SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
AGC Networks Limited.
CYBER-i
Corporate Dossier
AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help
organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve
employee productivity by embedding Communications and securing their business processes.
AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests
in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With
a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica,
UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to
foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision,
global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger
client base for AGC.
2
FIREWALL
SPYWARE
PASSWORD
UPDATE
VIRUS
PHISING
HACKER
SPAM
IDENTITY
INTERNET
AGC
Quadrants
CORPORATE INFORMATION
● IP Communications
● Collaboration
● Contact Center
● Multimedia Integration
Unified Communications Network Infrastructure
& Data Center
● UC Applications
● IoT
● Digital Applications
● CRM & ERP Integration
Enterprise ApplicationsCyber Security ( )
● Switching & Routing
● Wireless & Mobility
● Virtualization
● Data Center
● Audit & Risk Assessment
● Certification
● Application & Data Security
● SIEM & SCADA Capability
3
CYBER-i Managed Security Services
Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are
looking to improve efficiency of compliance and security initiatives, we understand that business requirements
can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable.
Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD,
social media, web applications and big data can pose risks as well as create inefficiencies if not properly
managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED
SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed
services designed to meet the unique demands of your business.
Do Security Your Way
AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install,
configure and tune your solutions so that it can be controlled internally or managing a complete program for your
organization.
Elevate Your Security Posture
Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your
managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like
threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware
and more.
Drive Intelligence
Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today.
Trustwave performs threat research and analysis that can help you better understand, detect and prevent security
breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global
Threat Database.
Expert Support
Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals.
All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also
holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE,
etc. All of our security analysts have real-world network security experience which they leverage to fully investigate
and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct
their duties with a singular purpose, to safeguard your IT environment. As part of
Get Sustainable
We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view
your programs in real-time, access all your managed services, make support requests, see event history, run reports
and manage your account, all through one easy-to use dashboard.
CUSTOM MANAGED SERVICES
CYBER-i helps augment your security strategy in key
areas to help you evolve processes, elevate data
protection or advance the way you manage threats.
With deep security expertise and unmatched global
threat intelligence, we can design a program that
supports your specific needs, while giving you
complete visibility and control.
PACKAGED MSS BUNDLES
Simplify your security program, operationalize your
expenses and keep your team focused on business
priorities. With packaged solution bundles, expert
management and automated tools, we remove the
day-to-day complexity of compliance and data
protection, so you can get back to what you’re
passionate about – your business.
MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES
SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident
Management Alert & Notification I CXO Report I Compliance Report
Security Solution
Monitoring
(On-site / Remote)
Policy Management I Change Management I Configuration Management I
Signature Updates Device Fine Tuning I Version Upgrade I Reporting
Security Solution
Management
(On-site / Remote)
Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature
Updates I Compliance Management Deviation Reporting I Uniform Policy
Management I Configuration Management
Managed Endpoint
Security Services
Web Application Malware Monitoring I Web Application Malware I
Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware
4
5
SERVICES PORTFOLIO
SOLUTION PORTFOLIO
CYBER-i
