SlideShare uma empresa Scribd logo
1 de 25
Cyberscout – Corporate Security Monitoring


  Executive Briefing, July 2009
  E     i B i fi J l 2009
Development 
                                         Development

Cyberscout is the most advanced product in its category

     •   First in the world to interrogate 1G and 10G barriers in real‐time 

     •   Real‐time monitoring and alert for suspected activities, email and internet traffic 
         Real time monitoring and alert for suspected activities email and internet traffic

     •   Automated  isolation of confidential material and in transit data 
•   Internet access is a must for employees
    Internet access is a must for employees
•   Internet provides various modes for information exchange
     •   Mails
     •   Chats
     •   File transfer
•   High speed internet aids in transferring data faster
    High speed internet aids in transferring data faster
•   Internet user can remain anonymous
•   Threat of Trojans
•   All these can be misused to leak sensitive data
How to prevent Data misuse
•   Have data leakage prevention tools
                   g p


     •   Monitor internet traffic going out


     •   Block internet content with sensitive information
What all can be prevented
                                                 p


•   An employee sending out


     •   Parts of a design document
         Parts of a design document


     •   Parts of a design diagram


     •   Customer details from a database tables


     •   Credit card numbers of the customers from a database


     •   And many more
Mode of operation

•   Active Mode

     •   All internet traffic are intercepted and examined real time

     •   Suspicious traffic are blocked

•   Forensic mode

     •   All traffic is logged

     •   The traffic flow is not intercepted
         Th t ffi fl      i    ti t      t d

     •   Continuous logging of traffic for offline analysis

     •   No blocking of suspicious traffic only storing
Implementation in active mode


                                     Proxy
                                     Server
                                     Se e
        Router / switch

                                                           Internet


                    Content Monitoring
                    device




USERS

                                              Monitoring
                                              person
Implementation in passive mode


                               Proxy
         Router / switch       Server
                               Se e


                                                     Internet




USERS
          Content Monitoring
                                        Monitoring
          device
                                        person
Using the system
•   Prevent leakage of classified information 
      e e t ea age o c ass ed o at o

     •   Any document, word, pdf, text, xls, ppt

     •   Any image, JPEG, JIF
         A i        JPEG JIF

     •   Database tables

•   Identify objectionable internet usage

     •   Keywords

•   Monitor a troublesome user

     •   Email address

     •   Chat address
Using the system
•   Getting trends of internet operation
    Getting trends of internet operation

     •   Mails send for organization domain to outside

     •   Mails send from public email ids

•   Continuous logging of outward traffic

     • Log all mails send

     • L
       Log all blog entries
            ll bl     ti

     • Log all attachments
How it works

Classified     Finger prints of
                                           Stored in the
documents      the documents
                                           database
uploaded       made




Data           Data broken        Each small part          Data matching
transmitted    into small         compared against         the thresh hold
over the net   parts              the finger print in      are retained
is extracted                      Database
Security of the system
                                             y         y



•   Three level of users

     •   Lower level login sees only the gist of the information
         Lower level login sees only the gist of the information

           • Creates reports

           • Receive alerts

     •   Higher level login 

           • Sees details of messages

           • Configures the system

     •   Super User login 

           • Sees clear text passwords
             Sees clear text passwords

•   Data stored in encrypted format
Features to guard the internet

•   Emails / Chats

         Reports all mails going from organization domain to other web mails and vice versa

         Reports all the instances of usage of public mails like gmail, yahoo etc.

         Logs mails sent by particular user address / IP 

         Search feature to find emails send/received from particular Address

         Generate Reports on basis of Email records stating number of Attempts made to leak the information and by 
         whom which can be used for FORENSIC analysis

         Statistics about number of filters matched for particular timeframe
Features of the system



Print detailed report about particular Email, which can be used for evidence of leaking information

Flexible CASE feature ,to classify the similar type of records

Transaction log for each email ,  which gives the percentage match statistics with the confidential documents

Record Statistics , which gives the information about the filters matching with particular record.

Generate Reports on basis of Email records stating number of Attempts made to leak the information and by 
whom

Statistics about number of filters matched for particular timeframe
Features of the system


Any machine generating spam mails (infected with Trojans)

All mails from a sensitive sub domain (research, testing groups)

Automatic upload of files

Automatic tracking of database changes.
Features of the system

•   Alert Mechanism
    Al M h i

         Cyberscout sends alert when a particular condition or type of records is captured.

     •   Administrator can customize his own Alert condition 

         Sends Alert on Specified Email addresses

     •   For Example :

           • If   any email send to <Particular Id>  Send ALERT
              f     y

           • If any email contains words like “Confidential” , “copyright”  send ALERT

           • If any Email Attachment contains words like “CV” , “Resume”  send ALERT

           • If   email Id contains <Competitor Domain >  Send ALERT
Features of the system


  Joint Alerts : we can specify more than one condition for alerts

For Example :
                                      If

                   any email send to <competitors domain>

                                  Or / and

                          Email contains Attachment

                                  Or / and

                Attachment contains words like “CV” , “Resume”

                                    Then

                 send Alert on <admin@CyberscoutUser.com>
Features of the system
•   Customizable reports
    Customizable reports

        Blacklist Domain : Report based on how many communication happened with Competitor 
        Domain Id s and by whom
        Domain Id’s and by whom

        Traffic Type : Report based on traffic , which gives summary of HTTP traffic statistics , CHAT , FTP 
        , POP/SMTP
          POP/SMTP

        Daily Statistical reports : classified report containing number of records captured in last 24 hrs

        Protected files : Report stating , how many times particular file is tried to leaked out and by 
        whom

        Filters (keywords, email id) : Reports indicating, how many times the filter occurred in the 
        records
Features of the system


Filters (keywords, email id) : Reports indicating, how many times the filter occurred in the 
records

IP Address / IP Ranges : Summary of records originated or send to particular IP/IP Range

Classified file Priority level : Report on records which are captured for leaking confidential 
contents above priority level

Domain type : Report based on Number of records belongs to particular domain 

Attachment type : Report based on Email with Attachment , which can be further classified on 
Attachment type (Doc,Xls,pdf,ppt,rtf,etc..)
Features to augment existing defense
                                       Free email sites
                                       F       il i


•   URL filters do not do deep packet inspection to identify free email sites


•   They depend on a predefined database
     h d      d         d f dd b


•   New mails sites comes up every day in different corners of the world
    New mails sites comes up every day in different corners of the world


•   A fraudulent employee needs just one site to do the leakage
                   p y          j                            g


•   Cyberscout can detect these leakages
Features to augment existing defense – Proxy sites

•   URL filters do not do deep packet inspection to identify proxy sites


•   They depend on a predefined database
     h d      d         d f dd b


•   New proxy sites comes up every day in different corners of the world
    New proxy sites comes up every day in different corners of the world


•   A fraudulent employee needs just one site to access his web mails
                   p y          j


•   All popular emails sites like yahoo, gmail etc can be accessed using this method


•   Cyberscout can detect these leakages
Features to augment existing defense – File sharing sites

•   URL filters do not do deep packet inspection to identify file sharing sites


•   They depend on a predefined database
     h d      d         d f dd b


•   New file sharing sites comes up every day in different corners of the world
    New file sharing sites comes up every day in different corners of the world


•   A fraudulent employee needs just one site to upload sensitive information
                   p y          j                 p


•   Cyberscout can detect these leakages
How Cyberscout can strengthen security

•   Using deep packet inspection it can
     •   Identify any user accessing free webmail sites.
     •   Identify any user accessing proxy sites
         Identify any user accessing proxy sites
     •   Identify any user accessing file sharing sites


•   The list provided by Cyberscout can be used by the URL filters to block the sites
     • Makes lives difficult for fraudulent users


•   Cyberscout can also capture and store the mails with its attachments for further 
    analysis.
    analysis


