2st.net corporate overview 2012

10
COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC Since 1998 Corporate Overview

Upload: chohl

Post on 14-Jun-2015

102 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC Since 1998

CorporateOverview

Page 2: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

About Us๏Founded in 1998.๏We provide thoughtful solutions around:

๏Information Security๏Network Infrastructure๏Other: (Business Process, Application Performance Management,

802.11, Mobile Device Management)

๏Services include: ๏Consulting, Design and Implementation

๏Project scalability, ranging from:๏Single location trials, to๏Global enterprise wide deployments

2

Page 3: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

Methodologylisten

1

After assessing potential solutions which may include the evaluation of several technology vendors we then work with our clients collaboratively to increase their overall awareness and educate them on the most relevant solutions available

educate2With our clients speci!c business objectives in mind, 2ST.net will then generate a proposed solution comprised of the selected technology and services required to meet their speci!c business objectives.

select 3

1

3 2

3

We continuously listen to our clients as we explore and evaluate the rapidly evolving technologies related to information security, network infrastructure and those solutions that will support underlying business processes and provide a competitive advantage for our clients.

Page 4: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

๏ Listening to clients is our !rst priority, it is the starting point for exploring the range of technologies available, not pre-existing vendor relationships

๏ We have been evaluating technologies and applications related to Information Security, Network Infrastructure and Business Processes for nearly 15 years...

๏ Understanding the nuances of products and support offered by a variety of vendors enables us to create unique solutions that are directly relevant to the objectives our client organizations face every day

4

We continuously listen to our clients as we explore and evaluate the rapidly evolving technologies related to information security, network infrastructure and those solutions that will support underlying business processes and provide a competitive advantage for our clients.

listen

1

Page 5: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

๏ Over a decade of experience collaborating with clients and partnering with technology companies provides a greater context of understanding

๏ When presenting potential solutions, we consider the ‘ripple-effect’ - increasing our client’s overall awareness:๏ Legal implications - HIPPA, GLBA, SOX, FRCP and PCI to name a

few๏ Best Practices - NIST, NSA, DoD, SANS, ISO, ITIL, Cobit to name a

few๏ We craft technology solutions to deliver optimum business value

๏ GIAC GSEC Gold Certi!ed consulting

5

After assessing potential solutions which may include the evaluation of several technology vendors we then work with our clients collaboratively to increase their overall awareness and educate them on the most relevant solutions available.

educate

2

Page 6: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

๏ The best solution includes-๏ A technology that has been proven to meet and/or

exceed the necessary criteria arrived at together with the client

๏ An implementation and support plan that prevents unwelcome surprises and maximizes the ROI

๏ A training program that ensures optimal use and enablement of the newly purchased technology

๏ A !nancial assessment of the proposed investment that meets or exceeds the client’s requirements and considers risk variables

6

With our clients speci!c business objectives in mind, 2ST.net will then generate a proposed solution comprised of the selected technology and services required to meet their speci!c business objectives.

select

3

Page 7: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC 7

-Evaluating technologies for over a decade-Network Infrastructure Information Security Business Process

Page 8: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

Some of Our Customers

8

Page 9: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC

Partial List of Projects

9

๏Access Control

๏WAN Optimization

๏SIM & SEM

๏Encryption๏Data at rest๏Data in motion๏Email

๏NAC

๏ Identity Management

๏SaaS (Security as a Service)

๏Application Security

๏Wi-Fi security initiatives

๏ Intrusion Prevention๏Application and Network

Performance monitoring๏Data Loss Prevention๏High Availability

๏Endpoint Security

๏Con!guration Management

๏Security Assessments

๏Architecture Review

Page 10: 2ST.net Corporate Overview 2012

COPYRIGHT©2012 All Rights Reserved, Systems Solutions Technologies, LLC Since 1998

Contact Us Today615.656.8428

www.2ST.net

BuildingLong-Term Relationshipswith Our Clients