SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
CYBER SECURITY
ADVISORY SERVICES
DUBAI| ABU DHABI| LONDON
WHO WE ARE
A leading
Cyber Security
Advisory & Consulting firm
DUBAI| ABU DHABI| LONDON
What we do
DTS Solution is a leading Cyber Security Advisory & Consulting firm
focused on securing your enterprise digital assets from the modern day
cyber attacks that can cripple your business operations.
From providing cyber security strategy, addressing security compliance, understanding your current risk maturity
to develop a comprehensive roadmap, hardening your people, process and technology.
Whether that is acquiring security solutions or penetration testing, simulating a ‘real hacker’, to building cyber
resilience framework to withstand cyber incidents, is what DTS can deliver as an end-to-end lifecycle.
DUBAI| ABU DHABI| LONDON
DTS AT A GLANCE
80+
VAPT Assignments
250+
Firewall Migrations
20+
NESA Implementations
350+
Customers Protected
Emerging Integrator
of the Year
- 2018 -
Cyber Sentinels Security SI
Award
- 2018 -
Top System Integrator
Security
- 2018 -
Best Cyber Security
Consulting Services Provider
- 2018 -
DUBAI| ABU DHABI| LONDON
The cyber kill chain
RECON STAGE LAUNCH EXPLOIT INSTALL CALLBACK PERSIST
target COMPROMISE BREACH
File Trajectory
DECEPTION
NGFW P+V
NIPS / NETWORK AI
NAC
DDOS MITIGATION
PACKET BROKER
WAF
EMAIL SECURITY
MFA/ 2FA
APPLICATIONCONTROL
WAF
EMAIL SECURITY
PATCHMANAGEMENT
PACKET BROKER
AUTOMATEDSECURITY
ANALYST - AI
NGAV / ENDPOINT
VULNERABILITY MGMT
PAM
SESSIONRECORDING
RASP
DAM
SIEM 2.0
NGAV / ENDPOINT
APPLICATIONCONTROL
SIEM 2.0
APT
DNS SECURITY
SIEM 2.0
THREAT HUNTING
APT
DNS SECURITY
WEB FILTERING
AUTOMATEDSECURITY
ANALYST - AI
THREAT INTELLIGENCE
ATTACKER INFRASTRUCTURE FILES / PAYLOADS
DUBAI| ABU DHABI| LONDON
Cyber security solutions – defense in depth
Network
Security
DATA
Security
Infrastructure
Security
System
Security
Application
Security
Mobility
Security
Compliance
Monitoring
Advancethreat
Protection
DATA CLASSIFICATION
DATA-IN-TRANSIT
EMAIL SECURITY
DNS SECURITY
WEB FILTERING
PACKET BROKER
NGAV / ENDPOINT
VULNERABILITY MGMT
PATCHMANAGEMENT
PAM
SESSIONRECORDING
WIRELESS
CAPTIVE PORTAL
MDM
SIEM 2.0
Policy COMPLIANCE
IRP
ITSM
CASB
AUTOMATEDSECURITY
ANALYST - AI
APT
THREAT HUNTING
DNS Security
Threat Intelligence
Deception
WAF
APPLICATIONCONTROL
DAM
RASP
MFA/ 2FA
SAST / DAST
ERP SECURITY
NGFW P+V
NIPS / NETWORK AI
SSL VPN
NAC
DDOS MITIGATION
VM SECURITY
SDN
DUBAI| ABU DHABI| LONDON
Our technology partners – defense in depth
boldonjames
DUBAI| ABU DHABI| LONDON
Cyber Strategy cyber Secure cyber Operations cyber response cyber resilience
DTS Cyber sSORR MEthodology
DUBAI| ABU DHABI| LONDON
Cyber Strategy
Cyber STRATEGY
CYBER STRATEGY
Cyber Risk
Management
Security
Regulatory &
Compliance
Cyber
Security
Strategy
Cyber
Transformation
Risk
Maturity
Assessment
Executive
Cyber
Dashboards
Cyber
Security
Metrics
Education
Training
Awareness
Asset Based Risk Assessment
Scenario Based Risk Assessment
Information Security Standards
Risk and Gap Assessment
Technical Security Controls Risk Assessment
Cyber Security Process Risk Assessment
ISO27001 & 27002, NESA IAS & NCRMF
PCI-DSS V3.2
DESC - ISR V2
ADSIC / ADSSSA
NIST CSF, SWIFT
ISA62443 (formerly ISA99)
Cloud
Managed Services
Blockchain
Artificial Intelligence
Big Data Analytics
FINTECH / IoT
IDAM
Data Protection
3-5 year Cyber Strategy
Cyber Security Roadmap
Security Awareness
Phishing Awareness
Technical Security
Security Campaigns
Learning Through Gamification
Security Effectiveness Index
Security Awareness Index
Security Training Index
Security Incident Index
Y-o-Y Risk Rating Index
Cyber Security Posture
Enterprise Cyber Risk View
External and Internal Threats
Management and Technical Risks
People Process and Technology
Cyber Risk Maturity Rating
Inherent Cyber Risk
Risk Maturity Across Domains
DUBAI| ABU DHABI| LONDON
Cyber SECURE
Cyber SECURE
CYBER SECURE
RED TEAM
OFFENSIVE SECURITY
Vulnerability Assessment
Penetration Testing
Web Application Security
Mobile Application Security
Wireless security Testing
Social Engineering
Threat Hunting
BLUE TEAM
DEFENSIVE SECURITY
Infrastructure Protection
Network Security Protection
System Security Protection
Cloud Security Protection
Endpoint Security Protection
Application Security Protection
Vulnerability Management
WHITE TEAM
ADVISORY & CONSULTING
Identity and Access Management
Data Protection Program
Cloud Security Assessment
Security Architecture
Data Center Design & Blueprint
Blockchain, AI & Big Data
NESA IAS, DESC ISR, ISO 27001 &
27002, PCI-DSS
PURPLE TEAM
SECURITY OPERATIONS
SIEM & SOC Consulting
Security Operations Center
Compliance Monitoring
Threat Adversary Simulation
Purple Teaming
Threat Intelligence
Incident Response Playbook
DUBAI| ABU DHABI| LONDON
CYBER OPERATIONS
Cyber OPERATIONS
Cyber OPERATIONS
CSOC Policies
CSOC Processes
CSOC Procedures
Threat Modeling Methodology
Network Architecture Review
Cyber Attack Kill Chain
MITRE ATT&CK Matrix
Threat Detection Use Cases
Use Case Development
Incident Response Playbook
CSOC
Design & Build
SIEM 2.0
Consulting
Cyber
Threat
Intelligence
Surface
Attack
Analysis
CSOC
Governance
SIEM Operating Manuals
SIEM Optimization & Enhancement
SIEM Effectiveness Analysis
- PURPLE TEAMING
Cyber Threat Intelligence
Open Source Threat Intelligence
- (OSINT)
Information Sharing
Brand Reputation
Take Down Services
CSOC Strategy
CSOC Design & Build
CSOC Operating Model
CSOC Physical Layout
DUBAI| ABU DHABI| LONDON
Cyber RESPONSE
Cyber RESPONSE
IR Data Collection Toolkit
IR Tactics, Techniques and Procedures
IR Program Development
IR Governance & Framework
IR Policies, Processes and Procedures
Incident
Response
Preparation
Pre and
Post
Compromise
Digital
Forensics
Incident
Response
Program
Incident
Response
Tips
Threat Hunting Methodology
Post-Compromise Assessment
Network Forensics
Endpoint Forensics
Mobile Forensics
Digital Triage Forensics
IR Digital Playbooks
Security Orchestration & Automation Response (SOAR)
MITRE ATT&CK Matrix Response
CYBER RESPONSE
DUBAI| ABU DHABI| LONDON
Cyber RESILIENCE
Cyber RESILIENCE
PURPLE
Teaming
Response
Simulated Targeted
Cyber Attack
CYBER RESILIENCE
RED
Teaming
Offensive
Cyber
War-Gaming
Cyber
Resilience
Assessment
Simulated Targeted
Response
Table Top Exercises
Executive Workshops
Management Workshops
Technical Workshops
DUBAI| ABU DHABI| LONDON
HAWKEYE – SOC-As-a-Service
HAWKEYE powered by DTS helps your organization strategize, develop, build and manage a Next
Generation Security Operations Center – SOC 2.0 as a Service to protect your information assets whilst
counteracting the ever changing threat landscape.
CAPABILITIES
CSOC – Threat Monitoring 24x7 Vulnerability Management Security Incidents and Events Management Database Activity Monitoring Incident Management Alert and Reporting
Perimeter and Network Security Systems Security Application Security Identity and Access Control Endpoint Security Cloud Security
REAL-TIME MONITORING
Proactive to Predictive Security Monitoring
Security Events and Log Correlation
Deep Security Analytics
Machine Learning Driven CSOC
OPERATIONAL COMPLIANCE
Compliance Monitoring
Hardening Policy Compliance
Security Auditing
Change Management Monitoring
Configuration Management
THREAT MANAGEMENT
Threat Hunting as a Service
Vulnerability Management
Threat Adversary Detection
Use Case Development
Threat Intelligence
INCIDENT MANAGEMENT
Incident Notification and Response
Security Incident Severity Rating
Incident Response Triage
Security Automation
Security Orchestration
Incident Digital Playbooks
DUBAI| ABU DHABI| LONDON
HAWKEYE – SOC-As-a-Service
HAWKEYE – SOC as a Service subscription packages are available in four tiers to accommodate
varying cyber risk levels posed to your organization, budgets and business requirements to ensure
cyber resiliency.
Outsourced Remote Monitoring – Managed / Hybrid
(On-premise SIEM)
SOC-as-a-Service – Managed / Hybrid
(Off-premise SIEM)
Staff Augmentation
(Dedicated and onshore)
Staff Augmentation
(Shared and offshore)
SOC-as-a-Service
(Shared Multi-Tenant SIEM Platform)
SOC-as-a-Service
(Dedicated SIEM Platform)
LITE (Bronze)
Suitable for organizations that need to monitor the Internet Perimeter. Ideal for SMEs
that need to outsource security monitoring services.
BASELINE (Silver)
Suitable for organizations that need to monitor internet perimeter and critical systems.
Ideal for SMEs that need to outsource security monitoring services.
ADVANCED (Gold)
Ideal for organizations that need to monitor the IT systems. Ideal for large organizations
that need to outsource security monitoring services that involves an internal team.
PREMIUM (Platinum)
Ideal for organizations that need to monitor the internet perimeter. Ideal for large
organizations that need to augment security monitoring services with their internal IT
security and operations team.
REMOTE MONITORING
Ideal for organizations that already have an on-premise SIEM platform and need
support cyber security operations, in managing the SIEM platform through staff
augmentation in a dedicated, shared, onshore and offshore model.
DUBAI| ABU DHABI| LONDON
Case STUDIES
Let’s Talk?
OFFICE Suite 4, Oasis Mall
Sheikh Zayed Road
Dubai, United Arab emirates
PO Box 128698
T: +971 4 3383365
info@dts-solution.com
www.dts-solution.com
Office 253, Al Bateen C6 Tower – Bainunah
King abdullah bin abdulaziz al saud street
abu Dhabi, United Arab Emirates
P.O. BOX 113678
T: +971 2 2076777
info@dts-solution.com
www.dts-solution.com
160 Kemp House
City Road
London, EC1V 2NX
UNITED KINGDOM
+44 2081230 387 (DTS)
info@dts-solution.co.UK
www.dts-solution.co.UK
Dubai ABU DHABI london

