SlideShare una empresa de Scribd logo
1 de 33
Company Overview 
www.dts-solution.com 
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
DTS Solution
DTS Solution- Overview 
DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. 
We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. 
DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. 
The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
DTS Solution - Vision 
Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
DTS Solution - Services 
www.dts-solution.com 
PRE-SALES SERVICES 
STRATEGIC CONSULTING 
PROFESSIONAL SERVICES 
COMPLIANCE CONSULTING 
SECURITY ASSESSMENT
DTS Solution - Domains
Network Security
Data Security
Infrastructure Security
System Security
Application Security
Mobility / Wireless Security
Compliance Monitoring
Advance Threat Protection
Telecom Security
Cloud Security
SCADA / ICS Security
Security Operations Center
DTS Solution – Technology Partners
DTS Solution – Key Differentiators 
HIGH TECHNICAL COMPETENCY AND EXPERTISE 
TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS 
DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING 
BOTTOM-UP ORGANIZATION
DTS Solution – Services
DTS Solution – Service Offering 
Presales Services 
 RFP and RFI Documentation Services 
 Technical Requirements Gathering 
 Vendor Selection Process
Professional Services Architectural Design 
 Information Security Consulting 
 Documentation Services 
 Security Architecture Design 
 High Level Design 
 Low Level Design Deployment, Implementation and Operate 
 Implementation Services 
 Firewall Migration Services 
 Information and Service Flow Analysis 
 Network Security Audit On-site support 
 Resident Engineering Services 
DTS Solution – Service Offering
DTS Solution – Service Offering 
Information and Service Flow Analysis
DTS Solution – Service Offering 
Strategic Consulting 
 Capacity Planning 
 Cloud Computing Macroeconomics 
 Infrastructure Monitoring 
 IPTV Security Assessment 
 IPv4 to IPv6 transition 
 IPv6 Security 
 Management and Provisioning Platforms 
 Security Services Monetization
•ISO27001 
•ISA-99 / IEC-62443 
•PCI-DSS 3.0 
•Cloud Security Alliance – STAR 
•ADSIC – Abu Dhabi 
•ISR - Dubai
DTS Solution – Assessment Services 
Security Assessment Services 
Penetration Testing and Vulnerability Assessment 
Black Box Ethical Testing 
Vulnerability Management 
Unified Communications Audit 
VoIP / UC / Tele-presence security 
SCADA Security Evaluation Toolkit 
Industrial Control Systems Security Readiness 
Mobile Network Security 
UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce 
Fixed Mobile Convergence – SeGW and IMS Security 
Endpoint IP Discovery and Network Leakage Detection 
Rogue and Unknown Network Detection 
Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) 
Availability Assessment 
DDoS Protection – Botnet / Zombie Detection 
Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation 
Core Network Security 
MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion 
VPLS – Spanning Tree, ARP poisoning, MAC spoofing 
Social Engineering and Physical Security Review
DTS Solution – Some Key Facts +
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
DTS Security Research Labs – http://labs.dts-solution.com
DTS Solution – Some Key Facts + 
•UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure 
•Development of a Security Operations Center for the largest O&G company worldwide 
•Design and Deployment of largest NAC solution in the Middle East 
•Middle East’s first Security Architecture integrating with SDN based Fabric Data Center 
•Development of SCADA/ICS Security Operations Center 
•Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR 
•Largest Firewall Management and Compliance Solution Deployment in the region 
•Security Design of Largest ISP data centers in the region (80 racks) 
•Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services 
•Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure 
… and more…..
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Más contenido relacionado

Más de Shah Sheikh

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingShah Sheikh
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 

