company profilenexfort.com/assets/company-profile-final-01.pdfconfiguration review during a setup...

25
COMPANY PROFILE

Upload: others

Post on 31-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

COMPANY PROFILE

Page 2: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

OBJECTIVE AND VISION

OBJECTIVE VISIONWe have separated ourselves from the challenge through our une-qualed specialized skill, created by a stringent procuring process, continuous speculation into trainings and confirmations and de-velopment of a workforce that gloats from specialized to deals proportion. We do this while giving every minute of every day nearby help administrations and same day equipment substitu-tion for all items.

We buckle down to keep up our situation as the local's driving sup-plier of digital security arrangements, administrations and consul-tancy. By continually observing security patterns and their effect, we improve and redesign our portfolio. As a progressing proce-dure, we recognize and band together with new and creative inno-vation sellers and are continually augmenting the degree and breath of our administrations portfolio.

Our vision is to become one of the top System Integration compa-nies in the MENA region by providing the best professional services and managed operations in technology domains like Network Se-curity, private and public Virtualization, Cloud Computing and many more to enable our customers to focus on their core busi-nesses. With a pool of technology experts, we are ready for any project in the region on a moment’s notice.

Page 3: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

IMPLEMENTATION SERVICES

Nexfort utilizes an enormous group of Security Specialists who have broad involvement in executing inventive security arrangements. We can help our clients in executing coordinated arrangements that consolidate the best type of point items from our arrangement of market driving security innovations. This implies Nexfort can convey turn-key security arrangements and founda-tion ventures covering all stages from conceptualization and arranging, to ex-ecution and activity.

With our laser center around accomplishing the most astounding conceivable specialized capacities in every one of our center inno-vations, we can convey specialized usage benefits that are in ac-cordance with the most elevated principles accessible in the busi-ness. We are fit for undertaking full ventures all the way, or connecting with at any period of an on-going or finished task to include our ability and one of a kind worth. Any enormous scale venture we convey carefully pursues Nexfort venture the board system guaranteeing auspicious finishing and an unmistakable effect examination of any progressions to structure, scope or whatever other changes that may surface during the life of a task.

Page 4: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

SECURITY ARCHITECTURE REVIEW

With various fruitful huge scale security foundation usage, Nexfort is very much situated to approve whether a client's current securi-ty engineering adjusts to known prescribed procedures and meas-ures.

Our accomplished specialists can check that the engineering presently conveyed does in reality meet with the aims of its plan.

Through thorough testing and assessment, we confirm that ad-ministrations and applications are following prescribed proce-dures and give exhortation on the expected changes to upgrade the framework's versatility against digital assaults.

Examples of services which our architecture review covers:

3 tier application architecture for critical applications including valida-tion of security policies between application tier zones.

Internal and external authoritative and cache forwarding DNS infra-structure.

DNSS readiness.

Zero-trust user architecture.

Wireless security and best practices.

Page 5: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

CONFIGURATION REVIEW

During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide and local systems, for example, - ISO27001.- National Cert

Besides, we check that general activity of gadgets, for example, approv-ing framework updates is performed accurately. Our design audit can be performed on the application and servicer foun-dation just as on framework segments.

Page 6: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

IT SECURITY TRAINING

With Nexfort modified security trainings, customers are furnished with a helpful and thorough approach to refresh their IT groups on the most recent improvements influence the innovations they have conveyed.

We convey trainings on the most pertinent parts of IT security, for example, web-application security where we spread what a web-application is, the normal issues in web-applications, and the common assault situations.

The difference is that our trainings spread the territories not addressed in item determined trainings which only spotlight on the operational side of dealing with an answer, yet neglect to address why an answer is really re-quired.

Page 7: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

PRODUCT ENHANCEMENTS

Through our emphasis on incorporating various items into a full start to finish arrangement, Nexfort has built up the remarkable capacity to tweak and coordinate into the diverse application program interfaces (API's) un-covered by the various arrangements.

For instance, this could be computerizing assault data from a SIEM answer for drive the programmed tuning of a firewall strategy.

Page 8: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

CUSTOMER & ORGANIZATION PROFILE

The Middle East has a remarkable Economy generated from the Telecom and Banking Sectors.

Offering an MSSP Services can be a B2B Approach with a Selected Customers by being informed of the Following info:

Relevant job titlesKey responsibilitiesMemberships and clubs e.g. Chamber of CommerceChannels attended e.g. phone, email, LinkedIn, TwitterCompany size by annual revenueCompany size by number of employeesRelevant Industries e.g. professional services, business services 

Page 9: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

NEW BUSINESS ACQUISITION STRATEGIES & TACTICS

Below are 3 strategies for our B2B sales operation:

Send no less than x letters of introduction to new prospects each week.Make no less than x cold calls of introduction to new prospects each week.Make no less than x face-to-face contacts with new prospects each week.Create no less than x proposals each week.Make no less than x pitch presentations each week.

