- InfoAray

Transcription

- InfoAray
1
Company Profile
InfoAray FZ LLC
P.O. Box 487177,
s
IT Solutions
work
for your
business
Information
Securitythat
Solutions
& Service
Provider
Dubai, United Arab Emirates
TEL
+971 4 2500717
FAX
+971 4 2500718
Email
Info@InfoAray.com
InfoAray FZ LLC
Our Company
InfoAray is the leader in the area of Enterprise Security and Network Management in United Arab Emirates. In the
dynamic world of Information Technology, we are equipped to fulfill the most advanced demands of our
customers. We aim for Total Customer Satisfaction by providing Solutions to the customers Security needs. Our
products address these issues in any environment. Protect their assets with appropriate applications, delivering
comprehensive protection. We are a team of professionals, specialized in the area of Enterprise Security.
InfoAray’s main objective is to provide consultancy and products in the area of Network Security and Network
Management. InfoAray is committed to providing its customers with technically superior yet easy to use products
and services, which protect, manage and connect an organization’s most important and valuable asset –
Information. By developing effective security strategies and providing latest technologies, InfoAray helps its client
reduce risks, liabilities and increase efficiencies. Our services allow the customer to gain full control of their
Security & Management System.
We employ a dedicated team of professionals specializing in Technical and Marketing skills in the Information
Technology Industry. Of these a core team of professionals are certified in the area of Network Security, Network
Management & Disaster Recovery Solutions, with certifications from companies like Symantec, Trend Micro,
McAfee, Sophos, Kaspersky, Microsoft, Sonicwall etc. Company aims at Total Customer Satisfaction by providing
Solutions to the customers Security needs and backing it with the Highest Standards of after Sales Support
provided by the Customer Support Team.
Besides this the Customer Care Team has two dedicated executives, constantly keeping in touch with the client
after the sale. The sole objective of this department is to ensure that the other departments maintain InfoAray’s
standards of service. For more information, please visit www.InfoAray.com
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Our Solution Architecture
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Our Solutions & Vendors
Endpoint security
Endpoint Security Protection combines Antivirus with advanced threat prevention to deliver an unmatched
Defense against malware for laptops, desktops, and servers. It provides protection against even the most
sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating
spyware. Endpoint Security Protection delivers more than world-class, industry-leading antivirus and antispyware
signature-based protection.
It also provides advanced threat prevention that protects endpoints from targeted attacks and attacks not seen
before. It includes turnkey, proactive technologies that automatically analyse application behaviours and network
communications to detect and block suspicious activities, as well as administrative control features that allow you
to deny specific device and application activities deemed as high risk for your organization. You can even block
specific actions based on the location of the user.
This multi-layered approach significantly lowers risks and gives you the confidence that your business assets are
protected. It is a comprehensive product gives you all the capabilities you need, now with the ability to enable the
pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally
motivated, endpoints will be protected. Endpoint Security Protection increases protection and helps lower your
total cost of ownership by reducing administrative overhead as well as the costs associated with managing
multiple endpoint security products. It provides a single agent that is administered via a single management
console. This simplifies endpoint security administration and provides operational efficiencies such as single
software updates and policy updates, unified and central reporting, and a single licensing and maintenance
program.
Application Control
Application Control Solution helps organization to control the applications that could cause security or legal
problems, like P2P or instant messaging. You will get a handle on the unwanted applications that clog your
network. You can monitor and control what your employees are installing without interfering with their work.
It provides you with detection for a wide range of applications that Vendor’s experts keep up to date with new
versions and new applications. You simply set policies for the whole company or specific groups to block or allow
particular applications. Use application control to switch off VoIP but allow remote users to use it or standardize
on a single Internet browser.
Authentication
Authentication Solution that proves the identity of users before allowing access to the Infrastructure such as
Microsoft Windows environment or network. It enables customers to use the solution to authenticate Microsoft
operating system users, whether they are online and connected to the corporate network or offline and logging on
to their desktop. The solution provides stronger security than passwords, provides a consistent simple method for
users to sign on to the Windows environment, eliminates the need for password change policies and provides an
audit log of all authentication events.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Device Control
Device Control Solution protects your data from falling into the wrong hands via removable storage devices and
media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices
may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at
home, or on the move. Device Control Solution provides content- and context-aware, device-blocking capabilities
such as:
Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs
and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.
Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto
allowed devices, and restrict users from copying data from specific locations and applications.
Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout
your enterprise. Set device and data policies by user, group, or department.
Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging.
Gather details such as device, time stamp, and data evidence for prompt and proper audits.
Patch & vulnerabilities Management
Patch & vulnerabilities Management Solution is a network security scanner that proactively reports on network
vulnerabilities and helps to remediate them and ensure compliance. With vulnerability scanning , open ports
detection ,patch management , Windows file/folder/registry change management and vulnerability
reporting capabilities, Security Manager Plus protects the network from security threats and malicious attacks.
It provides detailed inventory of the network assets, assesses network vulnerabilities and identifies devices that
are exposed. By deploying missing patches/updates and service packs, Security Manager Plus automatically
remediates some open threats to the systems. It also provides solutions to mitigate risks and secure IT
environment and generates comprehensive audit reports for compliance and understanding.
UTM Firewall Solution
UTM Firewall Solution solves these issues by combining multiple network and security functions including a deep
packet inspection firewall, IPSec VPN, layered anti-virus, antispyware, intrusion prevention and Web content
filtering capabilities into a single integrated appliance that is easy to manage and deploy. Based on a dynamically
updateable platform, UTM Firewall appliances are automatically updated to ensure zero day protection against a
variety of network and application threats. Optimized for advanced networking and ultra reliable operation, they
are designed for mission-critical data and network communication deployments. UTM Firewall Solution’s powerful
operating system which provides policy-based firewall management over complex deployments and enables
complete control over network traffic and application usage. It delivers exceptional value and performance for
organizations of all sizes, including branch offices, central sites, distributed enterprises and data centers.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Data Leakage Prevention
The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. Data
leaks can be initiated by either unwitting employees or users with malicious intent copying proprietary or sensitive
information from their PCs to flash memory sticks, smartphones, cameras, PDA’s, DVD/CDROMs, or other
convenient forms of portable storage. Or, leaks may spring from user emails, instant messages, web forms, social
network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bluetooth, and Infrared as well as
device synchronization channels provide additional avenues for data loss. Likewise, endpoint PCs can be infected
with vicious malware that harvest user keystrokes and send the stolen data over SMTP or FTP channels into
criminal hands. While these vulnerabilities can evade both network security solutions and native Windows
controls, the Data Leak Prevention (DLP) Solution addresses them. It enforces data protection policies with
awareness of both the context and content of data flows across endpoint channels.
Data leakage prevention Solution starts with contextual control — that is, blocking or allowing data flows by
recognizing the user, the data types, the interface, the device or network protocol, the flow direction, the state of
encryption, the date and time, etc. Some scenarios call for a deeper level of awareness than context alone can
provide; for example, when the data being handled contains personally identifiable information, when the
input/output channel is conventionally open and uncontrolled, and when the users involved have situations or
backgrounds considered high risk. Security administrators can gain greater peace of mind by passing data flows
that fall into any of these categories through an additional content analysis and filtering step before allowing the
data transfer to complete.
DLP Solution provides both contextual and content-based control for maximum leakage prevention at minimum
upfront and ownership cost. Its multi-layered inspection and interception engine provides fine-grained control
over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is
escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media
and PnP devices, as well as with the network. With security administrators can precisely match user rights to job
function with regard to transferring, receiving and storing data on corporate computers. The resulting secure
computing environment allows all legitimate user actions to proceed unimpeded while blocking any accidental or
deliberate attempts to perform operations outside of preset bounds.
Encryption
This comprehensive, modular data security solution—designed for enterprise requirements—helps you safely
mobilize your workforce, collaborate with partners securely, protect your central data servers, infrastructure, and
comply with regulatory mandates. Avoid the consequences of data loss or theft . The impact of data breaches can
be severe, including negative press, damaged reputations, financial penalties, and personal liabilities for
responsible company executives. Minimize risk by encrypting confidential data and sensitive records with
Encryption Solution.
