portfolio of services who is mrhouston
play

PORTFOLIO OF SERVICES Who is mrHouston? 360 Our story We have - PowerPoint PPT Presentation

PORTFOLIO OF SERVICES Who is mrHouston? 360 Our story We have been maximizing our clients value for over 18 years. We are a key player in ICT management. Who we are Our multidisciplinary, highly qualified team is composed of 50 people.


  1. PORTFOLIO OF SERVICES

  2. Who is mrHouston? 360º Our story We have been maximizing our client’s value for over 18 years. We are a key player in ICT management. Who we are Our multidisciplinary, highly qualified team is composed of 50 people. TECHNICAL SUPPORT SOFTWARE INTEGRATION What we do IT INFRASTRUCTURE DEVELOPMENT We cover every technological need of our clients CONSULTING, giving 360º IT service. We nurture large scale TRANSFORMATION projects in a wide array aspects. How we do it We are at the forefront of IT and we empathetically and dynamically understand our clients’ business es. DIGITAL CYBERSECURITY Our values TRANSFORMATION Knowledge, trust, commitment and confidentiality. 2

  3. Portfolio of Services We a r e y o u r Te c h n o l o g y P a r t n e r Software Digital Cybersecurity IT Infrastructure Development Transformation  Development Methodologies  Analysis and Integration Of  Network Operations Center  Technological Ecosystem and Operation. 24x7x365. Solutions and Equipment. Design.  Customized Programming.  Network and Workstation  Monitoring Services.  Professional As A Service.  Web Applications.  Security Audits + Ethical  Digitization. Management.  Mobile Apps.  Cloud Services/Platforms.  Digital Transformation. Hacking.  Integrated Solutions.  Corporate Security  Business Continuity and  Business continuity.  Consulting. Contingency Plans. Processes.  Office Setup. 3

  4. Software Development

  5. Software Development H o w d o e s o u r S o f t w a r e D e v e l o p m e n t Te a m Wo r k ? Development Maintenance Customization According to the Support and evolution of Platforms and Company’s Needs Applications that have been Implemented Consulting Implementation Understand Business Processes and Installation of the Chosen Solution Objectives 5

  6. Customized Software D e v e l o p m e n t o f Te c h n o l o g y P l a t f o r m s i n t h e F i e l d o f I n f o r m a t i o n S y s t e m s DevOps and Methodologies  Developer-teams Training  Organizational Transformation  Methodology Implementation Customized Development  Business Solutions  Complex Algorithms Multilanguage. Secure by Web Applications Multiplatform. Design  Multitechnology We use a technology Security is key, from  eCommerce agnostic approach. design to implementation. We tailor the most We comply with the adequate solution to the highest security standards Mobile Apps client ’ s needs. in the industry.  Apps Development  Operating Systems: IOS and Android Solution Integration  Analysis  Modeling  Debugging 6

  7. IT Infrastructure

  8. IT Infrastructure We D e f i n e , A s s e s s a n d C h o o s e S o l u t i o n s . We a d a p t a n d I n s t a l l N e w S o f t w a r e , H a r d w a r e a n d I n f o r m a t i o n S e r v i c e s Systems Network Virtualization Engineering Administration Management  Platforms: Windows, Mac  Networks.  Business Continuity.  Technical Projects:  Wifi Networks.  High Availability. • OS X, Linux, Unix. New Offices  Corporate Servers.  Secure Remote Access.  Server Addition. • Office moving  Workstation Management.  Information Encryption.  Reduction in Physical Space  Audiovisual Installation.  Storage and Backup.  Data Offshoring.  Connectivity of Isolated and Consumption.  User Mobility.  Professional Internet  Quick Recovery from Server Areas.  Cloud Platforms. Circuits. Crashes.  Prevention of Discontinued Platforms. 8

  9. Infrastructure and NOC 24x7 Applications Network Planning and Design Equipment Purchase and Operating Installation Systems Virtualization Analysis and optimization Hardware and Software Databases Network Storage Integration Servers Operations Center Incidence Management Help Desk Network and Monitoring and Management Support 9

  10. ICT Engineering Tu r n k e y S e r v i c e s N e w O f f i c e s a n d O f f i c e M o v e s 3 1 Technical Projects Multimedia and Audiovisual We are experts in designing and installing We choose and install the most adequate new offices and moving offices to the new audiovisual equipment for conference locations. rooms. 2 4 Data Centers Design and Installation Connectivity We set up data processing centers with We connect isolated areas. optimal temperature control, power Cabling and service provisioning. supply and grid connection. 10