Obtain referrals from new customers.Follow-up each of my new customers to ensure that they are de-lighted with the product or service that we have sold them.If they are not delighted we will aim to resolve this so that I can go back to seek customer referrals at a later date.If they are delighted, we will ask them to at least 3 customer referrals.

Page 10: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

EXISTING CUSTOMER BUSINESS STRATEGIES & TACTICS

Create a touch-point program.Contact each of our existing customers or Partners no less than once per month with a new idea they cannot get from anyone else.Create a user-group within our existing customer base.Take customers to lunch each month and invite a customer prospect to join us. (This can be under the Marketing Event or any Forum Spotlight we might organize later on) 

Create a touch-point program.Contact each of our existing customers or Partners no less than once per month with a new idea they cannot get from anyone else.Create a user-group within our existing customer base.Take customers to lunch each month and invite a customer prospect to join us. (This can be under the Marketing Event or any Forum Spotlight we might organize later on) 

Page 11: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

SALES, METRICS & KPIS

The key metrics that the sales will be measured on:

Conversion rates for each stage in your sales processThe reasons for sales opportunities being lost at each stageHow long it takes for a sales opportunity to pass through each stageThe win rate i.e. the percentage of all leads that convert into salesPipeline creation Profit/Revenue Generation

Page 12: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

CYBER SECURITY ANALYSIS

Page 13: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

EXTERNAL / INTERNAL VA / PT

The initial step to surveying how verify a framework is, is to play out a de-fenselessness evaluation/infiltration test on it. Our security experts are pre-pared moral programmers who will perform assaults on your foundation so as to:

Uncover any security blemishes you have in your association Test the viability of your security controls Identify the development of your episode reaction process Structure a definite arrangement on the best way to fix the most basic issues in your system

These appraisals can be directed from both an outside angle, to imitate the assaults that programmers will issue against your association, just as an inward point of view; whereby we copy what an infection or a displeased worker could do to your association. While a weakness appraisal focuses on your whole IP extend, be it inside or outer, an entrance test reveals nu-merous manners by which an aggressor can access your system and by abusing various vulnerabilities, complete assume control over your frame-work.

As opposed to our rivals, we don't exclusively depend on apparatuses how-ever rather pursue a stringent manual technique that gives a 360-degree perspective on your security controls.

Page 14: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

MOBILE APPLICATION HACKING

it has been standard over the business to center the structure of portable applications around ease of use and execution, keeping security low on the rundown of concerns. This has enabled programmers to misuse this new channel and cause enormous reputational and additionally money related effect.

Our examiners investigate each part of your application for its security power. When done, we give you a report that contains point by point clarifi-cations on the most proficient method to sidestep your security controls, and gives a remediation way that incorporates the progressions required to dispose of those vulnerabilities.

Page 15: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

DETAILED WEB ASSESSMENT

Regardless of whether outside gatherings utilize your site to book, request or essentially counsel your items or administrations, the trustworthiness of its administrations and data should consistently be kept up. Our prepared moral programmers can physically survey your web application for security vulnerabilities that may have creeped in during its improvement, regardless of whether it was created in-house, by an outsider or is a business applica-tion.

By expecting various jobs, we can evaluate the whole usefulness of the web application and reveal any current or potential security blemishes. Our re-ports not just show how these vulnerabilities can be misused, they addi-tionally demonstrate the important code changes or arrangement re-freshes that are required to keep your data secure.

Page 16: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

WIFI HACKING

During WiFi hacking, we perform multiple attacks to:

Test the strength of your wireless securityTest the network setup of your public WiFi networksTrick your employees by imitating legitimate WiFi networks

These attacks are done on-premise by our security auditors who have been actively involved in wireless security in the open source community. We assess how secure your setup is, and provide a report with detailed instructions on how to improve your WiFi security posture.

Page 17: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

SOCIAL ENGINEERING AND EXPLOITATION

During social building assaults, our examiners will attempt to pick up as much data about your association, and assault your representatives so as to:

Increase remote access to your framework Increase login qualifications Get delicate, aggressive data

This is done in a controlled way, and we utilize exceptionally advanced, in-house created devices to encourage this evaluation. These copy the devices and strategies utilized by modern programmers when they direct focused on assaults against your association.

Page 18: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

SOURCE CODE REVIEW

Our source code audit guarantees that all security blemishes, and poten-tial defects, are fixed before they are even pushed into a generation situa-tion.

By checking your application's source code with a few distinct motors, and by confirming and investigating each bug found, our prepared specialists, who all have a broad advancement foundation, guarantee that each bug is certainly not a bogus positive, break down its potential effect when abused and decide how to fix it.

Moreover, we break down the present advancement lifecycle that you have and exhort what ought to be tried and at what stages.

Page 19: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

HACK ON-DEMAND

To handle the run of the mill difficulties that IT divisions face with verifying endorsements from the executives, Nexfort offers an adaptable on-request administration, whereby clients can buy various man days which can be used at a later stage. This is particularly helpful when courses of events are forceful and adaptability is required.