Meet data security challenges head-on Managing data security in complex enterprise environments—across
servers, desktops, laptops and removable media—can be challenging. Protecting data— when employees,
business partners, and customers have access from many locations—requires strong, centralized management.
Encryption Solution delivers cost-effective, easy-to-use, easy-to-manage encryption-superior to point products.
Gain unmatched data security with Encryption Solution; Safeguard critical data with secure authentication, strong
encryption, and powerful central management. Encryption Solution secures data on desktops, laptops, PDAs,
smart phones, and most forms of removable media. Transparent data encryption enhances user productivity while
preventing anyone from reading lost or stolen media. Manage policy and regulatory compliance risks centrally
protecting confidential personal data from disclosure is a fundamental legal requirement in many locations.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
SSL VPN Solution
With maturing mobile technologies, booming global markets and heightened focus on disaster preparedness,
remote access control has become a business imperative. The modern mobile workforce demands secure access
to more resources from more remote devices and platforms than ever before.
These solutions offer SSL VPN access to mission-critical resources from virtually any endpoint—including
desktops, laptops, smartphones and tablets. It provides a wide range of scalable remote access solutions that fit
organizations of every size, from small- to medium-sized businesses (SMBs) to the largest global enterprise.
Network Access Control
Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and
implement a policy that describes how to secure access to network nodes by devices when they initially attempt
to access the network. NAC might integrate the automatic remediation process (fixing non-compliant nodes
before allowing access) into the network systems, allowing the network infrastructure such as routers, switches
and firewalls to work together with back office servers and end user computing equipment to ensure
the information system is operating securely before interoperability is allowed.
Network Access Control aims to do exactly what the name implies—control access to a network with policies,
including pre-admission endpoint security policy checks and post-admission controls over where users and
devices can go on a network and what they can do.
Email Security
Email Security Solution Combines Purpose-Built MTA with Preventive Security, Reactive Security and System
Control. These Solutions are designed to protect networks from today’s and tomorrow’s email threats. On top of
this highly scalable platform, It offers a variety of security applications for spam and virus filtering, content
scanning and policy enforcement. The modular design of the system allows these applications to be turned on or
off, to meet the specific needs of each customer.
Web Security & URL Filtering
Web Security Solution offer the broadest reach and the highest accuracy rate in controlling Web content. These
filters compare users’ Web traffic requests against administrator-set policies for pre-defined (and an unlimited
number of custom) categories, easily addressing acceptable use policy concerns. With a database that contains
more than 20 million sites (corresponding to over 3 billion webpages) and global coverage across 70 languages
and 200 countries, URL Filters offer industry-leading coverage and accuracy against Web traffic requests.
The industry’s Web reputation filters provide a powerful outer layer of defense. Leveraging SenderBase®, Web
Reputation Filters™ analyze over 50 different Web traffic and network-related parameters to accurately evaluate
a URL’s trustworthiness. Sophisticated security modeling techniques are used to individually weigh each
parameter and generate a single score on a scale of -10 to +10. Administrator configured policies are dynamically
applied, based on reputation scores.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Web Application Firewall Solution
The Web Application Firewall protects Web applications and Web services from malicious attacks, and can also
increase the performance and scalability of these applications. The Web Application Firewall offers every
capability needed to deliver, secure and manage enterprise Web applications from a single appliance through an
intuitive, real-time user interface. It is Single point of protection for inbound and outbound traffic for all Web
applications. It Protects Web sites and Web applications against application layer attacks. It delivers best
practices security right out of the box. It Monitors traffic and provides reports about attackers and attack
attempts.
Backup & Disaster Recovery Solution
Backup Solutions delivers efficient, easy to manage backup and recovery protection from server to desktop,
providing optimized data protection for windows based environments, now supporting Microsoft windows server
2008. With granular recovery features and continuous data protection for critical Microsoft applications,
Symantec Backup Exec helps ensure that business – critical data is efficiently protected and can be quickly
recovered down to an individual email or document.
Disaster recovery and business continuity solutions offer comprehensive end-to-end solution to recover businesscritical systems, data and applications such as Microsoft Exchange, SQL Server, and SharePoint in both physical
and virtual environments in a simple and effective way.
