutes Accurate location of products Controlling the content of closed cartons Boost sales Detection of misplaced items Audio assisted product searching RFID 8. Solutions Schools V-SCHOOL School-childrens protection * allows to track the children, their safety, and the children on the school buses. * perfect vector to communicate and ensure the follow-up of the children's education * online portal to communicate messages, meetings, exams, notifications RFID 9. Solutions Healthcare * Hospital Asset Tracking * RFID Patient Tracking * V-PROTECT for Infant Protection RFID 10. Solutions Logistics RFID based warehouse management & Logistics Managing the warehouses stock in real- time Using intelligent handheld RFID readers RFID Did you ever find the Time & Cost for stock taking huge ? 11. Solutions Industrial Parking Management System V-PARK RFID 12. Solutions ~ Over 80% of successful exploitation happens from the inside, behind the firewall - SANS.ORG ~According to US-CERT (United States Computer Emergency Readiness Team), 95% of downtime and IT related compliance issues are a direct result of an exploit against a Common Vulnerability and Exposure. ~ A firewall, IDS, IPS, anti-virus software and other counter measures dont look for or show how to remove CVEs. So most companies are really only 5% secure Network Access Control 13. Solutions Network Access Control And you thought a firewall was all you needed? Also you need BYOD in Your Business Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come from the inside. 14. Solutions Network Access Control Inside-Out Network Security Appliances Immediately control access by any and all types of devices if you dont want them on the network, they dont get on the network. Identify network holes (CVEs) on the inside of your network and guide proactive remediation process Defend against malware through automated detection and blocking 15. Solutions Network Access Control The BYOD NACwall Appliance Awards NetClarity Picks Up Where Firewalls, Anti- virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off John Gallant, President, Network World The Most Innovative NAC Vendor in the World network Products Guide, Hot Companies, 2009, 2010, 2011 16. Solutions Wi-Fi Better Wi-Fi for All Enterprises Simply Better Connections Delivering the most consistent and highest speed wireless performance possible anywhere, everywhere, all the time 17. Industrys Broadest Wi-Fi Portfolio Entry level 802.11n High-capacity 802.11n Mid-range dual band MIDRANGEHIGH END Enterprise dual-band LOW END Entry-level 802.11g Wi-Fi wall switch 6 to 50 APs SMB 50 to 500 APs Mid-range 50 to 1000 APs High end Up to 10K APs Carrier edge platform Dual-band 802.11n Strand mount 802.11n Dual-band sectorized Dual-band AC powered Small cell + Wi-Fi Point to point and multipoint bridges INDOOR MANAGEMENT OUTDOOR 18. Solutions Wi-Fi Whats the Big Difference? THEM US Fixed 1:1 relationship between Wi-Fi radios and antennas Dynamic 1:many relationship between Wi-Fi radios and antennas Patented BeamFlex Adaptive Antenna Technology 19. Solutions Wi-Fi Better transmission to devices constantly changing their orientation Device orientation accounts for up to 5x performance differential among products 20. Solutions Wi-Fi Critically Acclaimed Everywhere 2012 best breakthrough technology vendor 2011 fastest growing of top 5 WLAN vendors 2011 best performing wireless system 2011 top Wi-Fi channel company 2011 best mobile broadband technology 21. Solutions Remote Support One Solution for Every Remote Support Need secure remote support solutions that enable technology support professionals to access and fix any device, anywhere. support a variety of mobile devices - including Android, iPhone, iPad, BlackBerry and Windows Mobile. replace legacy remote access tools with a complete solution designed for the needs of security-conscious support organizations. Appliance-based remote support software is more secure than software-as-a-service or point-to- point remote control tools 22. Solutions Remote Support Access remote desktops, laptops, POS systems, kiosks and servers, even if no one is present to give you control. Reboot the remote desktop without losing your connection to the support session. Reboot into safe mode with networking and request automatic logon credentials at reboot. Limit screen sharing and remote control to specific applications. Allow reps to control which applications they share in presentations, and let customers control which applications you see. Chat with customers through a secure, customizable chat window during both support and training sessions Dashboard lets you oversee support teams, transfer or take over support sessions and monitor reps' remote desktops 23. Bomgar the Box Thats Revolutionizing Remote Support Solutions Remote Support Reboot Application Sharing Command Shell File Transfer Screen-Sharing System Information Collaborative Browser Sharing Session Recording 24. Solutions Change Management Ever failed to meet the objectives of a project implementation ? A great solution + Change Management Looking for a way to track changes on your network ? Lost control over the number of assets and configurations ? = Project success+ Effective project management A Myth about Project success.. CHANGE MANAGEMENT SYTEM 25. Solutions fully integrated Service Management platform that caters for all ITIL processes all of your change and incident management directly references the underlying assets No Help Desk should be without an integrated CMDB supports a wide variety of customizable Configuration Items (CIs), to enable you to map your infrastructure at physical and logical levels. The CI relationships can be viewed from multiple angles giving you the immediate ability to see dependencies between items and the impact of an outage. Improve your IT quality of service through the effective and efficient management of your infrastructure. Change Management 26. Identify problematic infrastructure components Identify the impact of change and loss of service to your business Avoid unnecessary purchase of infrastructure Manage the movement and assignment of I.T. assets Identify and avoid conflicting changes Identify unauthorized changes to your infrastructure Centralize operational documentation Track what infrastructure your projects are dependent on Reduce dependency on staff undocumented knowledge Improve the efficiency and effectiveness of your Service Desk Conduct forward-planning of change, warranty expiry and other date driven events Monitor the cost of incidents and downtime to your business, and performance against SLAs Track software licensing Maintain an audit trail of all infrastructure changes Improve your Change Request review and approval process to increase your implementation success ratio Meet the compliance requirements of ISO 20000 Align yourself with industry and ITIL best practices Change Management Solutions How you benefit 27. Email Phishing Protection and Management Filter Spam Detection Enterprise Email Virus Protection Dynamic Email Reputation Services with Global Visibility Zero-Hour Threat Detection Email Firewall Email Quarantine Folders by Threat Smart Search: Real-Time Message Tracing Enterprise Protection for Microsoft Office 365 Big Data Platform Cloud OR Appliance Infrastructure Virtual Appliance Deployment Options Solutions Email Security Protect and Govern Your Most Sensitive Data with Powerful Email Solutions 28. Solutions Email Security Gartner, Inc. positions Proofpoint in the Leaders Quadrant in its2012 Magic Quadrant for Secure Email Gateways Proofpoint has the strongest DLP capabilities The Forrester Wave: Email Content Security, Q4 2012 Proofpoint has been awarded the 2012 Product Differentiation Excellence Award for Email Content Security by Frost & Sullivan. 29. Solutions IPAM Global IP Address Management solution Global visibility Global IPAM Policies: Enforce your RulesAutomate your naming conventions Global IPAM Management Manage DNS-DHCP services at the architecture level Automate IPAM-DNS-DHCP administration tasks Multi-Vendor DNS-DHCP services Management Mass reconfiguration Simplify your migration processes Global IPAM Control to Improve Your SLA Discover unauthorized devices on the network Reclaim unused IP addresses Reclaim unused ports Built-in Work Flow 30. Solutions IPAM Built-in zero administration database: No Data Corruption, Errors, or Loss. Hardened Operating System. Built-In Data Replication Mechanisms for Backup, Restore and Disaster Recovery Plan 100% Web Based GUI Unified and Automated IPAM-DNS- DHCP Management Global High Availability for Absolute Service Continuity and Management 31. Solutions MDM Mobile Device Control for the Way You Work Mobile Security Mobile Device Management Mobile Application Management Mobile Content Management Mobile Email Management Bring Your Own Device (BYOD) 32. Solutions MDM Secure Your Mobile Deployment from End-to-End User Security: manage user access to corporate resources Device Security: enables administrators to prevent device enrollment Application Security: corporate data stored in applications are secure. Manage a Diverse Fleet of Devices in Your Enterprise 33. Solutions MDM The largest enterprise mobility Management Provider in the World Recognized as a leader in the 2013 Gartner Magic Quadrant Report For the 3rd consecutive Year 7000+ Customers 150+ countries 18 Languages Simplify Enterprise Mobility 34. Solutions Back up Redefining Backup Solutions Maximized Data efficiency and protection Mix SATA, SAS, and SSD drives in the same chassis to customize performance and capacity JBOD and RAID levels 0, 1, 5, 6, 10 are supported with multiple automatic global spares Disk failures with a RAID LUN are automatically repaired using an available spare disk within the chassis 35. Solutions Back up Redefining Backup Architecture connects servers and storage directly across Layer 2 Ethernet for maximum scalability and performance Ethernet Storage: The future of storage area networking CorOS: A distributed storage operating system with a shared global namespace. Policy-based automation 36. Solutions Back up Visionary vendor in Gartners 2013 Magic Quadrant Awards & Recognition In 45+ countries1700+ Customers 37. Solutions IT Security Rethink IT Security Do you have an automated system to manage guests on your network? Do you have a mobile security strategy? Youve secured your endpoint systems, right? But are there gaps? Youve secured your network perimeter, right? But how about the inside? Are your regulatory compliance and inventory reports automated? There is good news... 38. Solutions IT Security The security you need. The automation you want Automated Security Control Solutions from: .One box, one day to install.. works with what you have. . No software. . Non-disruptive. . 3rd-generation. 39. Solutions IT Security Recognized as a Leader in the 2012 Magic Quadrant Awards & Recognition 40. Solutions IT Security Managed Security Services Security Scanning Services Outsourced IT & Consulting Penetration Testing Service Network Forensics Social Engineering Phishing Techniques 41. Solutions IT Security Port Scanning System Fingerprinting Service Probing Vulnerability testing and verification OS Configuration Verification Application Layer Testing Firewall and ACL Testing Administrator and Root Privilege Testing Password Aging and Strength Network Security Control Testing Database Security Flaw Testing Third-Party/Vendor Security Configuration Testing Hardened Server/Device Configuration Testing Vulnerability Exploitation Under the license and guidance from. 42. Solutions IT Security Unified Threat Management (UTM) From: Consolidated Network Security Platform Unmatched Performance Broad Range of Technologies Visibility and Control of Applications the fastest firewall technology on the market. Firewall Security Solutions 43. Solutions IT Security Database Security Intrusion Prevention System IPv6 Security Solution Distributed Enterprise Solutions Firewall Security Solutions Endpoint Protection DDoS Defense Technology Next Generation Firewalls (NGFW) Virtual Private Network (VPN) Virtual Security Vulnerability and Compliance Management WAN Optimization Web Filtering Web Application Security Secure WLAN Unified Threat Management (UTM) Anti-Spam Security Solutions Antivirus/Anti-Spyware Application Control BYOD Solutions Data Center Cloud Management Data Loss Prevention (DLP) 44. Solutions IT Security Won the most number of AWARDS 45. Solutions Expertise Other Area Of Expertise Total Solutions From: 46. BEKA TECHNOLOGY We Sincerely Thank you PresentationOur Interactive For Watching BEKA TECHNOLOGY P O BOX 126603 ABU DHABI UNITED ARAB EMIRATES PH: +971 2 44 1111 4 Fax:+971 2 44 11 55 0 [email protected] www.bekatechnology.com