SOLUTIONS Portfolio
Data Security
• Advanced Threat
Protection
• Information Rights
Management
• Mobile Device
Management
• Vulnerability Management
Application
Security
• Web
Application
Firewall
• Database
Access
Management
Advance Security
• Network Immune
System
• ICS Security
Identity &
Access
• Two Factor
Authentication
• Privilege
Identity
Management
End Point
Security
• Antivirus, End
Point Protection
Network Security
• Firewall
• NG Firewall
• IPS
• UTM
• Enterprise Security
• IOT Security
• Cloud Security
Security
Monitoring
• SIEM
• Data Leakage
Protection
• Network Access
Control
Audit
• Vulnerability
Assessment
• Penetration
Testing
• Network
Audits
& Assessment,
Security Audit
• Application
Audits & Source
Code Review
• Internal Audits
• Digital
Forensics
Management
• Compliance Mgmt
• Security Operations
Center Management
• Vulnerability
Management
• Security Solutions
Implementation &
Management
• Staff Augmentation
Implementation
• SIEM
• APT
• DLP
• NAC
• Bandwidth
Management &
WAN Accelerator
• Wireless Security
• Risk Management
Compliance Tool
CYBER-i
SERVICES Portfolio
Compliance
• HIPAA
• SOC 2
• Data Privacy
• COBIT / ITIL
Framework
Certifications
• ISO 9001
• ISO 20000
• ISO 22301
• ISO 27001
• PCI DSS
• PA DSS
CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance,
Information Security Management, Service Management & Business Continuity Management, Product
Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking
assignments in the field of Security.
• Consultants possess the contemporary best industry recognized certifications such as:
- Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001,
20000, 22301 and 27001)
- Technical (CEGIT, CEH, OCSP)
- Various Vendor Certifications
- PMP©
• Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering,
Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises.
• Consultants have vast experience in implementing the management system frameworks, governance
frameworks & maturity models as well as auditing the same.
• Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of
which provides a thorough understanding of our clients’ needs.
• Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure
Software Development, Access Control, etc. which matters while assessing, discovering and providing
solutions.
• Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right
choice.
CORE COMPETENCIES
AGC CYBER-i SKILL MATRIX
6
ISO 27001
BS 25999
ISO 20000
SOX
COBIT
HIPAA
PCI DSS
SAS 70
Data Privacy
ISO 9001
ISO 38500
OHSAS 18001
ISO 14001
4%
22%
14%
18%
4%
2%
9%
9%
3%
9%
2%
2%
2%
CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational
requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading
partners include the following:
7
ASSOCIATIONS
OEM PARTNERSHIPS
• Vast experience of cross functional domains
• Experience to handle very complex and large projects
• Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the
relevant qualifications and industry experience
• An ISO 9001, SOC2 Type I and ISO 27001 certified company
• Close association with the ISACA (USA) Pune and Mumbai chapters
• Strong association with DSCI (Data Security Council of India)
• Work closely with international management system certification bodies such as TUV (Germany), DNV
(Norway) and BSI (UK)
• Empaneled with Computer Emergency Response Team (India) as information security auditing organization
OUR DIFFERENTIATORS
8
GLOBAL CLIENTELE
DOMESTIC CLIENTELE
9
This is confidential and proprietary information of AGC Networks Ltd.
Contact Us
AGC Networks Ltd.
Equinox Business Park, Tower 1,
Off BKC, LBS Marg, Kurla (West),
Mumbai - 400 070, Maharashtra, India
T: +91 22 66617272
Ketal Sheth
Cyber Security - Solution Architect
ketal.sheth@agcnetworks.com
T: +91 9833537390
E: info@agcnetworks.com | W: www.agcnetworks.com
GLOBAL FOOTPRINT
ABOUT AGC
Global & India HQ
US HQ
AUSTRALIA
- Melbourne
- Sydney
NORTH AMERICA
Dallas
- Florida
- Minneapolis
- Philadelphia
KENYA
- Nairobi
ETHIOPIA
RWANDA
NIGERIA
SOUTH AFRICA
PHILIPPINES
- Manila
NEW ZEALAND
- Auckland
SAUDI ARABIA
- Riyadh
UAE
- Dubai
INDIA
> Mumbai
- Bangalore
- Chennai
- Gandhinagar
- Gurgaon
- Hyderabad
- Kolkata
- Pune
SINGAPORE
UK
- London
AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified
Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise
Applications to evolve the customer’s digital landscape.
AGC’s ability to tailor solutions across quadrants is strengthened through delivery of
seamless customer support services.
A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North
America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers.
In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and
Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating
customers’ business.

