ITSM SERVICES. Delivering Technology Solutions With Passion

Similar documents
IBM Internet Security Systems Proventia Management SiteProtector

Unlocking the Power of the Cloud

One Hospital s Cybersecurity Journey

Controlling Costs and Driving Agility in the Datacenter

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:


CONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

Transforming Security from Defense in Depth to Comprehensive Security Assurance

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Netwrix Auditor Competitive Checklist

Help Your Security Team Sleep at Night

locuz.com SOC Services

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

The Now Platform Reference Guide

Five critical features

The Convergence of Security and Compliance

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Request for Proposal Technology Services, Maintenance and Support

INTELLIGENCE DRIVEN GRC FOR SECURITY

Cyber Security Audit & Roadmap Business Process and

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Network Performance, Security and Reliability Assessment

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Riverbed. Rapidly troubleshoot critical application and network issues using real-time infrastructure visualization and monitoring.

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

Reviewer s guide. PureMessage for Windows/Exchange Product tour

SOLARWINDS PARTNER SALES CARDS

SOX/COBIT Framework. and Netwrix Auditor Mapping. Toll-free:

Administering System Center Configuration Manager

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

AlgoSec. Managing Security at the Speed of Business. AlgoSec.com

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

IBM Proventia Management SiteProtector Sample Reports

Administering System Center Configuration Manager

Vulnerability Management

Administering System Center Configuration Manager

Managed Security Services - Endpoint Managed Security on Cloud

A Security Admin's Survival Guide to the GDPR.

SecureVue. SecureVue

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Security Information & Event Management (SIEM)

AppPulse Point of Presence (POP)

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

ForeScout Extended Module for HPE ArcSight

A company built on security

McAfee epolicy Orchestrator

WORKSHARE SECURITY OVERVIEW

Carbon Black PCI Compliance Mapping Checklist

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

A: Administering System Center Configuration Manager

Background FAST FACTS

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Security Fundamentals for your Privileged Account Security Deployment

ISE North America Leadership Summit and Awards

WEBMETHODS AGILITY FOR THE DIGITAL ENTERPRISE WEBMETHODS. What you can expect from webmethods

Reinvent Your 2013 Security Management Strategy

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Cisco Secure Ops Solution

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Crash course in Azure Active Directory

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

KASEYA (LEGACY) CLOUD SOLUTION CATALOG 2014 Q1

Microsoft Security Management

BUILDING AND MAINTAINING SOC

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

A Comprehensive Guide to Remote Managed IT Security for Higher Education

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User

PCI DSS Requirements. and Netwrix Auditor Mapping. Toll-free:

Course A: Administering System Center Configuration Manager

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

COURSE 10964: CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER

ForeScout Extended Module for ArcSight

Course Outline. Cloud & Datacenter Monitoring with System Center Operations Manager Course 10964B: 5 days Instructor Led

Cloud & Datacenter Monitoring with System Center Operations Manager

CISCO BUSINESS CRITICAL SERVICES FOUNDATION THEME

Introducing VMware Validated Design Use Cases. Modified on 21 DEC 2017 VMware Validated Design 4.1

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

RSA IT Security Risk Management

ISO/IEC Controls

"Charting the Course... MOC B Cloud & Datacenter Monitoring with System Center Operations Manager Course Summary

Cisco Data Center Network Manager 5.1

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

Automating the Top 20 CIS Critical Security Controls

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

Transcription:

ITSM SERVICES Delivering Technology Solutions With Passion

02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES

Overview IT Pillars is a dynamic company, which has served, over the past years, many loyal customers in Saudi Arabia. IT Pillars provides technology solutions and professional services to many businesses in Saudi Arabia. We strive to provide technology solutions to all of our clients, large and small enterprises. IT Pillars started as a software development company, and grew to include information technology services such as integration services, service desk consultancy, network capabilities and VoIP Services.

Our success is driven by our high customer retention rate. Maintaining such a high satisfaction among our customers demands that we focus on enhancing our relationship and business.

