NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems...

20
GEOSPATIAL INTELLIGENCE SYSTEMS SITUATIONAL AWARENESS TARGET ACQUISITION & TAILGATING INFORMATION AUTHORITY MANAGEMENT LOCATION BASED SYSTEMS NATIONAL SECURITY INITIATIVES COASTAL SURVEILLANCE BORDER AND PERIMETER SECURITY COMMAND & CONTROL CENTRE C4ISR TECHNOLOGY ETHOS TECHNOLOGY ETHOS TECHNOLOGY ETHOS TECHNOLOGY ETHOS EFFICIENCY CONFIDENTIALITY RELATIONSHIP RESULTS EXPERIENCE TEAM WORK SERVICES INDEPENDENCE AEROSTAT & AIRSHIP TECHNOLOGY RESPONSIVENESS RESPECT FAITH MORAL PHILOSOPHY GEOSPATIAL I I I I INT NT NT NT NT NT NT NT T T T T NT T T NT NT T T NT T T T T NT NT T T NT T T T NT T T T NT T T NT NT T T T T NT T T T T T T T T T NT T T T T T T T N NT T T T T T T T T T T N N N N N NT T T T T T N N N N N N NT NT NT T T N N N N N N N N NT NT NT N N N N NT NT NT N N N N N N N N N N N N N N N N N N EL EL EL EL EL L L L L L L L L EL L L L L E EL L L L L L L L L L E E E E E E E E E EL L L L L L EL L L L L E E E E E E E E E E E E EL L EL EL L L L EL EL L L E E E E E E E E E E E EL EL EL L E E E E E E E E E EL EL EL E E E E EL EL L L L EL EL L L L L E EL EL L EL EL L EL EL E EL L E E EL E EL L ELLI LI LI LI LI LI I L L L L L L L L L L L I I I I LI L L L LI I LI L L LI L LI LI LI L LI LI I L L L LI L LI L LI L L LI I LI L L LI L LI LI LI I I I L I I LI LI L L L L LI L L L L L L LI LIGE GE GE GE GE GE G G G G G G G G GE GE G G GE G G G G G G G G GE G G G G G G G G G G G G G GE G G G G G G G GE G G GE G GE GE GE G GE G G GE G G G G G G G G G G G G G G G G G G GE GE GE G GE GE G G G G G G G GE G G GE GE G G GE GE GE GE GE G G G G G GE G GE G GE G GE E E E G G G G GE GE E E E E E GE E E E E G G G G GE E E E E G GE E E E E E E E G G G GE E GE E E E E E GE E E E E E E E G G GE E E E E E E GE E GE E E G G GE GE G NC NC NC NC NC N N NC NC N N N N N N NC N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N NC N N N N N N N N N N N N N N N N N N N N N N N N N N N N N NC N N N N N N N N N N N N N N N N N N N N N N NC N N N N N NC N N N N NC C CE E SYSTEMS TARGET ACQUISITION & TAILGATING INFORMATION AUTHORITY MANAGEMENT COMMAND & CONTR C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I IS S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S SR R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R R E E E E E E TE E E E E E TE E E TE TE E TE TE E E E E TE E E E E TE TE E TE E E TE E E TE TE E E E E E TE E E E TE TE E TE E TE E E E E T T T T T T T T T T T CH CH C C C C C C C C C C C C C C C C C C NOLOGY ETHOS TECHNOL S S C C C C C C C C C C C EC C C C EC C C C C TEC C C C C TEC TEC TEC C C C C C C C C C C C C C C C C C TEC C C C C C C C C C TEC TEC TEC EC C C TEC TEC TEC C EC C C EC TEC TEC C TEC C TEC TEC C C C C C C EC EC EC C EC EC TEC TEC EC C C C EC TEC C C C EC E E E E E TE TE TE E E E E TE E E E E E E E E E E E E E E E E TE T T T T T T HNO H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H LOGY ETHOS TECHNOLOGY ETHOS OS OS S S S S S OS S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S OS S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S O OS S S S S S S S S S S S S INDE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EP P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P PE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N ND D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D D DE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EN N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N NC C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A E A A A A A AI AI AI AI AI A AI AI AI A I A AI AI AI I I I I I I AI I I AI I I I AI I AI I AI I I I AI I A AI I I I I I I I I I I I I A R R RS R R R R R R R R R R R R R R R R R R R R R R R R R R R R R RE E E E E E E E E E E E E E E E E E E E E E E E E E E ES S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S SP P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P PH H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H HI Middle East Operations PO Box 214811, Ajman United Arab Emirates Tel. : +971 4 5586 585/95 Fax : +971 4 5586 567 Email : [email protected] www.netsconsults.com NETWORK Security Consultants Security Consultants & INFORMATION TECHNOLOGY CRITICAL NATIONAL INFRASTRUCTURE GEOSPATIAL EXPLORATION & IMAGE ANALYSIS CONFIDENTIAL ENTIAL SURVEILLANCE & INTELLIGENCE TACTICAL COMMUNICATION & NETWORKS UNMANNED AERIAL VEHICLES (UAV) AWARENESS LOCATION BASED SYSTEMS NATIONAL SECURITY INITIATIVES C CO OA AS ST TA AL SURVEILLANCE BORDER AND PERIMETER SECURITY COMMAND & CONTROL CENTRE