Mais conteúdo relacionado

Mais procurados

Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...Priyanka Aash
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero TrustPriyanka Aash
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesLalit Singh
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales PlayIftikhar Ali Iqbal
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 

Mais procurados (20)

Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 

Destaque

2016-11-11 08-32 página #6
2016-11-11 08-32 página #62016-11-11 08-32 página #6
2016-11-11 08-32 página #6rcastrovera
 
First Day Of School (Ready, Set, Go!!!)
First Day Of School (Ready, Set, Go!!!)First Day Of School (Ready, Set, Go!!!)
First Day Of School (Ready, Set, Go!!!)Shirkethia Walker
 
Presentation about SIBL
Presentation about SIBLPresentation about SIBL
Presentation about SIBLmarufx066
 
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & ITSite24x7
 
Using Dialogue to Unleash Potential
Using Dialogue to Unleash PotentialUsing Dialogue to Unleash Potential
Using Dialogue to Unleash PotentialEveryday Democracy
 
AMD Opteron A1100 Series SoC Launch Presentation
AMD Opteron A1100 Series SoC Launch PresentationAMD Opteron A1100 Series SoC Launch Presentation
AMD Opteron A1100 Series SoC Launch PresentationLow Hong Chuan
 
El Anglo-Sionismo controla Iberoamérica
El Anglo-Sionismo  controla IberoaméricaEl Anglo-Sionismo  controla Iberoamérica
El Anglo-Sionismo controla IberoaméricaRamón Copa
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final ReportArjan Gupta
 
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016Digiday
 

Destaque (12)

2016-11-11 08-32 página #6
2016-11-11 08-32 página #62016-11-11 08-32 página #6
2016-11-11 08-32 página #6
 
Marketing
Marketing Marketing
Marketing
 
First Day Of School (Ready, Set, Go!!!)
First Day Of School (Ready, Set, Go!!!)First Day Of School (Ready, Set, Go!!!)
First Day Of School (Ready, Set, Go!!!)
 
USHARANI R
USHARANI RUSHARANI R
USHARANI R
 
Presentation about SIBL
Presentation about SIBLPresentation about SIBL
Presentation about SIBL
 
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
[Webinar] Site24x7 - The All-in-One Monitoring Solution for DevOps & IT
 
Using Dialogue to Unleash Potential
Using Dialogue to Unleash PotentialUsing Dialogue to Unleash Potential
Using Dialogue to Unleash Potential
 
AMD Opteron A1100 Series SoC Launch Presentation
AMD Opteron A1100 Series SoC Launch PresentationAMD Opteron A1100 Series SoC Launch Presentation
AMD Opteron A1100 Series SoC Launch Presentation
 
El Anglo-Sionismo controla Iberoamérica
El Anglo-Sionismo  controla IberoaméricaEl Anglo-Sionismo  controla Iberoamérica
El Anglo-Sionismo controla Iberoamérica
 
AMD Radeon Instinct
AMD Radeon InstinctAMD Radeon Instinct
AMD Radeon Instinct
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
 
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
Inside NASCAR’s shift to digital, Digiday Brand Summit, December 2016
 

Semelhante a CYBER-i Corporate Dossier

Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate OverviewTawnia Beckwith
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdSabrina Chan
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonCloudFenceTechnologi
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonCloudFenceTechnologi
 

Semelhante a CYBER-i Corporate Dossier (20)

Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
ARITA Brochure
ARITA Brochure  ARITA Brochure
ARITA Brochure
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Goip Profile
Goip ProfileGoip Profile
Goip Profile
 
AWS Partners
AWS PartnersAWS Partners
AWS Partners
 
Microsoft Office 365
Microsoft Office 365 Microsoft Office 365
Microsoft Office 365
 
About graycon
About grayconAbout graycon
About graycon
 
Risk and Cyber Services in Gurgaon
Risk and Cyber Services in GurgaonRisk and Cyber Services in Gurgaon
Risk and Cyber Services in Gurgaon
 
Google Workspace Services
Google Workspace ServicesGoogle Workspace Services
Google Workspace Services
 
Azure Partners
Azure PartnersAzure Partners
Azure Partners
 
GCP Partner
GCP PartnerGCP Partner
GCP Partner
 
Microsoft Partner
Microsoft PartnerMicrosoft Partner
Microsoft Partner
 
Technology Advisory Services in Gurgaon
Technology Advisory Services in GurgaonTechnology Advisory Services in Gurgaon
Technology Advisory Services in Gurgaon
 