  11. Unified Communications A u d i o , V i d e o a n d S o f t w a r e C o n v e r g e n c e P r o j e c t s Telephone and Voice Services Implementation of MS Exchange + Lync Solutions Unified Communications MS Office 365 Implementation or Migration • Installation and Maintenance of Projects Switchboards and User Terminals. Installation of • Voice/IP services. Property-based Solutions • Cloud Services: Intelligent Network and Videoconference Call Center Solutions. Cloud Solutions • Voice Recording and Storage. • Encrypted Communication. Virtual Network Operator License 11

  12. Cybersecurity

  13. Cybersecurity 360º Security Audits and Security Master Plan Penetrationg Testing Regulation Corporate ISO 27001, ISO 22301 Regulatory Compliance compliance processes Arbitration Ethical Hacking + Mediation Incident Management End Point Hardware and SOC 24x7 Network + Security Monitoring software Security Operating Communications Ongoing Automated Center Pentesting Infrastructure 13

  14. Ethical Hacking The intrusion tests simulate a real cyberattack against your infrastructure in a controlled way, allowing us to evaluate the capacity of your system to avoid these cyber attacks. Proceure Asset Test • Mitigate potential threats to better protect the integrity of your network. Network • Manage potential vulnerabilities with Infrastructure more information. End Point Web Page • Reduce the cost associated with network downtime. Access to • Maintain a good corporate image and Information customer loyalty. Cloud Business • Comply with regulations and mitigate Connections Applications sanctions. WiFi Communications + VPN 14

  15. SecureT est SecureTest is a web questionnaire that allows the respondent to have a quick and accessible result about their level of vulnerability, in basic aspects such as logical, physical security, legal compliance and business continuity. Tipe of • With 8 categories and between 78 and 124 questions, Company SecureTest adapts to the respondent, eliminating or adding Physical questions, dynamically, and pondering the answers, until Security correctly defining the client's risk position. • SecureTest is dynamic and adapts the questions to be asked Logical Security based on the information provided by the respondent. • Its usability allows it to be answered by different people at Data different moments of time. Protection • It facilitates an approach assessing technology, processes and Mobility people involved. • Generates a general assessment, with observations and Outsourcing & recommendations. Providers • It generates a specific assessment for each of the categories, Gaps & also with observations and recommendations, to be able to Continuity focus on the areas to be improved. • It allows establishing a temporary review plan for the fulfillment of short and medium term objectives. GLOBAL GDPR 6,91 8,04 RESULT: RESULT *: * This note is based on the organizational and technical measures proposed by the new 15 European data protection law of May 2018 and which ratifies Spain to Nov. 2018

  16. Hardware and Software H W a n d S W S o l u t i o n s A c c o r d i n g t o t h e Ty p e o f R i s k Risk Security Area Reputation, Image and Networks and EndPoint Applications Mobile Devices Breaches Infrastructure Antivirus / Anti Ransomware / Anti malware Social Networks Email Address Protection Deep and Dark Web Information Encryption External NG Firewall / UTM IPS/IDS APT WAF Sandboxing VPN DDos Authentication(PAM, PKI) and Access (NAC) Mixed BYOD AMP : Advanced Malware Protection BYOD : Bring Your Own Device SIEM EMM : Enterprise Mobility Management WAF : Web Application Firewall EMM Internal MDM MAM MCM APT : Advanced Persistent Threat MS IPS / IDS : Intrusion Prevention/Detection Device Security Device Management Application Management Content Management DDos : Anti denial-of-service attacks SIEM : Security Information & Event Management Data Leakage Protection (DLP) PAM : Privileged Account Management Back Up Copy and Restoration UTM : Unified Threat Management 16

  17. SOC 24x7 Internal Sources External Sources S e c u r i t y O p e r a t i o n s C e n t e r Networks and Dark EndPoint Applications Mobile Devices Social Networks Infrastructure Web LOGS Collection Data Collection Systems Incident Management Regular Monitoring and Resolution Automated Pentesting CAPACITY PERFORMANCE SECURITY AVAILABILITY Managemen t Management Management Management LOGS Correlation DATA Correlation • Brand Protection • Hacktivism Machine Learning SIEM Forensic Analysis • Competitive Monitoring • Fraud • VIP ´ s & Senior Management • Intellectual Property • • Event Correlation Anomaly Detection • • Pattern Identification Thresholds / Policies Report generation Balance Drill Down and Charts, Statistical API Trends Alerts Scorecard Investigation Analysis Integration 17

  18. Consulting

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend