SlideShare uma empresa Scribd logo
1 de 33
Company Overview 
www.dts-solution.com 
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
DTS Solution
DTS Solution- Overview 
DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. 
We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. 
DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. 
The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
DTS Solution - Vision 
Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
DTS Solution - Services 
www.dts-solution.com 
PRE-SALES SERVICES 
STRATEGIC CONSULTING 
PROFESSIONAL SERVICES 
COMPLIANCE CONSULTING 
SECURITY ASSESSMENT
DTS Solution - Domains
Network Security
Data Security
Infrastructure Security
System Security
Application Security
Mobility / Wireless Security
Compliance Monitoring
Advance Threat Protection
Telecom Security
Cloud Security
SCADA / ICS Security
Security Operations Center
DTS Solution – Technology Partners
DTS Solution – Key Differentiators 
HIGH TECHNICAL COMPETENCY AND EXPERTISE 
TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS 
DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING 
BOTTOM-UP ORGANIZATION
DTS Solution – Services
DTS Solution – Service Offering 
Presales Services 
 RFP and RFI Documentation Services 
 Technical Requirements Gathering 
 Vendor Selection Process
Professional Services Architectural Design 
 Information Security Consulting 
 Documentation Services 
 Security Architecture Design 
 High Level Design 
 Low Level Design Deployment, Implementation and Operate 
 Implementation Services 
 Firewall Migration Services 
 Information and Service Flow Analysis 
 Network Security Audit On-site support 
 Resident Engineering Services 
DTS Solution – Service Offering
DTS Solution – Service Offering 
Information and Service Flow Analysis
DTS Solution – Service Offering 
Strategic Consulting 
 Capacity Planning 
 Cloud Computing Macroeconomics 
 Infrastructure Monitoring 
 IPTV Security Assessment 
 IPv4 to IPv6 transition 
 IPv6 Security 
 Management and Provisioning Platforms 
 Security Services Monetization
•ISO27001 
•ISA-99 / IEC-62443 
•PCI-DSS 3.0 
•Cloud Security Alliance – STAR 
•ADSIC – Abu Dhabi 
•ISR - Dubai
DTS Solution – Assessment Services 
Security Assessment Services 
Penetration Testing and Vulnerability Assessment 
Black Box Ethical Testing 
Vulnerability Management 
Unified Communications Audit 
VoIP / UC / Tele-presence security 
SCADA Security Evaluation Toolkit 
Industrial Control Systems Security Readiness 
Mobile Network Security 
UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce 
Fixed Mobile Convergence – SeGW and IMS Security 
Endpoint IP Discovery and Network Leakage Detection 
Rogue and Unknown Network Detection 
Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) 
Availability Assessment 
DDoS Protection – Botnet / Zombie Detection 
Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation 
Core Network Security 
MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion 
VPLS – Spanning Tree, ARP poisoning, MAC spoofing 
Social Engineering and Physical Security Review
DTS Solution – Some Key Facts +
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
DTS Security Research Labs – http://labs.dts-solution.com
DTS Solution – Some Key Facts + 
•UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure 
•Development of a Security Operations Center for the largest O&G company worldwide 
•Design and Deployment of largest NAC solution in the Middle East 
•Middle East’s first Security Architecture integrating with SDN based Fabric Data Center 
•Development of SCADA/ICS Security Operations Center 
•Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR 
•Largest Firewall Management and Compliance Solution Deployment in the region 
•Security Design of Largest ISP data centers in the region (80 racks) 
•Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services 
•Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure 
… and more…..
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Mais conteúdo relacionado

Mais de Shah Sheikh

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingShah Sheikh
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 

Mais de Shah Sheikh (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 

Último

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

DTS Solution - Company Profile

  • 1. Company Overview www.dts-solution.com Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
  • 3. DTS Solution- Overview DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
  • 4. DTS Solution - Vision Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
  • 5. DTS Solution - Services www.dts-solution.com PRE-SALES SERVICES STRATEGIC CONSULTING PROFESSIONAL SERVICES COMPLIANCE CONSULTING SECURITY ASSESSMENT
  • 6. DTS Solution - Domains
  • 17. SCADA / ICS Security
  • 19. DTS Solution – Technology Partners
  • 20. DTS Solution – Key Differentiators HIGH TECHNICAL COMPETENCY AND EXPERTISE TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING BOTTOM-UP ORGANIZATION
  • 21. DTS Solution – Services
  • 22. DTS Solution – Service Offering Presales Services  RFP and RFI Documentation Services  Technical Requirements Gathering  Vendor Selection Process
  • 23. Professional Services Architectural Design  Information Security Consulting  Documentation Services  Security Architecture Design  High Level Design  Low Level Design Deployment, Implementation and Operate  Implementation Services  Firewall Migration Services  Information and Service Flow Analysis  Network Security Audit On-site support  Resident Engineering Services DTS Solution – Service Offering
  • 24. DTS Solution – Service Offering Information and Service Flow Analysis
  • 25. DTS Solution – Service Offering Strategic Consulting  Capacity Planning  Cloud Computing Macroeconomics  Infrastructure Monitoring  IPTV Security Assessment  IPv4 to IPv6 transition  IPv6 Security  Management and Provisioning Platforms  Security Services Monetization
  • 26. •ISO27001 •ISA-99 / IEC-62443 •PCI-DSS 3.0 •Cloud Security Alliance – STAR •ADSIC – Abu Dhabi •ISR - Dubai
  • 27. DTS Solution – Assessment Services Security Assessment Services Penetration Testing and Vulnerability Assessment Black Box Ethical Testing Vulnerability Management Unified Communications Audit VoIP / UC / Tele-presence security SCADA Security Evaluation Toolkit Industrial Control Systems Security Readiness Mobile Network Security UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce Fixed Mobile Convergence – SeGW and IMS Security Endpoint IP Discovery and Network Leakage Detection Rogue and Unknown Network Detection Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) Availability Assessment DDoS Protection – Botnet / Zombie Detection Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation Core Network Security MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion VPLS – Spanning Tree, ARP poisoning, MAC spoofing Social Engineering and Physical Security Review
  • 28. DTS Solution – Some Key Facts +
  • 29. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 30. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 31. DTS Solution – Some Key Facts + DTS Security Research Labs – http://labs.dts-solution.com
  • 32. DTS Solution – Some Key Facts + •UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP •Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP •First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure •Development of a Security Operations Center for the largest O&G company worldwide •Design and Deployment of largest NAC solution in the Middle East •Middle East’s first Security Architecture integrating with SDN based Fabric Data Center •Development of SCADA/ICS Security Operations Center •Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR •Largest Firewall Management and Compliance Solution Deployment in the region •Security Design of Largest ISP data centers in the region (80 racks) •Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services •Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure … and more…..
  • 33. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Notas do Editor

  1. DTS Solution’s vision is based on simple ethos, our primary objective is to be seen as a trusted security advisor within the information and network security field. Providing best-in-class security services to your organization our aim is to ensure complete client satisfaction not only during project engagement but more importantly after the project delivery lifecycle.Providing a high degree of client confidence and assurance, value based security services, lateral security consulting approach and innovating in the security industry are a few of our key goals.Security is a dynamic operation and DTS is no different; our organization ethic is based on its ability to be elastic in nature and adapt to market needs. As we develop a strong portfolio of established technology vendors and niche security industry players, DTS is committed to provide a complete end-to-end solution delivery; ranging from pre-sales to post-sales services.
  2. Juniper – Network & SecurityFortinet – Security, UTM Specialist, Mail, Web, DBRadware – Application Delivery, Former AlteonLoadbalancerSipera – VOIP SecurityArbor Networks – DDOS, Traffic Management and VisualiztaionPalo Alto – Next Generation Firewall, Application ControlRadisys – Mobile Security, LTE, 3G, FemotocellFireEye – Malware Protection