Our Clients Companies which made us proud

Our Clients 6

Solutions We believe GOOD SERVICE IS GOOD BUSINESS.

08 Our Services Network Performance Network Monitoring Network Configuration Management Traffic Analysis & Bandwidth Monitoring Switch Port & IP Address Management Application Performance Application Performance Monitoring Storage Area Network Monitoring IT Help Desk ITIL Help Desk & Asset Management Customer Support Software Active Directory Log Analysis & Security Desktop Management Active Directory Management Active Directory Auditing & Reporting Self Service Password Management Exchange Reporting Tool IT Compliance & Log Management Firewall Configuration Management & Log Analysis for Security Network Security Scanner & Patch Management Enterprise Password Management Windows Desktop Management OS Deployment

NETWORK PERFORMANCE Network performance refers to the measures of service quality of communications Service as seen by the customer, there are many different ways to measure the performance of a network, as each network is different in its nature and design. 09 NETWORK MONITORING NETWORK CONFIGURATION MANAGEMENT TRAFFIC ANALYSIS & BANDWIDTH MONITORING SWITCH PORT & IP ADDRESS MANAGEMENT

10 Network Performance NETWORK MONITORING Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and notifies the network administrator (via email, SMS or other alarms) in case of outages. Availability and Uptime Monitoring Network Device Health Monitoring Network Fault Management Threshold based alerting Advanced Alert Management Network Performance Reporting Server Performance Monitoring NETWORK CONFIGURATION MANAGEMENT Network configuration management (NCM) is the process of organizing and maintaining information about all the components of a computer network. When a network needs repair, modification, expansion or upgrade, the administrator refers to the network configuration management database to determine the best course of action. Streamlining the processes of maintenance, repair, expansion and upgrading. Minimizing configuration errors. Minimizing downtime. Optimizing network security. Ensuring that changes made to a device or system do not adversely affect other devices or systems. Network Performance Reporting Rolling back changes to a previous configuration if results are unsatisfactory. Archiving the details of all network configuration changes.

11 Network Performance TRAFFIC ANALYSIS & BANDWIDTH MONITORING The general perception about traffic analysis in today s scenario is about knowing the who-what-when information in the network. Bandwidth Monitoring Application and protocol monitoring Department wise bandwidth monitoring Router traffic monitoring Real time traffic reports Site-to-site traffic monitoring Capacity Planning report SWITCH PORT & IP ADDRESS MANAGEMENT Internet Protocol address management (IPAM) is a method of tracking and modifying the information associated with a network s Internet Protocol address (IP address) space. With IPAM, administrators can ensure that the inventory of assignable IP addresses remains current and sufficient. IP Address Management Switch Port Management Detect Rogue Devices DHCP Scope Monitor MAC IP List

APPLICATION PERFORMANCE Application Performance Management (APM) is monitoring and management managing performance and availability of software applications. APM strives to detect and diagnose application performance problems to maintain an expected level of service. APM is the translation of IT metrics into business meaning. 12 APPLICATION PERFORMANCE MONITORING STORAGE AREA NETWORK MONITORING

13 Application Performance APPLICATION PERFORMANCE MONITORING Application performance monitoring (APM) is a part of information technology (IT) that focuses on making sure that software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience. Application Server Monitoring Virtualization Monitoring Database Monitoring System Management ERP Monitoring Web Server / Web Services Cloud Monitoring Custom Monitoring Web Transaction Monitoring STORAGE AREA NETWORK MONITORING A storage area network monitoring tool (SAN monitoring tool) helps in the process of monitoring a storage area network, where specific storage hardware is linked to a server or otherwise consolidated into a single operating network. SAN monitoring tool helps users to monitor these networks and to troubleshoot problems or perform diagnostic work. SAN monitoring tools tool is strategically related to servers and hardware in order to provide specific kinds types of access to the network. Storage Infrastructure discovery Visualization Asset Management Fault Management Real Time Graphs Business Reporting Storage Capacity Forecasting