Mais de AGC Networks Ltd

AGC Networks' Corporate Presentation 2016
AGC Networks' Corporate Presentation 2016AGC Networks' Corporate Presentation 2016
AGC Networks' Corporate Presentation 2016AGC Networks Ltd
 
Hospitality Solution Offering - AGC Networks
Hospitality Solution Offering - AGC NetworksHospitality Solution Offering - AGC Networks
Hospitality Solution Offering - AGC NetworksAGC Networks Ltd
 
Information Tehcnology Infrastructure Library
Information Tehcnology Infrastructure LibraryInformation Tehcnology Infrastructure Library
Information Tehcnology Infrastructure LibraryAGC Networks Ltd
 
Information Security Management System
Information Security Management SystemInformation Security Management System
Information Security Management SystemAGC Networks Ltd
 

Mais de AGC Networks Ltd (7)

AGC Cloud Services_USA
AGC Cloud Services_USA  AGC Cloud Services_USA
AGC Cloud Services_USA
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
AGC Networks' Corporate Presentation 2016
AGC Networks' Corporate Presentation 2016AGC Networks' Corporate Presentation 2016
AGC Networks' Corporate Presentation 2016
 
AGC Fact Sheet
AGC Fact SheetAGC Fact Sheet
AGC Fact Sheet
 
Hospitality Solution Offering - AGC Networks
Hospitality Solution Offering - AGC NetworksHospitality Solution Offering - AGC Networks
Hospitality Solution Offering - AGC Networks
 
Information Tehcnology Infrastructure Library
Information Tehcnology Infrastructure LibraryInformation Tehcnology Infrastructure Library
Information Tehcnology Infrastructure Library
 
Information Security Management System
Information Security Management SystemInformation Security Management System
Information Security Management System
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

