delta line international for information … line for information... · websense triton ap-web...
TRANSCRIPT
DELTA LINE INTERNATIONALFOR INFORMATION TECHNOLOGY
WE DO
THE
INFORMATION
TECHNOLOGY
FOR YOUR
BUSINESS
ABOUT US
Delta Line International is leading IT Security Company over GCC, Since 2006 Delta Line has pioneered
the way of providing IT security with high quality of service and up to date technology. Delta Line has
built its reputation by focusing on two main points customer satisfaction and great relation with
partners. Currently Delta Line has two main branches in Riyadh and Dubai and looking forward to open
new branches soon.
WE BELIEVE THAT YOUR SECURITY IS OUR BUSINESS
WHY CHOOSE US?
Leading IT Security Provider Top Awarded partner
Quali�ed System Integrator Great Customer satisfaction
High Level Services 24/7 Support
Since its formation Delta Line has focused on the IT Security �eld and has invested in its team to build
great expertise and reputation, Currently Delta Line has reached a great level in this �eld with top level
expert team, Services and solutions.
OUR SERVICES
Consultancy Security Assessment Professional Services
Delta line o�ers businesses the
IT consultancy service through
advising them on how best to
use information technology to
meet their business objectives
and what they need to cover all
IT aspects and how to develop
their environment to follow
latest technology updates.
We help businesses to locate
their IT vulnerabilities and risks
to insure that all security aspects
are covered and all necessary
components are integrated, so
they can insure that their busi-
ness is protected. We also assist
them with our recommenda-
tions to solve these issues
Our team of experts is ready to
provide you professional servic-
es anytime and anywhere to
ful�ll your needs. We study, plan,
design, Implement and support
you to a level that exceeds you
expectations. Our team will
collaborate with you in every
step to achieve your goals.
OUR CLIENTS
Ministry of InteriorSaudi Arabia
Ministry of EducationSaudi Arabia
General Auditing BureauSaudi Arabia
Bureau of InvestigationSaudi Arabia
Border GuardsSaudi Arabia
Saudi Commission for Health Specialties
Ministry of Water and ElectricitySaudi Arabia
Ministry of Defense and AviationSaudi Arabia
Council of Saudi Chambers
Al Qassim MunicipalitySaudi Arabia
Al Jouf University
Jazan University King Abdulaziz and His Companions’ Foundation
for Giftedness and Creativity
Arab Open University RIYADH SCHOOLS
Al Qassim University
Sulaiman Al Rajhi Colleges Shaqra University Tabuk University Sanad Children's Cancer Support Association
Almarai Drake & Scull International
Emaar Riyadh metro
L'AZURDE Sipchem Bupa ARABIA INSURANCE COOPERATIVE COMPANY
Sky News Arabia Samba Al Tayyar Travel Group
AFRASSaudi Arabian Trading
& Contracting Company
Othaim Markets Al Tamimi & Company Al kaffary Group
Body Masters
Arab Engineers for Trading Company
Naseej Drive Dentsu ALAA For Industry
OUR PARTNERS
OUR SOLUTIONS
Endpoint Protection
KASPERSKY Endpoint Security for Business
SOPHOS Endpoint Protection
UTM & Next-Gen Firewall
SOPHOS UTM
FORTINET FortiGate
Secure Web Gateway
Websense TRITON AP-WEB
BLUECOAT ProxySG
SOPHOS Web Gateway
Secure Email Gateway
SOPHOS Email Gateway
FIREEYE Email Security
Websense TRITON AP-EMAIL
Data Backup
SYMANTEC Backup Exec
SYMANTEC Net Backup
Data Encryption
SOPHOS SafeGuard Encryption
Data Loss Prevention
BLUECOAT Data Loss Prevention
Websense DLP MODULE
Virtual application delivery
CITRIX XenDesktop
Load Balancing
A10 Thunder ADC
Mobile Control & Security
SOPHOS Mobile Control
Wireless Control & Security
SOPHOS Wireless protection
Patch Management
GFI LanGuard
Kaspersky Endpoint Security for Business
Kaspersky Total Security for Business delivers the most complete
platform of protection and management o�ered in the industry
today.
Kaspersky Total Security for Business secures every layer of your network and includes power-
ful con�guration tools to ensure your users are productive and free from the threat of malware,
regardless of device or location.