IT HELP DESK 14 In a business enterprise, a help desk is a place that a user of information technology can call to get help with a problem. In many companies, a help desk is simply one person with a phone number and more or less organized idea about handling the problems that come in ; however, in larger companies, a help desk may consist of a group of experts using software to help in tracking track the status of problems and other special software to help in analyzing analyze problems. ITIL HELP DESK & ASSET MANAGEMENT CUSTOMER SUPPORT SOFTWARE

15 IT Help Desk ITIL HELP DESK & ASSET MANAGEMENT The helpdesk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners. The purpose of a service desk is to ensure that users receive appropriate help in a timely manner. Service desks are designed to handle both incidents and service requests. In this context, an incident is an event that results in a disruption in service availability or quality. A service request seeks help with a routine task, such as helping a user change a password or getting a new user set up in work systems. Other services provided may include change management, release management and configuration-related tasks. Ticket Management SLA Management Business Rules Notifications Help Desk Reports Knowledge Base Self Service Portal User Survey Change Management Incident Management Problem Management Service Catalog Asset Discovery Contract Management Purchase Order Management Software Asset Management CUSTOMER SUPPORT SOFTWARE Customer support software that lets organizations effectively manage customer tickets, their accounts & contact information, the service contracts and in the process providing a superior customer experience Workflow Ticket Management Account and Contact Management Customer Experience Management Reports, Dashboards & KPIs

ACTIVE DIRECTORY SOLUTIONS Active Directory is Microsoft s trademarked directory service, an integral part of the Windows 2000 architecture. Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. 16 ACTIVE DIRECTORY MANAGEMENT ACTIVE DIRECTORY AUDITING & REPORTING SELF SERVICE PASSWORD MANAGEMENT EXCHANGE REPORTING TOOL

17 Active Directory Solutions ACTIVE DIRECTORY MANAGEMENT Active Directory management (AD management) is the process of managing and monitoring the operations of the Active Directory service that is mostly found in Windows Server operating systems. AD management is part of the server or network monitoring and management processes, which ensure that Active Directory is performing as required. Spend less time managing everyday AD tasks. Easy delegation of routine tasks to help desks. Generate comprehensive reports on Active Directory users and objects. Automate crucial AD tasks including Inactive Account Management. ACTIVE DIRECTORY AUDITING & REPORTING Active Directory contains the keys to the kingdom when it comes to group and user account information. In most cases, if an organization s Active Directory deployment is experiencing a catastrophic event, no one within the organization would be able to access the services they need to perform their duties so Active Directory security audit is required to ensure that Active Directory is being properly managed and protected. Windows active directory auditing. Windows logon/logoff auditing. Windows file server auditing. Windows servers auditing

18 Active Directory Solutions SELF SERVICE PASSWORD MANAGEMENT Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. Self Reset Password. Manage Account Unlock. Password/ Account Expiry Notification to users. Password Synchronizer. Update Personal information on AD. Employee Directory Search. EXCHANGE REPORTING TOOL Microsoft Exchange Server is,, the most popular communication, collaboration and email messaging application today! MS Exchange serves as the hub of all email communications in most corporate environments that use the Microsoft Active Directory technology. It becomes a necessity to have an Exchange reporting tool that will equip and Exchange Administrator with precise, granular, comprehensive and actionable data on all aspects of the MS Exchange Server. Exchange Audit Reports Exchange ActiveSync Reports Outlook Web Access Reports Mailbox Properties Reports Mailbox Content Reports Mailbox Traffic Reports Mailbox Permission Reports Distribution Lists Report Public Folder Content Report

LOG ANALYSIS & SECURITY Security information and event management (SIEM) is an approach to security management that seeks providing a holistic view of an organization s information technology (IT) security. The underlying principle of a SIEM system is that relevant data about an enterprise s security is produced in multiple locations, and being able to look at all the data from a single point of view makes it easier to spot trends and see patterns that are out of ordinary. 19 IT COMPLIANCE & LOG MANAGEMENT NETWORK SECURITY SCANNER & PATCH MANAGEMENT FIREWALL CONFIGURATION MANAGEMENT & LOG ANALYSIS FOR SECURITY ENTERPRISE PASSWORD MANAGEMENT