Más contenido relacionado

La actualidad más candente

Cloud migration slides
Cloud migration slidesCloud migration slides
Cloud migration slidesErika Barron
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
 
Microsoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxMicrosoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxAlejandro Daricz
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 
AWS vs Azure vs Google (GCP) - Slides
AWS vs Azure vs Google (GCP) - SlidesAWS vs Azure vs Google (GCP) - Slides
AWS vs Azure vs Google (GCP) - SlidesTobyWilman
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Introduce AWS Lambda for newbie and Non-IT
Introduce AWS Lambda for newbie and Non-ITIntroduce AWS Lambda for newbie and Non-IT
Introduce AWS Lambda for newbie and Non-ITChitpong Wuttanan
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
AWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptxAWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptxRaneesh Ramesan
 
Basics AWS Presentation
Basics AWS PresentationBasics AWS Presentation
Basics AWS PresentationShyam Kumar
 
Presentation cloud management
Presentation   cloud managementPresentation   cloud management
Presentation cloud managementxKinAnx
 
Windows Virtual Desktop Powered By Microsoft Azure
Windows Virtual Desktop Powered By Microsoft AzureWindows Virtual Desktop Powered By Microsoft Azure
Windows Virtual Desktop Powered By Microsoft AzureDavid J Rosenthal
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 

La actualidad más candente (20)