Anti-Malware & Firewall
App,Web and Device Control
Data Protection (Encryption)
Patch and License Management
Vulnerability Scan
File Server Security
Mobile Endpoint Security
Mail,Web and Collaboration
MAIN FEATURES:
LICENSING:
ENDPOINT PROTECTION
SOPHOS Endpoint ProtectionENDPOINT PROTECTION
Sophos Endpoint Protection makes it simple to secure your
Windows, Mac and Linux systems against malware and
advanced threats, such as targeted attacks.
Sophos next-generation endpoint protection integrates innovative technology like malicious
tra�c detection with real-time threat intelligence from SophosLabs to help you prevent, detect
and remediate threats with ease. We also add web �ltering, application control, device control
and more right into the lightweight endpoint agent, so your organization’s policies are enforced
anywhere your users go.
Web, Device, and Application control
Malicious tra�c detection
Patch assessment
Microsoft Exchange antispam and anti-malware
Anti-malware for network storage
Client �rewall
Data Loss Prevention
Mobile device management
MAIN FEATURES:
Enforce your web, application, device and data policies with ease, thanks to seamless integration
within the endpoint agent and the management console. Ì Web Control Category-based web
�ltering enforced on and o� the corporate network Ì Application Control Point-and-click block-
ing of applications by category or name Ì Device Control Managed access to removable media
and mobile devices Ì Data Control Data loss prevention (DLP) using prebuilt or custom rules.
Sophos Endpoint Protection is continually tuned for the best performance. The lightweight
agent keeps users secure without slowing them down. Protection updates are small— typically
under 30 KB—so updates are easy on your network and your endpoints.
COMPLETE CONTROL:
LIGHTNING PERFORMANCE:
SOPHOS UTMUTM & Next-Gen Firewall
Sophos UTM gives you complete security from the network
�rewall to endpoint antivirus in a single modular appliance.
It simpli�es your IT security without the complexity of multiple-point solutions. The intuitive
interface will help you quickly create policies to control security risks. And clear, detailed reports
will give you the insight you need to improve your network performance and protection.
SOPHOS UTM modular approach lets you add layers of protection as your needs evolve,Select the
modules that meet your needs:
UTM Network Protection: Stops sophisticated attacks that a �rewall alone can’t
UTM Web Protection: Lets you protect your employees from web threats and control
UTM Email Protection: Stops spam and viruses and keeps sensitive data safe.
UTM Web Server Protection: Hardens web servers and apps ensuring compliance with
UTM Wireless Protection: Gives you secure Wi-Fi in minutes.
Extend your security:
Sophos RED
Wi-Fi Access Points
VPN Clients
Free UTM Manager
Sophos iView
a web application �rewall.
their time online.
FORTINET FORTIGATEUTM & Next-Gen Firewall
Whether you need to deploy a High Performance Data Center Firewall, an Enterprise Next Gener-
ation Firewall or a smaller UTM device for your Distributed Enterprise site or Small Business, there
is a FortiGate physical or virtual appliance to �t your unique Network Security requirements
Fortinet’s Network Security Platforms can serve many di�erent roles in your enterprise network:
High Performance Firewalls for Data Centers
NGFW (Next Generation Firewall) for the Enterprise Edge
UTM (Uni�ed Threat Management) for Distributed O�ces
Deployment:
FW - includes high-speed Firewall and VPN
NGFW - includes Firewall, intrusion prevention and application control
ATP - includes advanced threat protection and endpoint control
WF - includes Web �ltering and explicit proxy
NGFW + ATP - includes NGFW and ATP features
UTM - includes all previously mentioned features plus email �ltering, data loss prevention,vulnerability scanning
FortiGate 3000 Series FortiGate 1000 Series
FortiGate 800-600 Series FortiGate 500-300 Series
Websense TRITON AP-WEB
TRITON AP-WEB provides a Comprehensive real-time protection
against Advanced Threats and data theft.
TRITON AP-WEB goes beyond anti-virus defenses by using eight defense assessment areas in a
composite scoring process that uses predictive analysis with the Websense® ACE (Advanced
Classi�cation Engine). Multiple real-time content engines analyze full web page content, active
scripts, web links, contextual pro�les, �les and executables.
Secure Web Gateway
Real-Time Analysis for Advanced Threat Protection:
The TRITON AP-WEB advanced threat dashboard provides forensic reporting on who was
attacked, what data was targeted, where the data almost went and how the attack was executed.
Security incidents include data theft capture when possible. Defenses analyze inbound and
outbound communications.
Easy Dashboard Access to Forensic Data:
Industry-leading integrated data theft defenses (optional) detect and intercept data theft
attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these
capabilities include detection of custom encrypted uploads, password �le data theft, slow data
leaks (drip DLP), optical character recognition OCR (Optical Character Recognition) of text
within images and geolocation destination awareness
Integrated Data Theft Defenses:
Learn how to better protect your company’s assets by analyzing the behavior of malware
automatically with the integrated optional sandbox service.
Integrated Sandboxing:
BLUECOAT ProxySG
ProxySG appliances provide complete control over all your web tra�c—with robust features that
include user authentication, web �ltering, data loss prevention, inspection, and visibility of
SSL-encrypted tra�c (including the ability to stream decrypted content to an external server
with an Encrypted Tap license), content caching, bandwidth management, stream-splitting and
more.
Advanced web threat protection
Real-time web content ratings
On-demand cloud intelligence
Web 2.0 mashed up content �ltering
Social networking threat protection
True �le type checks
Compressed archive analysis
File and attachment �ltering
MAIN FEATURES:
Secure Web Gateway
Inline threat analysis (three AV)
Data loss prevention integration
Proxy avoidance blocking
Protocol method controls
Bandwidth management
Media stream splitting and caching
Acceleration and optimization
Transparent or Explicit deployment
Web, mobile web, and native application and operation controls
ProxySG 9000 ProxySG 600 ProxySG S500
SOPHOS Web Gateway
SOPHOS Secure Web Gateway prevents malware infections and gives you control over your
employees’ web use. Spyware and viruses are stopped before they can enter the network. And,
you can quickly create policies that set where and how employees spend time online.
Prevent infection with dual, independent antivirus engines
Enforce browsing quotas and time-based web sur�ng policies
Enhance policies with custom site categories using our innovative site tagging
Monitor web activity by users or department
Maintain privacy with anonymity in reports
Email scheduled reports directly to managers
Hardware, virtualized, software or cloud-based appliance
Highlights
Secure Web Gateway
Sophos purpose-built secure web gateway makes web protection simple. It provides advanced
protection from today’s sophisticated web malware and gives you full control over your employ-
ees’ online activity. You can easily create policies for individuals or groups while gaining important
insights into user activity on your network.
SOPHOS o�ers both dedicated Secure Web Gateway appliances and uni�ed next-gen �rewall
appliance options as well.
Sophos Web Appliance:
SOPHOS Email GatewaySecure Email Gateway
Secure your email gateway with Sophos UTM and get simple yet powerful protection from spam
and phishing attacks. And you can protect your sensitive emails from data loss with our built-in
DLP and encryption. Our intuitive browser-based interface with built-in reporting on all models
make it easy to manage your mail protection.
Advanced multilayer spam detection techniques
Detects the latest phishing URLs within emails
Dual-engine Live Antivirus with deep scanning of attachments
Unique SPX encryption with integrated DLP policy
UserPortal lets users manage spam and supports 15 languages
Hardware, virtualized, software or cloud-based appliance
Highlights
Secure your email from spam, phishing and data loss Our purpose-built secure email gateway is
an all-in-one solution for email encryption, DLP, anti-spam and threat protection. It provides
advanced protection from today’s sophisticated phishing attacks and gives you full control over
data leaving your organization via email.
SOPHOS o�ers both dedicated Secure Email Gateway appliances and uni�ed next-gen �rewall
appliance options as well.
Sophos Email Appliance:
FireEye Email Security
The FireEye® EX series secures against advanced email attacks. As part of the FireEye Threat
Prevention Platform, the FireEye EX uses signature-less technology to analyze every email attach-
ment and successfully quarantine spear-phishing emails used in advanced targeted attacks. With
all the personal information available online, a cybercriminal can socially engineer almost any user
into clicking a URL or opening an attachment. The FireEye EX series provides real-time threat
prevention for spear-phishing attacks that evade traditional defenses. The EX also delivers a new
level of threat prevention against blended attacks by working with the FireEye NX platform to
quarantine emails with malicious URLs and trace Web-based attacks back to the original
spear-phishing email.
Protects against spear-phishing email attacks
Integrates with the FireEye NX series to stop blended attacks across multiple threat vectors
Analyzes emails for threats, such as zero-day exploits, attacks hidden in ZIP/ RAR/TNEF
Deploys in active protection-mode as an MTA, or monitor-mode (SPAN/BCC)
Quarantines malicious emails with optional user noti�cations
Integrates with the FireEye cloudbased anti-virus and anti-spam protection engine for
Highlights:
Secure Email Gateway
archives, and malicious URLs
complete email security
Analyzes emails for threats, such as zero-day exploits, attacks hidden in ZIP/ RAR/TNEF
WEBSENSE TRITON AP-EMAILENDPOINT PROTECTION
TRITON AP-EMAIL stops advanced targeted attacks, identi�es
high risk users and controls Insider Threats.
The Websense ACE (Advanced Classi�cation Engine) is at the heart of all TRITON solutions and
identi�es malicious lures, exploit kits, emerging threats, botnet communications and other
advanced threat activity across the Kill Chain. This enables TRITON AP-EMAIL to identify the early
stages of an attack. With its powerful malware assessment capabilities that include a fully-inte-
grated, �le behavioral sandboxing, it can even identify Zero-day malware threats
Stop APT and other Advanced Targeted Threats:
To prepare for a malicious Insider Threat or the potentially successful cyber-attack, it’s vital that
outbound communications be monitored. This is also necessary both for data theft compliance
needs as well as for business requirements. Only Websense provides the technology to stop data
in�ltration and ex�ltration, with capabilities such as:
Secure sensitive data against external attacks and Insider Threats:
The rich data collections in TRITON AP-EMAIL are used by a number of policies to report and
identify systems that may require special IT attention. They generate a report on a number of
Indicators of Compromise to identify infected systems and more proactive reports on suspi-
cious behavior, or even ‘disgruntled employee’ activity as potential Insider Threats. User feed-
back capabilities help educate employees as mistakes are made, helping them to better learn
and understand safe email best practices.
Identify ‘high-risk’ user behavior and educate users to improve awareness:
OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images
Encrypted �le detection to recognize custom encrypted �les designed to defy identi�cation.
Drip DLP monitoring to identify where sensitive data is leaked in small quantities over time.
such as scanned documents or screen shots.
Symantec Backup Exec
Symantec Backup Exec™ 2014 delivers powerful, �exible, and easy-to-use backup and recovery
to protect your entire infrastructure whether built upon virtual, physical, or a combination of
both. Using modern technology, Backup Exec backs up local and remote data to virtually any
storage device including tape, disk and cloud. Recovery is fast and e�cient. With a few simple
clicks, you can quickly search and restore granular �le or application objects, applications, VMs,
and servers directly from backup storage. Additionally, easily protect more data while reducing
storage costs through integrated deduplication and archiving technology.
Protect virtual and physical environments with a single solution.
Fast virtual machine snapshots.
Backup to disk, tape, and cloud.
Fast, e�cient, and versatile recovery that easily restores virtual machines, servers,
Integrated bare-metal, physical to virtual (P2V) and virtual to physical (V2P) recovery.
Flexible block-level data deduplication across your entire virtual and/or physical environment.
Automatically identify and protect new VMs as they appear so you can be assured your VMs
MAIN FEATURES:
Data Backup
applications, databases, �le/folders or granular objects in seconds.
are protected from day one.
Backup Exec Editions:
Symantec Backup Exec™ 2014 (per module - media server, agent and option)
Symantec Backup Exec™ 2014 V-Ray Edition (per occupied socket)
Symantec Backup Exec™ 2014 Capacity Edition (per front-end TB)
Symantec Backup Exec™ 2014 Small Business Edition (per server/virtual machine)
Symantec Backup Exec™ 2014 delivers powerful, �exible, and easy-to-use backup and recovery
to protect your entire infrastructure whether built upon virtual, physical, or a combination of
both. Using modern technology, Backup Exec backs up local and remote data to virtually any
storage device including tape, disk and cloud. Recovery is fast and e�cient. With a few simple
clicks, you can quickly search and restore granular �le or application objects, applications, VMs,
and servers directly from backup storage. Additionally, easily protect more data while reducing
storage costs through integrated deduplication and archiving technology.