Transcript of NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems...

Page 1: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

GEOSPATIAL INTELLIGENCE SYSTEMS

SITUATIONAL AWARENESS

TARGET ACQUISITION & TAILGATING

INFORMATION AUTHORITY MANAGEMENT

LOCATION BASED SYSTEMS

NATIONALSECURITY INITIATIVES

COASTAL SURVEILLANCEBORDER AND PERIMETER SECURITYCOMMAND & CONTROL CENTRE

C4ISR

TEC

HN

OLO

GY

ETH

OS

TECHNOLOGY ETHOS

TEC

HN

OLO

GY

ETH

OS

TECHNOLOGY ETHOS

EFFICIENCY

CO

NFI

DEN

TIA

LITY

RELATIONSHIPRESULTSEXPERIENCE

TEAM WORK

SERVICESINDEPENDENCE

AEROSTAT &AIRSHIP TECHNOLOGY

RESPONSIVENESS

RESPECT FAITH

MORALPHILOSOPHY

GEOSPATIAL IIIIINTNTNTNTNTNTNTNTTTTTTTNTTTNTTNTTTNTTTTTNTNTTTNTTTTNTTTTNTTTNTNTTTTTNTTTTTTTTTTNTTTTTTTTNNTTTTTTTTTTTNNNNNNTTTTTTNNNNNNNTNTNTTTNNNNNNNNNTNTNTNNNNNTNTNTNNNNNNNNNNNNNNNNNN ELELELELELLLLLLLLLLELLLLLLEELLLLLLLLLLLEEEEEEEEEELLLLLLELLLLLEEEEEEEEEEEEELLELELLLLELELLLEEEEEEEEEEEELELELLEEEEEEEEEELELELLEEEEELELLLLELELLLLLEELELLELELLELELEELLEEELEELLELLILILILILILIILLLLLLLLLLLLIIIILILLLLIILILLLILLILILILLILIILLLLILLILLILLLIILILLLILLILILIIILILLILILILILLLLLLILLLLLLLILIGEGEGEGEGEGEGGGGGGGGGEGEGGGEGGGGGGGGGEGGGGGGGGGGGGGGEGGGGGGGGEGGGEGGEGEGEGGEGGGEGGGGGGGGGGGGGGGGGGGEGEGEGGEGEGGGGGGGGEGGGEGEGGGEGEGEGEGEGGGGGGEGGEGGEGGEEEEGGGGGEGEEEEEEGEEEEEGGGGGEEEEEGGEEEEEEEEGGGGEEGEEEEEEGEEEEEEEEGGGEEEEEEEGEEGEEEGGGEGEG NCNCNCNCNCNNNCNCNNNNNNNCNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNCNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNCNNNNNNNNNNNNNNNNNNNNNNNCNNNNNNCNNNNNCCCE E SYSTEMS

TARGET ACQUISITION & TAILGATING

INFORMATION AUTHORITY MANAGEMENT

COMMAND & CONTR

CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIISSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR

EEEEEETEEEEEETEEETETEETETEEEEETEEEEETETEETEETETEEETETEEEEEETEEEETETEETEETEEEEETTTTTTTTTTTTTC

HC

HCCCCCCCCCCCCCCCCCCCCCCCC

NO

LOG

YET

HO

S

TECHNOLSS

CCCCCCCCCCCECCCCECCCCCTECCCCC

TEC

TEC

TECCCCCCCCCCCCCCCCCC

TECCCCCCCCCC

TEC

TEC

TECECCCTEC

TEC

TECCECCCECTEC

TECC

TECC

TEC

TECCCCCCCCECECECCECECTEC

TECECCCCECTECCCCECEEEEETETETEEEEETEEEEEEEEEEEEEEEEETETTTTTT

HN

OHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH

LOG

Y ET

HO

S

TECHNOLOGY ETHOSOSOSSSSSSOSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSOSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSOOSSSSSSSSSSSSSOSSSSS

INDEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEENNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEENNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAIAIAIAIAIAAIAIAIAAIAAIAIAIIIIIIIAIIIAIIIIAIIAIIAIIIIAIIAAIIIIIIIIIIIIIA RRRSRRRR

RRRRRRRRRRRRRRRRRRRRRRRRRRREEEEEEEEEEEEEEEEEEEEEEEEEEEESSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSPP

PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHI

Middle East OperationsPO Box 214811, Ajman

United Arab Emirates

Tel. : +971 4 5586 585/95

Fax : +971 4 5586 567

Email : [email protected]

www.netsconsults.com

NETWORKSecurity ConsultantsSecurity Consultants &

INFORMATIONTECHNOLOGY

CRITICAL NATIONAL INFRASTRUCTURE

GEOSPATIAL EXPLORATION & IMAGE ANALYSIS

CO

NFI

DEN

TIA

LEN

TIA

LSU

RVEI

LLA

NC

E &

INTE

LLIG

ENC

ETA

CTI

CA

L C

OM

MU

NIC

ATI

ON

& N

ETW

ORKS

UNMANNED AERIAL VEHICLES (UAV)

AWARENESSLOCATION BASED SYSTEMS

NATIONALSECURITY INITIATIVES

CCOOAASSTTAAL SURVEILLANCEBORDER AND PERIMETER SECURITYCOMMAND & CONTROL CENTRE

Page 2: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location
Page 3: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Develop Innovative & Integrated Solutions that help our clients grow their business.

Attract, retain and maximize relationship with profitable customer groups at minimal risk

Maximize value by delivering solid sustainable and profitable growth

Attract & develop highly committed and accountable teams of professional individuals with clear

purpose, common approach, performance goals and complimentary skills

Establish Connections & Methodology In The Domain Of Physical & Virtual Security

Customer Commitment: Develop relationships that add a real and positive value to our customer’s business

Quality: Provide outstanding technology, products and unsurpassed services

Integrity: Uphold the highest standards of integrity in all our actions

Team work: We work together across teams and departments

Respect for people, Encourage development, Reward performance

Personal Accountability: Personally accountable for delivery of our commitments andlead by example

Determination to Win: A strong determination to win in the marketplace and in every aspect of our business

Mission Statement

Our Values

1

Our Vision

Page 4: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Infrastructure Deployment

IT Security

Business Process Management

Business Application Deployment

Customized Software

Homeland Security

Defense Solutions

Experience of working with clients in multiplecountries and locations

Impeccable track record

Clear Focus on SMEs, Govt. Org. & SecurityInstitutions

Our Focus

Why NSC ?

BusinessEnablement

Outsourced CIO/CSOEmail Discovery/ReportingBusiness/IT ConsultingIT

Policy Dev./ImplementationCompliance Consulting Security

ConsultingOnsite/RemoteManagementPatch

ManagementWirelessDeployment Services

InformationProtection

Data RecoveryBusinessContinuitySecurity

AssessmentsVulnerability AssessmentsSecurity

ManagementInformation Leakage ProtectionLaptop

SecurityData EncryptionContent Security/FilteringPerimeter Security/IDS/IPSNetwork Access Controls