CYBER-i Corporate Dossier

  • 2. AGC Networks is a leading Global Solution Integrator. AGC delivers customized business solutions that help organizations accelerate revenue growth, increase market penetration, optimize operating costs and improve employee productivity by embedding Communications and securing their business processes. AGC Networks is a subsidiary of the Essar Group, a billion multi-national conglomerate, with business interests in Steel, Energy, Power, IT, BPO, Communication, Construction, Minerals, Shipping, Ports and Logistics. With a global client base and business operations spanning 20 countries including India, US, Canada, Costa Rica, UK, Kenya, South Africa, Sri Lanka, Philippines, New Zealand and Australia, the Essar Group continues to foray into new markets and business areas. Our philosophy of transparency combined with Essar’s vision, global scale and diversity, translates into new solutions & verticals, extended global reach and a much larger client base for AGC. 2 FIREWALL SPYWARE PASSWORD UPDATE VIRUS PHISING HACKER SPAM IDENTITY INTERNET AGC Quadrants CORPORATE INFORMATION ● IP Communications ● Collaboration ● Contact Center ● Multimedia Integration Unified Communications Network Infrastructure & Data Center ● UC Applications ● IoT ● Digital Applications ● CRM & ERP Integration Enterprise ApplicationsCyber Security ( ) ● Switching & Routing ● Wireless & Mobility ● Virtualization ● Data Center ● Audit & Risk Assessment ● Certification ● Application & Data Security ● SIEM & SCADA Capability
  • 3. 3 CYBER-i Managed Security Services Whether you’re faced with constraints on your IT budget, fighting the ever changing threat landscapes, or are looking to improve efficiency of compliance and security initiatives, we understand that business requirements can vary, hence, CYBER-i's Managed Security Services are designed to be flexible and adaptable. Threats are getting increasingly complicated while skills remain at a premium. Business imperatives like BYOD, social media, web applications and big data can pose risks as well as create inefficiencies if not properly managed. CYBER-i can help solve these challenges and close the gap – through OUTCOME BASED SERVICE OFFERING integrated technologies, unparalleled threat intelligence and highly flexible managed services designed to meet the unique demands of your business. Do Security Your Way AGC Network's CYBER-i services are designed to deliver just what's needed – whether it is helping you to install, configure and tune your solutions so that it can be controlled internally or managing a complete program for your organization. Elevate Your Security Posture Our expertise in high-value managed security services can take you beyond the basics. Sure, you may have your managed firewall covered, but we go beyond to secure your cyber space with advanced security requirements, like threat correlation and analysis, holistic application security, self-sealing BYOD protection, advanced anti-malware and more. Drive Intelligence Our analysts and engineers offer you the most advanced expertise and insight available in the security domain today. Trustwave performs threat research and analysis that can help you better understand, detect and prevent security breaches. In addition, we constantly feed the latest threat intelligence into all our services with our multisource Global Threat Database. Expert Support Our Security Operations Centres are staffed by experienced, well-trained and well-equipped security professionals. All of our security analysts hold the SANS / GIAC, GCIA (GIAC Certified Intrusion Analyst) certification. The team also holds a variety of security industry and product certifications such as CISSP, CCNA, CCSP, CCSE, CCSA, MCSE, etc. All of our security analysts have real-world network security experience which they leverage to fully investigate and analyze security activity. Our security analysts understand what’s at stake for your organization and conduct their duties with a singular purpose, to safeguard your IT environment. As part of Get Sustainable We are the experts in automation! With our cloud based management portal Trust Keeper, you get the ability to view your programs in real-time, access all your managed services, make support requests, see event history, run reports and manage your account, all through one easy-to use dashboard. CUSTOM MANAGED SERVICES CYBER-i helps augment your security strategy in key areas to help you evolve processes, elevate data protection or advance the way you manage threats. With deep security expertise and unmatched global threat intelligence, we can design a program that supports your specific needs, while giving you complete visibility and control. PACKAGED MSS BUNDLES Simplify your security program, operationalize your expenses and keep your team focused on business priorities. With packaged solution bundles, expert management and automated tools, we remove the day-to-day complexity of compliance and data protection, so you can get back to what you’re passionate about – your business.
  • 4. MANAGED SECURITY SERVICESMANAGED SECURITY SERVICES SIEM based Event Monitoring & Analysis I Performance Monitoring I Incident Management Alert & Notification I CXO Report I Compliance Report Security Solution Monitoring (On-site / Remote) Policy Management I Change Management I Configuration Management I Signature Updates Device Fine Tuning I Version Upgrade I Reporting Security Solution Management (On-site / Remote) Virus / Malware / Spyware Monitoring I Outbreak Prevention I Signature Updates I Compliance Management Deviation Reporting I Uniform Policy Management I Configuration Management Managed Endpoint Security Services Web Application Malware Monitoring I Web Application Malware I Malicious Code Sandbox Analysis Forensics & Malware ReportingAnti-Malware 4