Symantec NetBackupData Backup
Symantec NetBackup™ is built to protect the largest and most demanding data center environ-
ments. Engineered with Symantec™ V-Ray technology, NetBackup delivers breakthrough capabil-
ities for virtualized systems that go well beyond what traditional backup practices can achieve. A
single, intuitive management console reveals all backup and recovery activity, allowing consist-
ent policies and service levels to be enforced across the enterprise.
One platform, one console uni�es virtual and physical global data protection.
Uni�ed global management of snapshots, replicated snapshots, backup, and recovery.
Backup and appliance integrated, scalable global deduplication across virtual and physical.
V-Ray one pass backup, instant image and single �le restore for virtual and physical.
MAIN FEATURES:
Automated virtual data protection and load balanced backup performance.
NetBackup Appliance:
NetBackup 5230 Backup Appliance and the NetBackup 5030 Deduplication Appliance are enter-
prise appliances and changing how customers backup and recover in virtual and physical envi-
ronments. The NetBackup 5030 Deduplication and 5230 Backup Appliances have greater perfor-
mance and are built on a new, next generation hardware platform. This new platform supports
customers growing workloads and prepares for future NetBackup releases. In addition, the
Appliances deliver greater reliability, availability, and serviceability to further reduce the total
cost of ownership. Built on the strength of NetBackup software, these enterprise class appliances
continue to lead the purpose-built backup appliance (PBBA) market.
SOPHOS SafeGuard Encryption
Complete data protection across multiple platforms and devic-
es; securing your data without slowing you down
Ensures productivity by securing sensitive data wherever it is stored: laptops, USB devices,
Makes regulatory compliance easier with policy enforcement and reporting
Provides key management that lets authorized users share data securely and easily
Save time using the central console for data protection policy de�nition and management
Manages all devices in the organization from one place, including hard disks encrypted with
Uses latest processor technology to make sure that encrypted machines are faster than ever
Highlights:
Data Encryption
network shares or even in the cloud, with minimal impact on performance
BitLocker or FileVault 2 and Opal self-encrypting drives
SafeGuard Enterprise Modules:
Management Center
Device Encryption
Data Exchange
Encryption for Cloud Storage
Native Device Encryption
Encryption for File Shares
BLUECOAT DLPData Loss Prevention
Safeguard your sensitive company data.
Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quick-
ly and accurately, all while achieving industry and regulatory compliance. With Blue Coat DLP,
you can leverage powerful discovery capabilities to prevent sensitive, unsecured data from
traveling across the network and winding up in the wrong hands.
Blue Coat DLP is a highly scalable, single appliance solution. Using centralized management
features, you can easily create policies that analyze the data source, content, destination and
more. Best of all, you can install and start using key compliance and risk mitigation features in
one day.
With Blue Coat DLP, you can:
Identify and protect sensitive data from inappropriate distribution
Protect your organization and your brand
Track data with “�ngerprinting” capabilities
Monitor SSL tra�c across the web gateway
Reduce intentional or accidental data tampering
Install Blue Coat DLP in less than a day
WEBSENSE DLP MODULE
Stop data loss and theft, demonstrate compliance, and safeguard
brand, reputation, and intellectual property
Adopt cloud services like Microsoft O�ce 365™ and Box without fear of data theft.
Quickly deploy easy-to-use security controls for compliance and regulatory requirements
Identify sensitive data within images such as scanned data and screen shots.
Manage the Insider Threat by stopping data loss and proactively identifying high risk users.
Unify your security solutions, coordinate defense policies, share intelligence along multiple
Supports AP-WEB and AP-EMAIL
Data Loss Prevention
points and enjoy centralized management of your data security.
Gain visibility, control and security of inbound and outbound sensitive data by extending enter-
prise DLP capabilities to your Web and Email Channels.
TRITON AP-EMAIL
TRITON AP-WEB
From a damaged reputation to regulatory �nes and penalties, a data breach can have devastating
consequences. Websense DLP Module enables you to discover and protect sensitive data in the
Cloud or on-premise. Secure personal data, intellectual property and meet compliance require-
ments quickly, with custom or out-of-the-box policies by using Websense's unique DLP capabili-
ties to stop data theft.