Our on-request administration involves all our security examination's ad-ministrations, and is given a similar quality and meticulousness that is uti-lized something else.

Page 20: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

PERIODIC ASSURANCESECURITY SERVICES

Our intermittent confirmation security administrations, contracted to PASS, permits an occasional security survey of your predetermined targets. Our security specialists will test the pieces of your foundation or applications that you determine at predefined interims. This uncovered security vulnera-bilities, yet in addition demonstrates the viability of your remediation the ex-ecutives.

Breaking down all reports will demonstrate how well your IT groups are making up for lost time with new vulnerabilities, and how rapidly they are fixing the old ones.

Page 21: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

CYBER SECURITY INTEGRATION

Page 22: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

Information Security Risk Management provides a detailed articulation of the risks associated with the information assets and supporting ICT resources, threats that could adversely impact those assets, and vulnerabilities that could allow those threats to occur

with greater frequency or impact.

Nexfort’s Strategic Security consultants follow proven methodologies to design and develop the Risk Management Framework specific to each client and to deliver effective information security risk assessments for them.

Information Security Assurance extends the value of information security by adding reliability and

emphasizing strategic risk management with regards to

information security.The Information Security Assurance

service includes additional aspects of corporate governance such as Data Privacy, Compliance, Audits, Business Continuity, and Disaster

Recovery.

Nexfort’s offer for Data Security Administration and Consistence depends on our exceptional Administration and Affirmation System, which guarantees that data security pursues a hazard based and data driven methodology, to meet an association's particular needs and consistence necessities.

Hierarchical structures, jobs and duties, execution estimation, characterized undertakings, and oversight components should be easily incorporated with the association's business to lift the dependability of its data resources.

Nexfort has developed its own methodology regarding Information Security Awareness which makes sure that each information security awareness campaign we deliver is customized to the needs of each particular operating environment, and accounts for the latest cyber

security trends and threats.

Risk Management Risk ManagementInformation Assurance &

Business ResiliencyAwareness & End User

Education

Page 23: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

Through our focus on integrating a number of products into a full

end-to-end solution, Nexfort has developed the unique ability to

customize and integrate into the different application program

interfaces (API’s) exposed by the different solutions.

Assuring Information security is a continuous process that requires

specialization and expertise in order to be effectively

implemented.

Nexfort offers both specialization and expertise on an on-going basis,

assisting organizations to effectively manage their information security risks.

With this offering, Nexfort aims at assisting organizations in areas

where they are missing expertise or resources. The services of this category are offered either on demand or as part of a frame

agreement.

Automation of the Governance, Risk Management and Compliance

(GRC) process within an organization is considered as an important aspect of the effective

implementation of Information security.

Nexfort offers the maximum automation of GRC processes, combining Strategic Security

Consulting Services and implementation of GRC process

automation solutions.

Nexfort is well positioned to validate whether a customer’s existing

security architecture conforms to known best practices and

standards. Our experienced consultants can verify that the

architecture currently deployed does in fact meet with the

intentions of its design.Examples of services which our architecture review covers:

3 tier application Internal and external authoritative and cache forwarding DNS infrastructureDNSSec readinessZero-trust user architectureWireless security and best practicesActive directory architecture review

Product EnhancementsAutomation In Governance, Risk

Management & ComplianceOn Going GRC & Information

Assurance ConsultingSecurity Architecture

Review

Page 24: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

During a configuration review, Nexfort consultants map

configuration of infrastructure and security devices to international

and regional frameworks such as ISO27001, NIST and NESA and NIA.Our configuration review can be

performed on the application and servicer infrastructure as well as on

infrastructure components.

Configuration Review

We can assist our customers in implementing integrated solutions that combine best of breed point

products from our portfolio of market leading security

technologies. We deliver turn-key security solutions and

infrastructure projects covering all phases from conceptualization and

planning, to implementation and operation.

Examples of Competences:

More than 15 Palo Alto Certified Network Security Engineers (PCNSE)More than 35 F5 Networks certifications3 Cisco Cisco Certified Internetwork Experts (CCIEs) and the only Cisco Security Certified Partner in the region

Implementation Services

We deliver trainings on the most relevant aspects of IT security such as web-application security where we cover what a web-application

is, the common issues in web-applications, and the typical

attack scenarios. Our trainings cover the areas not touched upon in product driven

trainings which merely focus on the operational side of managing a solution. Furthermore, we are an

authorized training center for Palo Alto Networks and we are therefore capable of delivering the full range of Palo Alto Networks certification

trainings.

IT Security Training

Page 25: COMPANY PROFILEnexfort.com/assets/company-profile-final-01.pdfCONFIGURATION REVIEW During a setup survey, Nexfort experts map design of foundation and se-curity gadgets to worldwide

TOUFIC ABILAMAHMANAGING DIRECTOR

Yared Street, AshrafiehBeirut - Lebanon

LB: +961 3 583 736 QA: +974 3300 3856

[email protected]

www.nexfort.com