(NAC)Email Security

TechnologyOptimization

Health ChecksIT Assessments

Systems ManagementContent Security

Email ArchiveSpam Filtering

Event ManagementLog Consolidation/Reporting

Server VirtualizationContent Delivery

Migration ServicesIT/Security Support

2

I

Management

Infrastructure

Health Check

Assessment

Reporting

Consolidation

IT/Business Policy

Your Virtual Office

Productivity+

Consulting

Recovery

Control Continuity

Privacy Security

Protection

Optimization

Enablement

TechnologyVirtualization Business Systems

Information

Business

Focus

Page 5: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

3

Man is the lowest-cost, 150-pound, nonlinear, all-purpose computer system which can be mass-produced by unskilled labor. - NASA in 1965

Page 6: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Infrastructure Deployment Services

NetsConsult’s Infrastructure Service division assists the clients in design, deployment and management of:

Networking

Network ManagementTriple-Play

MPLSContent NetworkingRemote Installation &

Monitoring

Telecom

IP TelephonyVoIP networksAutomatic Call

DistributionInteractive VoiceResponse System

4

Network Management

SNMP-based Network Management

Log Analysis

Event Correlation

24x7 Remote network monitoring

Networking

Multi-Dwelling Unit networks

Campus Networks triple-play

3rd party integration of Voice, Video & Data

IPTV, Content and feeds

Quality of Service (QoS)

Triple-play Solutions

Security

FirewallsIPSec VPNs

Content FilteringNAC/UAC

PKI

Services

Page 7: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

5

Networking & Telecommunication

IP Next Generation Networks (NGN)

Video Hubs

Need Analysis

Migration from point-to-point to EthernetArchitecture

Integration of end-to-end services

Managed Services of Voice, Video and Dataservices.

MPLS over ATM

Layer 2 VPNs

MPL Management

Caching Engines

Web Servers

Web Server load Balancing

Application Server Load Balancing

Firewall Load Balancing

Distributed Data Storage

Online & OffIine Data Backup solutions

Metro Ethernet

MPLS

Content Networking

Proxy solutions

Add-on Security on Content appliances

IT Data Networking, Telecom & Security Experts

Offering services from Offshore sites (Dubai,India)

Remotely configure, manage and monitor routers, switches, firewalls and IPS

Remote log analysis monitoring andcorrective measures

Frequent reports, alerts and updates

Low-cost deployment through pre-installedpre-configured devices

IP EPABX

IP Telephony

Installation & Configuration of Soft-phones

VolP networks

Automatic Call Distribution (ACD)

Interactive Voice Response (IVR)

Computer Telephony Integration (CTI)

Call Center Infrastructure

Remote Installation & Monitoring Services

Telecommunication

services

Page 8: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Information Security

Security Infrastructure

Software & Hardware Firewalls

Virtual Private Network (VPN) IPSec & SSL

Intrusion Detection & Prevention Systems

Mail Filtering

URL Filtering

Desktop Security

Enterprise-wide Antivirus

Storage Security

Public Key Infrastructure (PKI)

Enterprise Security Management

Log Monitoring & Analysis

Network Behaviour Anomaly Detection (NBAD)

Computer Emergency Response Team (CERT)

Security Operation Center (SoC)

Business Continuity & Disaster Recovery

Enterprise Security Networks

Physical and logical segregation of internal, external and guest networks

Authentication, Authorization and Accounting of Wireless networks

Wireless DMZs

Optimized switching designs

NetsConsults believes and practices PMP based project management and have certified ProjectManagement professionals involved in all medium to large deployments. We emphasize the needof clear meeting minutes, documented Scope of Work, Project Management Plan, post-deployment User Acceptance Testing (UAT) and customer feedback.

The company, apart from providing consulting services for the above in several countries has a specialized team that can be deployed as per the client requirements. This pool of experienced and certified IT professionals have deployed complex and large scare projects in ISPs, SPs and large enterprises.

6

Network Admission Control (NAC) / Universal Access Control (UAC) architecture

services

Page 9: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

7

Page 10: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Vulnerability Assessment

NetsConsults brings in the experience and expertise that has helped many organizations worldwideto assess, analyze and secure their networks.

NetsConsults offers the following Security Services :

Vulnerability Assessment Application Security Audit Enterprise Security AuditISO17799/BS7799 Compliance

Penetration TestingSecurity Code ReviewSecurity Code ReviewApplication Security Standards & Guidelines

Our vulnerability assessment service helps you test your entire IT infrastructure from internal as wellas external security threats. It involves both remote and on site security tests. We check for insecuresystem configurations, policy non-compliance and missing patches across all network elementsand security products installed in your company.