  • 5. 5 SERVICES PORTFOLIO SOLUTION PORTFOLIO CYBER-i SOLUTIONS Portfolio Data Security • Advanced Threat Protection • Information Rights Management • Mobile Device Management • Vulnerability Management Application Security • Web Application Firewall • Database Access Management Advance Security • Network Immune System • ICS Security Identity & Access • Two Factor Authentication • Privilege Identity Management End Point Security • Antivirus, End Point Protection Network Security • Firewall • NG Firewall • IPS • UTM • Enterprise Security • IOT Security • Cloud Security Security Monitoring • SIEM • Data Leakage Protection • Network Access Control Audit • Vulnerability Assessment • Penetration Testing • Network Audits & Assessment, Security Audit • Application Audits & Source Code Review • Internal Audits • Digital Forensics Management • Compliance Mgmt • Security Operations Center Management • Vulnerability Management • Security Solutions Implementation & Management • Staff Augmentation Implementation • SIEM • APT • DLP • NAC • Bandwidth Management & WAN Accelerator • Wireless Security • Risk Management Compliance Tool CYBER-i SERVICES Portfolio Compliance • HIPAA • SOC 2 • Data Privacy • COBIT / ITIL Framework Certifications • ISO 9001 • ISO 20000 • ISO 22301 • ISO 27001 • PCI DSS • PA DSS
  • 6. CYBER-i has a pool of competent consultants in each of the areas of Governance, Risk and Compliance, Information Security Management, Service Management & Business Continuity Management, Product Deployment and OEM Certifications. With over 15 years experience, CYBER-i is well poised for taking assignments in the field of Security. • Consultants possess the contemporary best industry recognized certifications such as: - Compliance (CISA, CISM, CRISC, Lead Auditors and Implementers for ISO standards such as 9001, 20000, 22301 and 27001) - Technical (CEGIT, CEH, OCSP) - Various Vendor Certifications - PMP© • Consultants possess varied industry exposure in verticals such as Telecom, Manufacturing, Engineering, Oil & Gas, Automotive, Banking & Insurance, IT & ITeS and Government Enterprises. • Consultants have vast experience in implementing the management system frameworks, governance frameworks & maturity models as well as auditing the same. • Our successful track record is built upon a combination of diligence, flexibility and process expertize, all of which provides a thorough understanding of our clients’ needs. • Our Consultants have deep domain knowledge in Cryptography, Secure Network Implementation, Secure Software Development, Access Control, etc. which matters while assessing, discovering and providing solutions. • Our service delivery quality, competitive rates and our qualified personnel, combine to make us the right choice. CORE COMPETENCIES AGC CYBER-i SKILL MATRIX 6 ISO 27001 BS 25999 ISO 20000 SOX COBIT HIPAA PCI DSS SAS 70 Data Privacy ISO 9001 ISO 38500 OHSAS 18001 ISO 14001 4% 22% 14% 18% 4% 2% 9% 9% 3% 9% 2% 2% 2%
  • 7. CYBER-i strives to be a vendor agonistic security partner for our clients. However, to meet the operational requirements of the clients, CYBER-i has setup partnerships with many reputed OEM’s. Some of the leading partners include the following: 7 ASSOCIATIONS OEM PARTNERSHIPS • Vast experience of cross functional domains • Experience to handle very complex and large projects • Capable consultant with the ability to relocate at short notice and deliver best of quality, armed by the relevant qualifications and industry experience • An ISO 9001, SOC2 Type I and ISO 27001 certified company • Close association with the ISACA (USA) Pune and Mumbai chapters • Strong association with DSCI (Data Security Council of India) • Work closely with international management system certification bodies such as TUV (Germany), DNV (Norway) and BSI (UK) • Empaneled with Computer Emergency Response Team (India) as information security auditing organization OUR DIFFERENTIATORS
  • 9. 9 This is confidential and proprietary information of AGC Networks Ltd. Contact Us AGC Networks Ltd. Equinox Business Park, Tower 1, Off BKC, LBS Marg, Kurla (West), Mumbai - 400 070, Maharashtra, India T: +91 22 66617272 Ketal Sheth Cyber Security - Solution Architect ketal.sheth@agcnetworks.com T: +91 9833537390 E: info@agcnetworks.com | W: www.agcnetworks.com GLOBAL FOOTPRINT ABOUT AGC Global & India HQ US HQ AUSTRALIA - Melbourne - Sydney NORTH AMERICA Dallas - Florida - Minneapolis - Philadelphia KENYA - Nairobi ETHIOPIA RWANDA NIGERIA SOUTH AFRICA PHILIPPINES - Manila NEW ZEALAND - Auckland SAUDI ARABIA - Riyadh UAE - Dubai INDIA > Mumbai - Bangalore - Chennai - Gandhinagar - Gurgaon - Hyderabad - Kolkata - Pune SINGAPORE UK - London AGC Networks (AGC) is a Global Solution Integrator representing the world’s best brands in Unified Communications, Network Infrastructure & Data Center, Cyber Security (CYBER-i) and Enterprise Applications to evolve the customer’s digital landscape. AGC’s ability to tailor solutions across quadrants is strengthened through delivery of seamless customer support services. A leader in Enterprise Communications in India, AGC has significant presence across Middle East, Africa, North America, Australia, New Zealand, Singapore, Philippines and UK serving over 3000 customers. In collaboration with global technology leaders like Avaya, Intel Security, Juniper, Cisco, Shoretel, HP, Verint and Polycom among others, AGC delivers Return on Technology Investment (ROTI) thereby accelerating customers’ business.