Cloud migration slides
Cloud migration slidesCloud migration slides
Cloud migration slides
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Microsoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptxMicrosoft Azure Hub_Spoke_Ampliado.pptx
Microsoft Azure Hub_Spoke_Ampliado.pptx
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
The Amazon Partner Network
The Amazon Partner NetworkThe Amazon Partner Network
The Amazon Partner Network
 
AWS vs Azure vs Google (GCP) - Slides
AWS vs Azure vs Google (GCP) - SlidesAWS vs Azure vs Google (GCP) - Slides
AWS vs Azure vs Google (GCP) - Slides
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Introduce AWS Lambda for newbie and Non-IT
Introduce AWS Lambda for newbie and Non-ITIntroduce AWS Lambda for newbie and Non-IT
Introduce AWS Lambda for newbie and Non-IT
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
AWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptxAWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptx
 
Basics AWS Presentation
Basics AWS PresentationBasics AWS Presentation
Basics AWS Presentation
 
Presentation cloud management
Presentation   cloud managementPresentation   cloud management
Presentation cloud management
 
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure SentinelThreat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
 
Windows Virtual Desktop Powered By Microsoft Azure
Windows Virtual Desktop Powered By Microsoft AzureWindows Virtual Desktop Powered By Microsoft Azure
Windows Virtual Desktop Powered By Microsoft Azure
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 

Similar a DTS Solution - Company Presentation

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company PresentationChaitanyaS
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleThe Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleYokogawa1
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfChinatu Uzuegbu
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Top Managed SOC Service Provider in Pune
Top Managed SOC Service  Provider in PuneTop Managed SOC Service  Provider in Pune
Top Managed SOC Service Provider in PuneCloudIBN Technology
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAmazon Web Services
 

Similar a DTS Solution - Company Presentation (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleThe Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
Blockchain Cybersecurity Development
Blockchain Cybersecurity DevelopmentBlockchain Cybersecurity Development
Blockchain Cybersecurity Development
 
Blockchain Cybersecurity
Blockchain CybersecurityBlockchain Cybersecurity
Blockchain Cybersecurity
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Top Managed SOC Service Provider in Pune
Top Managed SOC Service  Provider in PuneTop Managed SOC Service  Provider in Pune
Top Managed SOC Service Provider in Pune
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
 

Más de Shah Sheikh

ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingShah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 

Más de Shah Sheikh (20)

ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 

Último

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 

Último (9)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 

DTS Solution - Company Presentation

  • 2. DUBAI| ABU DHABI| LONDON WHO WE ARE A leading Cyber Security Advisory & Consulting firm
  • 3. DUBAI| ABU DHABI| LONDON What we do DTS Solution is a leading Cyber Security Advisory & Consulting firm focused on securing your enterprise digital assets from the modern day cyber attacks that can cripple your business operations. From providing cyber security strategy, addressing security compliance, understanding your current risk maturity to develop a comprehensive roadmap, hardening your people, process and technology. Whether that is acquiring security solutions or penetration testing, simulating a ‘real hacker’, to building cyber resilience framework to withstand cyber incidents, is what DTS can deliver as an end-to-end lifecycle.
  • 4. DUBAI| ABU DHABI| LONDON DTS AT A GLANCE 80+ VAPT Assignments 250+ Firewall Migrations 20+ NESA Implementations 350+ Customers Protected Emerging Integrator of the Year - 2018 - Cyber Sentinels Security SI Award - 2018 - Top System Integrator Security - 2018 - Best Cyber Security Consulting Services Provider - 2018 -
  • 5. DUBAI| ABU DHABI| LONDON The cyber kill chain RECON STAGE LAUNCH EXPLOIT INSTALL CALLBACK PERSIST target COMPROMISE BREACH File Trajectory DECEPTION NGFW P+V NIPS / NETWORK AI NAC DDOS MITIGATION PACKET BROKER WAF EMAIL SECURITY MFA/ 2FA APPLICATIONCONTROL WAF EMAIL SECURITY PATCHMANAGEMENT PACKET BROKER AUTOMATEDSECURITY ANALYST - AI NGAV / ENDPOINT VULNERABILITY MGMT PAM SESSIONRECORDING RASP DAM SIEM 2.0 NGAV / ENDPOINT APPLICATIONCONTROL SIEM 2.0 APT DNS SECURITY SIEM 2.0 THREAT HUNTING APT DNS SECURITY WEB FILTERING AUTOMATEDSECURITY ANALYST - AI THREAT INTELLIGENCE ATTACKER INFRASTRUCTURE FILES / PAYLOADS
  • 6. DUBAI| ABU DHABI| LONDON Cyber security solutions – defense in depth Network Security DATA Security Infrastructure Security System Security Application Security Mobility Security Compliance Monitoring Advancethreat Protection DATA CLASSIFICATION DATA-IN-TRANSIT EMAIL SECURITY DNS SECURITY WEB FILTERING PACKET BROKER NGAV / ENDPOINT VULNERABILITY MGMT PATCHMANAGEMENT PAM SESSIONRECORDING WIRELESS CAPTIVE PORTAL MDM SIEM 2.0 Policy COMPLIANCE IRP ITSM CASB AUTOMATEDSECURITY ANALYST - AI APT THREAT HUNTING DNS Security Threat Intelligence Deception WAF APPLICATIONCONTROL DAM RASP MFA/ 2FA SAST / DAST ERP SECURITY NGFW P+V NIPS / NETWORK AI SSL VPN NAC DDOS MITIGATION VM SECURITY SDN
  • 7. DUBAI| ABU DHABI| LONDON Our technology partners – defense in depth boldonjames
  • 8. DUBAI| ABU DHABI| LONDON Cyber Strategy cyber Secure cyber Operations cyber response cyber resilience DTS Cyber sSORR MEthodology
  • 9. DUBAI| ABU DHABI| LONDON Cyber Strategy Cyber STRATEGY CYBER STRATEGY Cyber Risk Management Security Regulatory & Compliance Cyber Security Strategy Cyber Transformation Risk Maturity Assessment Executive Cyber Dashboards Cyber Security Metrics Education Training Awareness Asset Based Risk Assessment Scenario Based Risk Assessment Information Security Standards Risk and Gap Assessment Technical Security Controls Risk Assessment Cyber Security Process Risk Assessment ISO27001 & 27002, NESA IAS & NCRMF PCI-DSS V3.2 DESC - ISR V2 ADSIC / ADSSSA NIST CSF, SWIFT ISA62443 (formerly ISA99) Cloud Managed Services Blockchain Artificial Intelligence Big Data Analytics FINTECH / IoT IDAM Data Protection 3-5 year Cyber Strategy Cyber Security Roadmap Security Awareness Phishing Awareness Technical Security Security Campaigns Learning Through Gamification Security Effectiveness Index Security Awareness Index Security Training Index Security Incident Index Y-o-Y Risk Rating Index Cyber Security Posture Enterprise Cyber Risk View External and Internal Threats Management and Technical Risks People Process and Technology Cyber Risk Maturity Rating Inherent Cyber Risk Risk Maturity Across Domains
  • 10. DUBAI| ABU DHABI| LONDON Cyber SECURE Cyber SECURE CYBER SECURE RED TEAM OFFENSIVE SECURITY Vulnerability Assessment Penetration Testing Web Application Security Mobile Application Security Wireless security Testing Social Engineering Threat Hunting BLUE TEAM DEFENSIVE SECURITY Infrastructure Protection Network Security Protection System Security Protection Cloud Security Protection Endpoint Security Protection Application Security Protection Vulnerability Management WHITE TEAM ADVISORY & CONSULTING Identity and Access Management Data Protection Program Cloud Security Assessment Security Architecture Data Center Design & Blueprint Blockchain, AI & Big Data NESA IAS, DESC ISR, ISO 27001 & 27002, PCI-DSS PURPLE TEAM SECURITY OPERATIONS SIEM & SOC Consulting Security Operations Center Compliance Monitoring Threat Adversary Simulation Purple Teaming Threat Intelligence Incident Response Playbook