Storage Solutions
Storage systems store, share and protect data for home or business users. It’s a great way to centralize files,
share them between computers and even automatically back up to an offsite location. Storage a simply smarter
way to solve storage problems.
Security as a Service - Endpoint Protection Solutions
SaaS Endpoint Protection Suite delivers essential protection from viruses, spyware, web threats, and hacker
attacks. SaaS Endpoint Protection Suite automates your online defenses, lowers costs, and streamlines security
deployments, updates, upgrades, and management — all through the online SecurityCenter. It Eliminate the need
for multiple security products.
SaaS Endpoint Protection Suite detects and blocks viruses, spyware, spam, phishing schemes, and hacker attacks
to safeguard all your systems. Plus, built-in web security ratings warn about potentially dangerous websites,
providing proactive protection without limiting online access. A single, low-cost annual subscription offers
continuous protection, automatic security updates and upgrades, and around-the-clock technical support.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Hosted Email Security Solutions
Hosted Email Security Solution scans e-mails before they reach business servers using the most advanced virus
scanner currently available on the market, stopping viruses using unique Pre-Virus Recognition (PVR) filter
technology before they are detected and classified as viruses. It is based on market-leading antispam filters and
technologies and is regarded as being one of the most effective filtering systems around.
Online Backup, Email Archiving & Disaster Recovery Solutions
Delays and breakdowns can cost your company dearly. For most companies, it is vital that electronic data is
always accessible. And a complete loss of data can be catastrophic. With Remote Backup, you get an automated,
secure solution that minimises the risk of data loss.
Hosted Web Security Solutions
Hosted Web Security Solution provides protects against web-based threats and harmful content before they can
penetrate the company’s network. To support your company’s IT policies and legal requirements, It also allows
for blocking of unsuitable websites, filtering by content categories and restrictions to avoid interference with
employee productivity.
Infrastructure
A well designed network is efficient and can help save time as well as resources. Find the right network
architecture for your organisation’s environment with us. We customise your network design based on the size
and scope of your company’s information sharing requirements. Top of this, We consider all level of security
solutions while designing Infrastructure through which your information will only get protect but also can also
take maximum benefits out of it.
Network Cabling
Laptops
CCTV & Door Access Control
KVM Monitor & Switches
Email & Fax
Distribution Solution
Microsoft Licenses
Servers
Desktops
Printers
PABX & Telephony Systems
Wireless Access Point
Router
Switches
Server Rack
UPS
External Storages / HDD
Encrypted Removable
Storage Devices
Remote&Helpdesk
Management
Virtualization
Web & Software
Designing
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Value Additional Services
Business Basic Support
All InfoAray’sCustomers are eligible for Business Basic Support under which they can get below mentioned services from
Technical Support team.
E-mail Support
24x7 direct access to Technical Support Team for E-mail support
Remote Support
24x7 direct access to Technical Support Team for Remote support
Phone Support
24x7 direct access to Technical Support Team for Phone support
Health Check-up Visit
Two On-Site visits at Year for a regular health check-up of the Solution
Weekly Newsletters
We send Weekly news letters and constant virus alerts to safe guard our clients from threats
in the wild.
Solution Alerts & Weekly Newsletters
We send Weekly news letters and constant virus alerts to safe guard our clients from threats in the wild. These newsletters help
our customer to know about New Feature of latest Solution Version and about the new solutions of Information Security
Industries.
Follow us on Facebook
We will notify our clients about Vendors events like webinar, Seminar, Road Show etc. through Facebook event manager so they
can attend the same if they are interested.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Professional Services
Solution Implementation
InfoArayoffers comprehensive implementation services for its products to ensure they are implemented effectively and they
meet your expectations. As part of the implementation process, InfoArayEngineer will spend time understanding your
requirements and helping you determine how automation and process reengineering can improve your corporate Security. With
this approach, specifications, cost and timelines can be effectively managed.
Our team of professionals comes prepared not only with a deep understanding of our own solutions, but, as importantly, with a
clear understanding of your industry and your business. A key benefit of working with InfoAray implementation team is the
proven project management process that is used along with a staff of skilled consultants to reduce risk and manage projects to
on-time delivery within budget. Our strength lies in our young, dynamic, qualified, well-trained and certified team of security
professionals.
