Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.
Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business.
Know more about AGC Networks here: http://www.agcnetworks.com/in/en/cyber-i
2. AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help
organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve
employee productivity by embedding Communications and securing their business processes.
AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests
in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With
a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica,
UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to
foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision,
global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger
client base for AGC.
2
FIREWALL
SPYWARE
PASSWORD
UPDATE
VIRUS
PHISING
HACKER
SPAM
IDENTITY
INTERNET
AGC
Quadrants
CORPORATE INFORMATION
● IP Communications
● Collaboration
● Contact Center
● Multimedia Integration
Unified Communications Network Infrastructure
& Data Center
● UC Applications
● IoT
● Digital Applications
● CRM & ERP Integration
Enterprise ApplicationsCyber Security ( )
● Switching & Routing
● Wireless & Mobility
● Virtualization
● Data Center
● Audit & Risk Assessment
● Certification
● Application & Data Security
● SIEM & SCADA Capability
3. 3
CYBER-i Managed Security Services
Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are
looking to improve efficiency of compliance and security initiatives, we understand that business requirements
can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.
Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD,
social media, web applications and big data can pose risks as well as create inefficiencies if not properly
managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED
SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed
services designed to meet the unique demands of your business.
Do Security Your Way
AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install,
configure and tune your solutions so that it can be controlled internally or managing a complete program for your
organization.
Elevate Your Security Posture
Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your
managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like
threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware
and more.
Drive Intelligence
Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today.
Trustwave performs threat research and analysis that can help you better understand, detect and prevent security
breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global
Threat Database.
Expert Support
Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals.
All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also
holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE,
etc. All of our security analysts have real-world network security experience which they leverage to fully investigate
and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct
their duties with a singular purpose, to safeguard your IT environment. As part of
Get Sustainable
We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view
your programs in real-time, access all your managed services, make support requests, see event history, run reports
and manage your account, all through one easy-to use dashboard.
CUSTOM MANAGED SERVICES
CYBER-i helps augment your security strategy in key
areas to help you evolve processes, elevate data
protection or advance the way you manage threats.
With deep security expertise and unmatched global
threat intelligence, we can design a program that
supports your specific needs, while giving you
complete visibility and control.
PACKAGED MSS BUNDLES
Simplify your security program, operationalize your
expenses and keep your team focused on business
priorities. With packaged solution bundles, expert
management and automated tools, we remove the
day-to-day complexity of compliance and data
protection, so you can get back to what you’re
passionate about – your business.
4. MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES
SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident
Management Alert & Notification I CXO Report I Compliance Report
Security Solution
Monitoring
(On-site / Remote)
Policy Management I Change Management I Configuration Management I
Signature Updates Device Fine Tuning I Version Upgrade I Reporting
Security Solution
Management
(On-site / Remote)
Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature
Updates I Compliance Management Deviation Reporting I Uniform Policy
Management I Configuration Management
Managed Endpoint
Security Services
Web Application Malware Monitoring I Web Application Malware I
Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware
4
5. 5
SERVICES PORTFOLIO
SOLUTION PORTFOLIO
CYBER-i
SOLUTIONS Portfolio
Data Security
• Advanced Threat
Protection
• Information Rights
Management
• Mobile Device
Management
• Vulnerability Management
Application
Security
• Web
Application
Firewall
• Database
Access
Management
Advance Security
• Network Immune
System
• ICS Security
Identity &
Access
• Two Factor
Authentication
• Privilege
Identity
Management
End Point
Security
• Antivirus, End
Point Protection
Network Security
• Firewall
• NG Firewall
• IPS
• UTM
• Enterprise Security
• IOT Security
• Cloud Security
Security
Monitoring
• SIEM
• Data Leakage
Protection
• Network Access
Control
Audit
• Vulnerability
Assessment
• Penetration
Testing
• Network
Audits
& Assessment,
Security Audit
• Application
Audits & Source
Code Review
• Internal Audits
• Digital
Forensics
Management
• Compliance Mgmt
• Security Operations
Center Management
• Vulnerability
Management
• Security Solutions
Implementation &
Management
• Staff Augmentation
Implementation
• SIEM
• APT
• DLP
• NAC
• Bandwidth
Management &
WAN Accelerator
• Wireless Security
• Risk Management
Compliance Tool
CYBER-i
SERVICES Portfolio
Compliance
• HIPAA
• SOC 2
• Data Privacy
• COBIT / ITIL
Framework
Certifications
• ISO 9001
• ISO 20000
• ISO 22301
• ISO 27001
• PCI DSS
• PA DSS
7. CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational
requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading
partners include the following:
7
ASSOCIATIONS
OEM PARTNERSHIPS
• Vast experience of cross functional domains
• Experience to handle very complex and large projects
• Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the
relevant qualifications and industry experience
• An ISO 9001, SOC2 Type I and ISO 27001 certified company
• Close association with the ISACA (USA) Pune and Mumbai chapters
• Strong association with DSCI (Data Security Council of India)
• Work closely with international management system certification bodies such as TUV (Germany), DNV
(Norway) and BSI (UK)
• Empaneled with Computer Emergency Response Team (India) as information security auditing organization
OUR DIFFERENTIATORS
9. 9
This is confidential and proprietary information of AGC Networks Ltd.
Contact Us
AGC Networks Ltd.
Equinox Business Park, Tower 1,
Off BKC, LBS Marg, Kurla (West),
Mumbai - 400 070, Maharashtra, India
T: +91 22 66617272
Ketal Sheth
Cyber Security - Solution Architect
ketal.sheth@agcnetworks.com
T: +91 9833537390
E: info@agcnetworks.com | W: www.agcnetworks.com
GLOBAL FOOTPRINT
ABOUT AGC
Global & India HQ
US HQ
AUSTRALIA
- Melbourne
- Sydney
NORTH AMERICA
Dallas
- Florida
- Minneapolis
- Philadelphia
KENYA
- Nairobi
ETHIOPIA
RWANDA
NIGERIA
SOUTH AFRICA
PHILIPPINES
- Manila
NEW ZEALAND
- Auckland
SAUDI ARABIA
- Riyadh
UAE
- Dubai
INDIA
> Mumbai
- Bangalore
- Chennai
- Gandhinagar
- Gurgaon
- Hyderabad
- Kolkata
- Pune
SINGAPORE
UK
- London
AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified
Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise
Applications to evolve the customer’s digital landscape.
AGC’s ability to tailor solutions across quadrants is strengthened through delivery of
seamless customer support services.
A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North
America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers.
In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and
Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating
customers’ business.