We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

Similar documents
SECURE SOURCE DISTRIBUTION (M) SDN BHD

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Ethical Hacking and Prevention

Gladiator Incident Alert

Certified Ethical Hacker (CEH)

Cybersecurity Roadmap: Global Healthcare Security Architecture

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Security

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and inf

Security Readiness Assessment

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Cyber Security Audit & Roadmap Business Process and

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Intelligent and Secure Network

Security+ SY0-501 Study Guide Table of Contents

CHCSS. Certified Hands-on Cyber Security Specialist (510)

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

A UNIVERSAL SECURITY GATEWAY

Secure Managed Firewall

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Course 831 Certified Ethical Hacker v9

with Advanced Protection

SONICWALL SECURITY HEALTH CHECK SERVICE

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

VIVOTEK. Security Hardening Guide

MS20741: NETWORKING WITH WINDOWS SERVER 2016

Changing face of endpoint security

SUBSTANTIAL TECHNOLOGY PARTNERSHIPS FOR YOUR SOLID SECURITY

CIS Controls Measures and Metrics for Version 7

Security Vendor Line Card

PrecisionAccess Trusted Access Control

CEH: CERTIFIED ETHICAL HACKER v9

SONICWALL SECURITY HEALTH CHECK SERVICE

Imperva Incapsula Website Security

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CIS Controls Measures and Metrics for Version 7

Run the business. Not the risks.

IBM Security Network Protection Solutions

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Verizon Software Defined Perimeter (SDP).

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Implementing Cisco Network Security (IINS) 3.0

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

(CNS-301) Citrix NetScaler 11 Advance Implementation

Course 20741B: Networking with Windows Server 2016

epldt Web Builder Security March 2017

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Payment Card Industry (PCI) Data Security Standard

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Certified Cyber Security Analyst VS-1160

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016

SONICWALL SECURITY HEALTH CHECK PSO 2017

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

Security Automation Connecting Your Silos


This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

ForeScout ControlFabric TM Architecture

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

EZY Intellect Pte. Ltd.,

RSA Web Threat Detection

Certified Ethical Hacker

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Unlocking the Power of the Cloud

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Building Secure Systems

NETLOGIC TRAINING CENTER

CoreMax Consulting s Cyber Security Roadmap

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

Understanding Cisco Cybersecurity Fundamentals

2017 Company Profile

Securing Access to Network Devices

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Endpoint Protection : Last line of defense?

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Microsoft Certified System Engineer

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

INFINIT Y TOTAL PROTECTION

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

Transcription:

COMPANY PROFILE

We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product offering right that can cater from perimeter security, core network prevention and endpoint protection Has a team of dedicated and certified resources with varying industry experience to provide IT Security advisory practice to its business partners and customers. Partnered with Security industry leading vendors such as Imperva, Proofpoint, BT Diamond IP, ForeScout, AlgoSec, Cubro, Corvil, Silver Peak, LogRhythm, Carbon Black, SOTI, Lastline, Hillstone and Thales

TO BECOME A LEADING I.T SECURITY PROVIDER FOR END-TO-END NETWORK SECURITY SOLUTIONS To provide best-ofbreed Products, Solutions and Technologies To value and preserve our intellectual Properties Our Missions

Our Values and Commitments To bring the best of breed security solutions and technologies into the market Knowledge and skills sharing in a consistent manner 03 05 01 02 04 Continuously delivering and maintaining quality support and services To uphold and practice key values and commitment in dedication, responsiveness, professionalism and proactiveness Building established infrastructure and facilities in supporting resellers and partners

Risk and Threats Landscape Today Buffer overflow attacks BYOD/ Contractor or Guest Device/Rogue Device (eg AP or Router) Endpoint device non-compliant to security policy Off-line infections Physical Theft Weak Privileged User Control Weak Data Protection eg sensitive data not masked nor encrypted Data Leakage Poor Network Access Control Lateral Movement Poor or no control of mobile device management Data theft -System Administrator or DBA Weak Audit Weak User Right management Unauthorized Database Access Failing Compliance Requirements Database protocol vulnerabilities Worms/Trojans/Viruses/Rootkit/ Botnets infection DDOS attacks, Brute Force, SYN flood Evasive Malware, Blended Threats, Zero Day attacks Buffer Overflow attacks, drive-by download, malware via HTTP, FTP etc Weak security policy control (eg Firewall complex rules and misconfiguration Fluxing ; Command & Control Cross-Site-Scripting Privilege abuse Directory Traversal Remote file Inclusion SQL Injection APT, Targeted attacks SPAM, Spear Phishing and P2P Threats

multiple vectors Threat Protection against PERIMETER WAN INTERNET BRANCHES CORE NETWORK LAN & WIRELESS INFRASTRUCTURE SERVERS DATABASE DATA AT REST ENDPOINTS MOBILE DEVICES (BYOD) WIRELESS DEVICE APPLICATION