Technical Support
We provide every client of InfoAraywith free phone, chat, email & Remote support for technical issue. All the services offered by
InfoArayinclude remote service desk support to conduct real-time tracking of alerts and offers quick resolution. Trouble tickets
are continuously tracked and resolved on 24x7 bases by our experienced support staff.
Customers can anytime send email to Support@InfoAray.com to generate Trouble ticket for receiving support services.
InfoAraythrough its service desk facility assures customers of systematic and timely resolution of their key business processes.
We also provide On-site Support based on the customer requirement & after commercials approval.
Technical Consultancy
The fast paced technological advancements are hard to cope up without hiring a professional service in the field. At InfoAray, we
will identify all the underlying information technology opportunities that can help enhance your business and its requirements.
The industry experience along with the striking implementation helps us evolve the solutions to meet the toughest business
challenges. After tapping the client’s available resources and understanding the future plans we devise a well structured road
map to bring in the IT Security transition at every milestone.
The IT consulting service may be required by a firm for some particular problem at one point of time or for the overall
performance at a regular interval of time. Since there are different spheres to be tackled,InfoArayhas disintegrated the consulting
services to make it more personalized and tailor made for your business requirements.
We offer IT consulting services in the following fields
•
Infrastructure Security Architecture Review: Here we study the costs associated with the IT enabled services, check the
existing system for its business and operational compatibility and devise a valued plan to render enhanced performance
at all levels.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
•
•
Product & Service Solution – Design: InfoArayprovides winning solutions against all the cyber threats and crimes. We
help devise a strategy to protect new business plans, critical data and information along with the key business
applications.
Optimization: This is the most crucial part of any IT consulting service. InfoAraywith its experienced team of individuals is
able to layout and implement appropriate solutions that works best with the changing business environment. The older
system platforms are transformed into the newer performing solutions.
Business Essential Support
Our Customers who have registered for Business Essential Support who will be eligible to receive below mentioned services from
our Technical Support Team.
Technical Account Manager
Single Point of Contact for all Technical Issue & Escalation
Telephone Support
24x7 direct access to a team of highly-trained Senior Support Engineers for telephone
technical support
E-mail Support
24x7 direct access to a team of highly-trained Senior Support Engineers for E-mail technical
support
Remote Support
24x7 direct access to a team of highly-trained Senior Support Engineers for remote technical
support
Health Check-up Visit
Predefined Site visits at accepted interval of period for a regular health check-up of the
Solution
Emergency Visit
Site Visits for any emergency call or critical error on the solution
Solution Upgrade
Technical Support will upgrade the solution and keep it as latest version
Weekly Newsletters
We send Weekly news letters and constant virus alerts to safe guard our clients from threats
in the wild.
Administrator Training Course
As a part of our effort to spread product awareness and disseminate knowledge, we conduct product training programs for
customers. The response has been overwhelming so far.
`Solutions that work for your business
We build Secure Networks
InfoAray FZ LLC
Contact Information
InfoAray team who will be providing your sales and support service are as follows:
InfoAray FZ LLC
P.O. Box: 487177
Dubai - United Arab Emirates
Tel: +971 4 2500717
Fax: +971 4 2500718
Email: info@InfoAray.com
Web: www.InfoAray.com
Should you require any information with respect to the following departments please get in touch with the below
mentioned contact details.
Sales
Support
Sales Team
Technical Support Team
Tel: +971 4 2500717
Tel: +971 4 2500717
Email:sales@InfoAray.com
Email: support@InfoAray.com
Logistic Administration
Accounts
Admin Team
Accounts Team
Tel: +971 4 2500717
Tel: +971 4 2500717
Email: admin@InfoAray.com
Email: accounts@InfoAray.com
Disclaimer
The following document contains information, which is proprietary to InfoAray FZ LLC and should be treated as strictly private & confidential.
This document is being discussed with you solely for your information and may not be reproduced, redistributed or passed on, directly or
indirectly, to any other organization or published, in whole or in part, for any purpose without the express written consent of InfoAray FZ LLC.
Neither this document nor any copy of it may be taken or transmitted to anybody or distributed, directly or indirectly outside the organization.
`Solutions that work for your business
We build Secure Networks