•   Cyberscout can monitor the entire internet activity of an employee who tries these and 
    can be alerted
Identify and detect leakage through own mail domain

•   Define heuristics to reduce mails to be analyzed 
     • Mails send to outside domain only
     • Mails with Bcc content
          l     h
     • Mails with password protected files
     • Mails with short message or subject line
       Mails with short message or subject line


•   Apply leakage detection logic on the above mails
     pp y      g              g
     •   Apply keywords
     •   Apply logic to find attachments with customer names, marketing information, financial 
         information
     •   Apply keywords to find indecent content


•   Cyberscout can reduce the mails to be analyzed from 1000 per hour to less than 20 per 
    hour
Get birds eye view of the mail usage

•   Get reports on
     •   Mails send to competitor domain
     •   Mails send from a group (research, sales)
         Mails send from a group (research, sales)
     •   Mails with attachments
     •   Mails with short  messages
     •   Mails send with password protected files
     •   Various attachments


•   Use these reports 
     •   Narrow down on the suspects
     •   Reduce analysis time
Why us

•   Indigenous product and can be customized for your needs
    I di          d      d     b        i df             d

•   Over 7 years of experience in internet monitoring

•   Prime mover in the internet monitoring space

•   First deployment in 2002
    First deployment in 2002

•   Over 40 high end deployments in UK , US and outside

•   First product to break 1G and 10G barrier in the world

•   Over 10 deployments of 1G systems
    Over 10 deployments of 1G+ systems

Mais conteúdo relacionado

Mais procurados

PP for E-Certificate Issuance System
PP for E-Certificate Issuance SystemPP for E-Certificate Issuance System
PP for E-Certificate Issuance SystemSeungjoo Kim
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationSam Bowne
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricsMayank Diwakar
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationSam Bowne
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...Sam Bowne
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionSam Bowne
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionSam Bowne
 
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineDEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineFelipe Prado
 
CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3Sam Bowne
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologySam Bowne
 
Ch 6: Attacking Authentication
Ch 6: Attacking AuthenticationCh 6: Attacking Authentication
Ch 6: Attacking AuthenticationSam Bowne
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 

Mais procurados (18)

PP for E-Certificate Issuance System
PP for E-Certificate Issuance SystemPP for E-Certificate Issuance System
PP for E-Certificate Issuance System
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mineDEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
DEF CON 27 - ZHANG XIANGQIAN AND LIU HULMING - your secret files are mine
 
CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
 
Ch 6: Attacking Authentication
Ch 6: Attacking AuthenticationCh 6: Attacking Authentication
Ch 6: Attacking Authentication
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 

Semelhante a Cyberscout Corporate Security

Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout PresentationFiroze Hussain
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsNetFort
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsPrecisely
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingPrecisely
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisManageEngine, Zoho Corporation
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...Ruby Meditation
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 

Semelhante a Cyberscout Corporate Security (20)

Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Forensic tools
Forensic toolsForensic tools
Forensic tools
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Monitorium DLP
Monitorium DLPMonitorium DLP
Monitorium DLP
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Ids
IdsIds
Ids
 
arun.ppt
arun.pptarun.ppt
arun.ppt
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 

Mais de Firoze Hussain

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Hussain
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012Firoze Hussain
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securityFiroze Hussain
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...Firoze Hussain
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementFiroze Hussain
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011Firoze Hussain
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11Firoze Hussain
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Firoze Hussain
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011Firoze Hussain
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfFiroze Hussain
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Firoze Hussain
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port SecurityFiroze Hussain
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11Firoze Hussain
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorFiroze Hussain
 
PPE &amp; Welding Accessories 2011
PPE &amp; Welding Accessories 2011PPE &amp; Welding Accessories 2011
PPE &amp; Welding Accessories 2011Firoze Hussain
 

Mais de Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security Pdf
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
PPE &amp; Welding Accessories 2011
PPE &amp; Welding Accessories 2011PPE &amp; Welding Accessories 2011
PPE &amp; Welding Accessories 2011
 

Cyberscout Corporate Security