Our penetration testers are trained and certified in multiple security domains before they becomepart of the penetration testing team. Here's an indicative profile of one of our premium testers:

Performed over 30 security testing projectsOver four years of experience in Information SecuritySANS GCIH certified, Sun Security certified engineer

Vulnerability Assessment

Penetration Test

8

security services

Page 11: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Intelligent penetration tests blend human ingenuity with automated tools.

Complete, thorough application testing in 5 -10 days

Collective expertise of a team that's done over 500 tests in the last 5 years

Reports focused on how to fix the vulnerabilities.

Schedule tests within a week Of Security Audit

Report query support for three months

Leading software development companies and software product vendors are using the followingapplication security program comprising of:

Documented security design and coding guidelines

Developer training

Security testing

Security Audit & Standards Guide Lines

9

We use a combination of open source, commercial and proprietary tools to perform our tests. A security test relies on the discipline, creativity and experience of the engineer who tests the network. The tools aid the engineer to collect data and refine the testing strategy; we have invested in-all the standard tools required for a successful penetration test.

Under the application security audit services we test the applications being used by the businesses from internal and external threats. Over 100+ of our clients have entrusted us with application security audit of their business applications covering the following areas:

Application Security Audit

Application Security Standards & Guidelines

security services

Page 12: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

As a full service application security provider, we have worked with our clients in developing securityguidelines for design and coding across J2EE and .Net platforms. Such guidelines have resulted inseveral benefits for our clients:

Ensuring, security is considered in design and coding stages by laying down the key requirements

Providing a means to communicate basic security requirements to several stake holders in softwaredevelopment

As a set of criteria to test and audit security of applications

For training of developers and designers

With our experience in standards and guideline development, we can deliver customized guidelinesfor your environment fast and cost effectively.

An Enterprise Security Audit entails a review of all the processes and practices followed by anorganization while ensuring an enterprise-wide security policy. Additionally, it involves a technicalaudit conducted across all locations and devices in the enterprise. Based on the spread and criticality of the devices being audited, there is a judicious mix of remote and on-site audits.

Enterprise Security Audit

Enterprise Security

10

security services

Page 13: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Security Code & ISO 17799/BS7799 Compliance

Security Code Review

ISO 17799/BS7799 Compliance

Our security code review services checks your application code sets for accidental security

vulnerabilities and deliberate application back doors. When you engage us you get an in depth

examination of the security strength of your application and code sets, with a clear, concise report

for mitigation. We also provide 'threat models' for the entire application or the components that

come with the scope of the review.

Let our BS7799 practice help you achieve ISO 17799 compliance and BS7799 certification quickly.

With one of the world's largest pool of certified BS7799 implementers and lead auditors, we help

you meet your compliance goals in the shortest time and lowest cost.

We have helped several large and small firms in the financial, BPO and IT services industry in

achieving BS 7799 compliance or certification. If you are looking for achieving compliance or

obtaining certification forBS 7799 Nets Consult is your right bet.

11

security services

Page 14: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

12

Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning. - Rich Cook

Page 15: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Business Process Management

1. Mapping the Business Requirement 2. Sourcing & Screening 3. Evaluation & Assessment 4. Offer Management 5. Information Management & Applicant Tracking systems6. Representation at Campus and job fairs 7. Process Analytics

Manpower Services

13

Any organization utilizes a lot of support functions and processes in order to carry out its core business. At times, the amount of time and resources spent on the maintenance of these support functions far outweighs the time and resources spent on the core business of the organization. Support processes become so complex in nature that the top and middle management start spending a substantial amount of time on these processes, clearly losing the focus on their core business.This has a direct impact on the growth and even continuity of the organizations.

adopted by the organizations, enabling them to quickly reap the benefits of outsourcing. These services also enable organizations to adopt industry standard processes that have been designed and implemented after lot of due deliberation.

NetsConsult offers a variety of services tailored to the customer’s manpower requirements. We understand trained/specialized manpower can be hard to find, and even harder to retain. NetsConsult therefore uses its vast expertise,connections and offices in Asia to source the right people for the right organisations.