  • 11. DUBAI| ABU DHABI| LONDON CYBER OPERATIONS Cyber OPERATIONS Cyber OPERATIONS CSOC Policies CSOC Processes CSOC Procedures Threat Modeling Methodology Network Architecture Review Cyber Attack Kill Chain MITRE ATT&CK Matrix Threat Detection Use Cases Use Case Development Incident Response Playbook CSOC Design & Build SIEM 2.0 Consulting Cyber Threat Intelligence Surface Attack Analysis CSOC Governance SIEM Operating Manuals SIEM Optimization & Enhancement SIEM Effectiveness Analysis - PURPLE TEAMING Cyber Threat Intelligence Open Source Threat Intelligence - (OSINT) Information Sharing Brand Reputation Take Down Services CSOC Strategy CSOC Design & Build CSOC Operating Model CSOC Physical Layout
  • 12. DUBAI| ABU DHABI| LONDON Cyber RESPONSE Cyber RESPONSE IR Data Collection Toolkit IR Tactics, Techniques and Procedures IR Program Development IR Governance & Framework IR Policies, Processes and Procedures Incident Response Preparation Pre and Post Compromise Digital Forensics Incident Response Program Incident Response Tips Threat Hunting Methodology Post-Compromise Assessment Network Forensics Endpoint Forensics Mobile Forensics Digital Triage Forensics IR Digital Playbooks Security Orchestration & Automation Response (SOAR) MITRE ATT&CK Matrix Response CYBER RESPONSE
  • 13. DUBAI| ABU DHABI| LONDON Cyber RESILIENCE Cyber RESILIENCE PURPLE Teaming Response Simulated Targeted Cyber Attack CYBER RESILIENCE RED Teaming Offensive Cyber War-Gaming Cyber Resilience Assessment Simulated Targeted Response Table Top Exercises Executive Workshops Management Workshops Technical Workshops
  • 14. DUBAI| ABU DHABI| LONDON HAWKEYE – SOC-As-a-Service HAWKEYE powered by DTS helps your organization strategize, develop, build and manage a Next Generation Security Operations Center – SOC 2.0 as a Service to protect your information assets whilst counteracting the ever changing threat landscape. CAPABILITIES CSOC – Threat Monitoring 24x7 Vulnerability Management Security Incidents and Events Management Database Activity Monitoring Incident Management Alert and Reporting Perimeter and Network Security Systems Security Application Security Identity and Access Control Endpoint Security Cloud Security REAL-TIME MONITORING Proactive to Predictive Security Monitoring Security Events and Log Correlation Deep Security Analytics Machine Learning Driven CSOC OPERATIONAL COMPLIANCE Compliance Monitoring Hardening Policy Compliance Security Auditing Change Management Monitoring Configuration Management THREAT MANAGEMENT Threat Hunting as a Service Vulnerability Management Threat Adversary Detection Use Case Development Threat Intelligence INCIDENT MANAGEMENT Incident Notification and Response Security Incident Severity Rating Incident Response Triage Security Automation Security Orchestration Incident Digital Playbooks
  • 15. DUBAI| ABU DHABI| LONDON HAWKEYE – SOC-As-a-Service HAWKEYE – SOC as a Service subscription packages are available in four tiers to accommodate varying cyber risk levels posed to your organization, budgets and business requirements to ensure cyber resiliency. Outsourced Remote Monitoring – Managed / Hybrid (On-premise SIEM) SOC-as-a-Service – Managed / Hybrid (Off-premise SIEM) Staff Augmentation (Dedicated and onshore) Staff Augmentation (Shared and offshore) SOC-as-a-Service (Shared Multi-Tenant SIEM Platform) SOC-as-a-Service (Dedicated SIEM Platform) LITE (Bronze) Suitable for organizations that need to monitor the Internet Perimeter. Ideal for SMEs that need to outsource security monitoring services. BASELINE (Silver) Suitable for organizations that need to monitor internet perimeter and critical systems. Ideal for SMEs that need to outsource security monitoring services. ADVANCED (Gold) Ideal for organizations that need to monitor the IT systems. Ideal for large organizations that need to outsource security monitoring services that involves an internal team. PREMIUM (Platinum) Ideal for organizations that need to monitor the internet perimeter. Ideal for large organizations that need to augment security monitoring services with their internal IT security and operations team. REMOTE MONITORING Ideal for organizations that already have an on-premise SIEM platform and need support cyber security operations, in managing the SIEM platform through staff augmentation in a dedicated, shared, onshore and offshore model.
  • 16. DUBAI| ABU DHABI| LONDON Case STUDIES
  • 17. Let’s Talk? OFFICE Suite 4, Oasis Mall Sheikh Zayed Road Dubai, United Arab emirates PO Box 128698 T: +971 4 3383365 info@dts-solution.com www.dts-solution.com Office 253, Al Bateen C6 Tower – Bainunah King abdullah bin abdulaziz al saud street abu Dhabi, United Arab Emirates P.O. BOX 113678 T: +971 2 2076777 info@dts-solution.com www.dts-solution.com 160 Kemp House City Road London, EC1V 2NX UNITED KINGDOM +44 2081230 387 (DTS) info@dts-solution.co.UK www.dts-solution.co.UK Dubai ABU DHABI london