20 Log Analysis and Security IT COMPLIANCE & LOG MANAGEMENT Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises. ELMS is a key tool for IT administrators that must demonstrate to executives that an organization is prepared for a compliance audit. Log Management Application Log Reports System Log Reports Regulatory Compliance Audits and Reports NETWORK SECURITY SCANNER & PATCH MANAGEMENT Network security scanner that proactively reports network vulnerabilities and helps remediate them and ensure compliance. With vulnerability scanning, open ports detection, patch management, Windows file/folder/registry change management and vulnerability reporting capabilities, network Security scanner will help in protecting the network from security threats and malicious attacks. Vulnerability Scanning PCI DSS Compliance Open Ports Detection Vulnerability Database Patch Management

21 Log Analysis and Security FIREWALL CONFIGURATION MANAGEMENT & LOG ANALYSIS FOR SECURITY Just deploying the firewall in itself will not secure your network, but the log data from your firewall needs to be continuously monitored and analyzed. There is a wealth of vital information in your firewall logs. With these logs you can detect security threats like network intrusion, virus attacks, denial of service attacks, anomalous behavior, employee web activities, web traffic analysis, etc. These logs also allow you to plan your bandwidth requirement based on the bandwidth usage across the firewalls. But manually monitoring and analyzing these logs is a time consuming task, complex, and is always prone to human error. Firewall Compliance Firewall Device Management Network Security Reports Anomaly & Bandwidth Alerts Log Management Features Traffic & Bandwidth Reports ENTERPRISE PASSWORD MANAGEMENT Enterprise password Management is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.. Eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access. Improving IT productivity many times by automating frequent password changes required in critical systems. Providing preventive & detective security controls through approval workflows & real-time alerts on password access. Meeting security audits and regulatory compliance such as SOX, HIPAA and PCI.

DESKTOP MANAGEMENT Desktop management is a comprehensive approach to managing manage all the computers within an organization. Despite its name, desktop management includes overseeing laptops and other computing devices as well as desktop computers. 22 WINDOWS DESKTOP MANAGEMENT OS DEPLOYMENT

23 Desktop Management WINDOWS DESKTOP MANAGEMENT OS DEPLOYMENT Windows Desktop management and mobile device management software helps in managing thousands of servers/desktops/mobile devices from a central location. It automates the complete desktop management and mobile device management life cycle ranging from a simple system configuration to complex software deployment. With its network-neutral architecture, the administrator can easily manage desktops/servers in any windows networks like Active Directory, Workgroup, or other directory services. Operating System Deployment allows you to create operating system images and deploy those images to targeted specific computers. OS Imaging OS Deployment Deployment Template Universal Deployment Patch Management Software Deployment Remote Control OS Deployment Asset Management Windows Configurations Service Pack Installation Mobile Device Management

Customer satisfaction is worthy. Customer loyalty is priceless.

Professional Services Delivering technology solutions with Passion.

26 Professional Services Overview Are there any opportunities to increase efficiency, effectiveness, and service quality of your IT Department, while reducing costs and increasing revenue? Our ITSM consulting services will help you increase productivity, drive revenue and reduce costs through improved technology, tools and processes in your IT division. Whether you are deploying a new process or system, assessing your existing processes for optimization, or working to communicate the value of your operation with management and customers, IT Pillars has the experience and expertise to deliver.

hat We Do? We always strive for our client s satisfaction.

28 What We Do? Implementation Training IT Consultation Support

? Questions are welcomed Our Website Our Products Contact us Free Demo

30 Contact Information IT PILLARS No. 303, 3st Floor, Salma Commercial Center, Medina Rd., Jeddah, Saudi Arabia Phone: +966 12 6575573 Fax: +966 12 6576390 email: info@it-pillars.com www.it-pillars.com