Recruitment is one of the most strategic functions for the organization as people are single critical asset of the organization and it becomes imperative that 'the right fit gets recruited. We

NetsConsult recognizes the need for organizations to out source some of their support / project / short-term functions either completely or partially. The kind of processes that can be outsourced are repetitive in nature and do not require tactical and strategic decisions to be taken. Such processes can be easily outsourced without causing any disruptions in the day to day operations of the organization.

NetsConsult has identified some of the typical processes that can easily be outsourced leading to substantial efficiencies in the organization. The services are offered, in the form of ready made solutions that can be easily

Ensuring The ‘Right Fit’

BPM services

Page 16: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

14

Business Process Management

Feel@home Comforts For Outsourced Manpower

Employeease

PerformTrack

help organizations manage the end to end recruitment process ensuring the quality and speed

A structured, long - term approach for the on-boarding of a new employee to the organization is a critical driver of employeeretention and productivity. Our process supports and enable the organization to create the much required feeling of'Employee delight.Pay-Smart

Our Payroll solutions provides complete payroll operation management, including transactional finance and tax-related activities. We convert the tedious paperwork and employee database into a harmonized and effective Business function.

1. Pre joining engagement 2. Joining formalities3. Induction & Data Management 4. Relocation Assignment services

Learning is an investment for the organization. Our solution aims to enhance the delivery of Training and make the function more robust in an organization. Our services include all facets of training. Our Training Analytics extend far beyond process improvement and provide the ROI perspective to the organization and helps building a Development focus in the organization.

We optimize the HR Administration function which is heavily transactional & time consuming activity for an organization. We identify ways for businesses to reduce operating costs while yielding valuable workforce insight that informs and supportskey management decisions.

TrainXpert

Payroll CalculationsProvide HRIS informationAutomated Pay slipsTax & Other Statutory ComplianceTime & Attendance AdministrationGenerate Summaries and Reports

Managing Training Calendars Training Administration & LogisticsVendor Management andAssessment & Training Analysis

Employee Record and ManagementEmployee HandbooksEmployee Events

Distribution of formsReminder MailsAnalysis and feedback

BPM services

Page 17: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

Business Process Management

CompPlus

ESOP Administration

1. Salary fixation and Revisions

2. Enterprise Incentive management

3. Benefits Administration

Participants Profile & record Management

Allocations & participation record keeping

Accounting

Employee Communication Assistance

Finance & Accounting

Transaction Processing Services

Accounts PayableAccounts ReceivableCustomer Billing & Collection General Ledger AccountingReconciliationAsset ManagementFinancial Analysis & PlanningStatutory ReportingTax Returns & Management Treasury and Risk Management

Credit and Debit Card ProcessingAccount openingsAmendments/Audit checksLoan ProcessingCheck Processing Clearing house ServicesClaims ProcessingDocumentation managementRecords maintenanceRegulatory ReportingDay End BalancingStatement GenerationAdvice GenerationAccounting EntryMIS Reporting

15

NetsConsult delivers both transactional and analytical solutions to client for compensation management. We aim to provide a seamless and effective platform to the client to enable smooth administration. With each service Analytics are provided to give Business insight and support enhanced performance.

We provide end to end plan administration service to the organization. With this outsourcing support we take care of all the critical processes involved making it smooth for theorganization to handle the complete process.

BPM services

Page 18: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

" I am enough of an artist to draw freely upon my imagination. Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world. " - Albert Einstein

16

Page 19: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location
Page 20: NATIONAL SITUATIONAL AWARENESS AWARENESS SECURITY ... · geospatial intelligence systems situational awareness target acquisition & tailgating information authority management location

All the information provided in this profile is true and according to the plans/status and philosophy of NetsConsults. All logo’s trademarks, registered brands are owned by their respective owners. NetsConsult is not responsible for any damage or mistake occurred through this corporate profile. The corporate profile is not an offer, part of an offer or commitment from NetsConsults to provide any service/product or technology. For Specific requirements, please refer to our sales at details provided or email at [email protected]

Network & Security Consultants FZEPO Box 214811

Ajman, United Arab EmiratesTel. +971 4 5586 585/95

Fax. +971 4 5586 567Email : [email protected]

www.netsconsults.com