Solutions Focus Copyrights 2017 Secure Source Distribution (M) Sdn Bhd. All rights reserved. Firewall Operations and Security Risk Management Solutions DDos Protection & Mitigation IPAM, DNS and DHCP Management Network and Application Performance Management, Packet Capture and Security Analytics Next Generation End Point Network Packet Brokers, Aggregators, Monitoring Switches, TAPs Email Archiving, Email APT and Email Protection Network Encryption and Data Protection Solutions

Solutions Focus Copyrights 2017 Secure Source Distribution (M) Sdn Bhd. All rights reserved. Network Access Control (NAC) Data Lost Prevention Intelligent Next Generation Firewall, SSL Proxy, VPN, IPS Advanced Persistent Threat & Malware Protection Solutions Web Application Firewall and Database Security Security Intelligence

Solutions Focus Copyrights 2017 Secure Source Distribution (M) Sdn Bhd. All rights reserved. Secure Access Solutions for SSL VPN, Cloud Secure Access, Mobile VPN and Virtual Application Delivery SD-WAN & WAN Optimization Next Generation Network Access Control Privileged Access Management & Password Management Email Security, Data Loss Prevention, Email Archiving Solutions Hardware Security Modules, PKI, CA, Time Stamping Mobile Device Management (MDM) Security key for multi-factor authentication and hardware security module

SECURECARE & SERVICES STANDARD 8 X 5 X NBD FLEXIBLE SECURECARE options to choose from : PREMIUM 24 X 7 X NBD STANDARD 8 X 5 X 4 hrs PREMIUM 24 X 7 X 4 hours

SECURECARE & SERVICES SecureCare Standard SecureCare Premium Secure Source offers 4 packages under SecureCare Maintenance Services that enable the customers the flexibility to select the plan that meets their needs. Professional services can be customized to customer s requirement. Response Time (Email, Phone and Remote Assist Support) Advanced Hardware Replacement Onsite Preventive Maintenance SecureCare SecureCare SecureCare SecureCare 8 x 5 x NBD 8 x 5 x 4hr 24 x 7 x NBD 24 x 7 x 4hr response response NBD 4 Hours NBD 4 Hours From (9 am to 6 pm, Monday to Friday) 24 Hours NBD Same Day NBD Same Day Optional Optional

SECURECARE BENEFITS Dedicated, committed and experience security engineers, to provide responsive support and technical assistance for our solution offering 01 Advanced Hardware Replacement Trained specialists verify the source of your network problems by telephone. When hardware return is necessary, Secure Source ships a replacement unit to arrive at your site within the committed time frame. 02 Technical Telephone Support Qualified technical support engineers help you resolve an unlimited number of incidents quickly and efficiently. 03 Software/Firmware Upgrades Secure Source shall advise customer when new firmware is available and will assist to provide upgrades when necessary.

SECURE SOURCE TRAINING Product based training (inclusive hands-on lab experience) can be arranged and conducted to partner and customers: Product System Administration Training Product Certification Training

Proofpoint Enterprise Protection/Privacy Accredited Engineer Imperva Database Security Specialist Hillstone Certified Security Associate ForeScout Certified Administrator CERTIFIED ALGOSEC Security User AlgoSec Firewall Analyzer Technical Training Demonstrating a LogRhythm Solution Course Scoping & Architecting a LogRhythm Solution LogRhythm Network Monitor Certified Professional v7.1 Silver Peak Technical Sales Professional (STSP) SDWAN Certification Training Silver Peak SDWAN expert Certification Silver Peak SDWAN Professional (SPSP)

w w w. s e c u r e s o u r c e d. c o m Secure Source Distribution (M) Sdn Bhd C-5-09 to C-5-12 Centum @ Oasis Corporate Park Oasis Damansara (Pusat Korporat Oasis ) No 2 Jalan PJU 1A/2 Ara Damansara 47301 Petaling Jaya, Selangor,Malaysia. Tel: +603 7662 8863 +603 7662 8893 Sales enquiries Email : sales@securesourced.com Support and Services Tel: +603 7662 8892 Email : support@securesourced.com Fax: +603 7662 8896