Más de Shah Sheikh (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 

Último

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

DTS Solution - Company Profile

  • 1. Company Overview www.dts-solution.com Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
  • 3. DTS Solution- Overview DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
  • 4. DTS Solution - Vision Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
  • 5. DTS Solution - Services www.dts-solution.com PRE-SALES SERVICES STRATEGIC CONSULTING PROFESSIONAL SERVICES COMPLIANCE CONSULTING SECURITY ASSESSMENT
  • 6. DTS Solution - Domains
  • 17. SCADA / ICS Security
  • 19. DTS Solution – Technology Partners
  • 20. DTS Solution – Key Differentiators HIGH TECHNICAL COMPETENCY AND EXPERTISE TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING BOTTOM-UP ORGANIZATION
  • 21. DTS Solution – Services
  • 22. DTS Solution – Service Offering Presales Services  RFP and RFI Documentation Services  Technical Requirements Gathering  Vendor Selection Process
  • 23. Professional Services Architectural Design  Information Security Consulting  Documentation Services  Security Architecture Design  High Level Design  Low Level Design Deployment, Implementation and Operate  Implementation Services  Firewall Migration Services  Information and Service Flow Analysis  Network Security Audit On-site support  Resident Engineering Services DTS Solution – Service Offering
  • 24. DTS Solution – Service Offering Information and Service Flow Analysis
  • 25. DTS Solution – Service Offering Strategic Consulting  Capacity Planning  Cloud Computing Macroeconomics  Infrastructure Monitoring  IPTV Security Assessment  IPv4 to IPv6 transition  IPv6 Security  Management and Provisioning Platforms  Security Services Monetization
  • 26. •ISO27001 •ISA-99 / IEC-62443 •PCI-DSS 3.0 •Cloud Security Alliance – STAR •ADSIC – Abu Dhabi •ISR - Dubai
  • 27. DTS Solution – Assessment Services Security Assessment Services Penetration Testing and Vulnerability Assessment Black Box Ethical Testing Vulnerability Management Unified Communications Audit VoIP / UC / Tele-presence security SCADA Security Evaluation Toolkit Industrial Control Systems Security Readiness Mobile Network Security UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce Fixed Mobile Convergence – SeGW and IMS Security Endpoint IP Discovery and Network Leakage Detection Rogue and Unknown Network Detection Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) Availability Assessment DDoS Protection – Botnet / Zombie Detection Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation Core Network Security MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion VPLS – Spanning Tree, ARP poisoning, MAC spoofing Social Engineering and Physical Security Review
  • 28. DTS Solution – Some Key Facts +
  • 29. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 30. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 31. DTS Solution – Some Key Facts + DTS Security Research Labs – http://labs.dts-solution.com
  • 32. DTS Solution – Some Key Facts + •UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP •Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP •First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure •Development of a Security Operations Center for the largest O&G company worldwide •Design and Deployment of largest NAC solution in the Middle East •Middle East’s first Security Architecture integrating with SDN based Fabric Data Center •Development of SCADA/ICS Security Operations Center •Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR •Largest Firewall Management and Compliance Solution Deployment in the region •Security Design of Largest ISP data centers in the region (80 racks) •Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services •Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure … and more…..
  • 33. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Notas del editor

  1. DTS Solution’s vision is based on simple ethos, our primary objective is to be seen as a trusted security advisor within the information and network security field. Providing best-in-class security services to your organization our aim is to ensure complete client satisfaction not only during project engagement but more importantly after the project delivery lifecycle.Providing a high degree of client confidence and assurance, value based security services, lateral security consulting approach and innovating in the security industry are a few of our key goals.Security is a dynamic operation and DTS is no different; our organization ethic is based on its ability to be elastic in nature and adapt to market needs. As we develop a strong portfolio of established technology vendors and niche security industry players, DTS is committed to provide a complete end-to-end solution delivery; ranging from pre-sales to post-sales services.
  2. Juniper – Network & SecurityFortinet – Security, UTM Specialist, Mail, Web, DBRadware – Application Delivery, Former AlteonLoadbalancerSipera – VOIP SecurityArbor Networks – DDOS, Traffic Management and VisualiztaionPalo Alto – Next Generation Firewall, Application ControlRadisys – Mobile Security, LTE, 3G, FemotocellFireEye – Malware Protection