Features & Bene�ts:
for auditors and executives.
Quickly deploy easy-to-use security controls for compliance and regulatory requirements
CITRIX XenDesktopVirtual desktop and application delivery
Citrix XenDesktop delivers Windows apps and desktops with the
best cost, performance and security for every business need.
With XenDesktop, your business is borderless. Give employees the freedom to work from
anywhere while cutting IT costs. With industry-leading XenApp built in, XenDesktop can deliver
full desktops or just apps to any device.
Citrix XenDesktop delivers virtual Windows apps and desktops as secure mobile services. With
XenDesktop, IT can mobilize the business, while reducing costs by centralizing control and
security of intellectual property. XenDesktop can deliver full desktops or just the apps to any
device. XenDesktop enables the delivery of a native touch-enabled mobile experience that is
optimized for the type of device, as well as the network. XenDesktop is built on a 3rd generation
FlexCast Management Architecture (FMA) and is the only hybrid cloud-ready platform that
separates the management plane from the workload to enable IT to securely deliver published
apps on-premises, and manage workers and mobile workspaces either on-premises or in the
cloud.
Main Features:
XenApp published desktops for maximum IT control and lowest cost
XenApp published apps for secure access to 5 generations of Windows apps on any device
VDI desktops for maximum personalization
VDI with Personal vDisk for maximum personalization with single image management
Hosted physical desktops when hypervisors aren't required
Remote PC Access for secure, direct connections to o�ce PCs
O�ine client virtualization for disconnected user requirementsrequired
A10 THUNDER ADC
Next-generation Application Delivery Controller
Load Balancing
A10 Thunder ADC product line of high-performance, next-generation application delivery
controllers enables customers' applications to be highly available, accelerated and secure.
Thunder ADC is a premier ADC product line, delivering performance scalability up to 150
Gbps, the broadest range of form factors (physical, virtual and hybrid), and expanded system
resources designed to support future feature needs.
Application Availability:
Highly available applications and data centers
Next-generation cloud data center evolution
Fast deployment and proven application con�guration and provisioning
Application Acceleration:
Application acceleration for a better user experience and infrastructure utilization
Virtualization for adc and slb consolidation
Full control and deep packet inspection (dpi) capabilities to solve complex problems
Security:
Enhance your data center security
Enhance, scale and optimize your existing dmz security infrastructure
Protect against the latest emerging threats
SOPHOS Mobile ControlMobile Control & Security
Complete management and security of mobile devices, content
and applications.
Manage your mobile devices, content, applications, and email, in addition to integrated antivirus,
anti-malware and web �ltering.
For IT professionals that want to enable mobility, Sophos Mobile Control (SMC) manages and
secures mobile devices, content, and applications. We take a user-centric approach, delivering
the simplest experience for users and administrators. SMC is the only Enterprise Mobility Man-
agement solution using a user-based approach while providing individual �le encryption on
mobile devices. Stop Bring Your Own Device (BYOD) from becoming an IT nightmare, and choose
the delivery model that suits your needs.
Highlights:
Single solution for all the latest mobile platforms
A simple role-based web console
Push out policies and apps over the air
Assign policies based on the users Active Directory groups
Regularly checks for device compliance
Mobile content on iOS devices
Filter web pages by category on Android devices
On-premise and SaaS deployment options
SOPHOS Mobile Control Modules:
Mobile Device Management
Mobile Content Management
Mobile Application Management
Mobile Email Management
Anti-malware and Web Filtering for Android
Controlled Network Access
OUR LOCATIONS
RIYADH OFFICE
Tahleya Street - Riyadh - Saudi Arabia
O�ce 701 - DAMAC Business Tower - Dubai - United Arab Emirates
DUBAI OFFICE
OUR CONTACTS
UAE: +971 4 4200563KSA: +966114603027
KSA: +96612936282 UAE: +971 4 4200458
www.deltaline-it.com
/DeltaLineInt
/DeltaLine
www.deltaline-it.com
Tahleya Street, Riyadh, KSA
Business Bay, Dubai, UAE
KSA: +966 114603027UAE: +971 44200563
CONTACT US
DELTA LINE INTERNATIONAL