33
Corporate Presentation TM

NSS Corporate Presentation · Quality Management 8 NSS Data Assurance Policy NSS places a high level of importance in protecting the data of the company and its customers as well

  • Upload
    others

  • View
    18

  • Download
    0

Embed Size (px)

Citation preview

Corporate Presentation

TM

0201

0306

05 04

Founded by Engineers01

Values (Flexibility, Trust, Effectiveness)02

Solutions Oriented03

Value Added Distributor04

Method (Specialization, Improvement, Innovation)05

Motto (Affordable Cutting Edge)06

2www.nss.grOur Concept

It’s Been a Long Journey for us

Serve with heart, no matter whatJUNE2005

DEC2005

NSS has been created by a group of enthusiasts in IT innovation with a primary focus in IT Integrated Solutions and Services.

We started in a basement, with only 3 persons

We became 5 people in December

Have moved to NEW OFFICES being 8 people

JAN2008

Becomes a TRUE 100%Value Added Distributor Selling ONLY Indirectly

MAR2008

Have started our first EXPORTS in Cyprus

NOV2011

Becomes SOPHOS Distributor focused in the area of SE Europe

DEC2007

NOV2015

MAR2014

OCT2016

Becomes CYBERARK Distributor

NOV2012

Decided to include Strategic Focus to Enterprise Market

Created Mobile Office Unified Communications Cloud Service

Becomes GLOBALSIGN Distributor and Territory Preferred Partner

TM

We Love to Work We Know Our Job

Serve with heart, no matter what

NSS is a true Value Added Distributor investing in KNOWLEDGE whereas

stocking distributors invest in Inventory.

We are an active TRAINING & SUPPORT Center officially for all of our Vendors

NSS is a neutral & knowledgeable VAD in the area of Southeast Europe, working

with all the important System Integrator Partners in 13 Different Countries

MAY2017

Becomes TRUSTWAVE Distributor

7www.nss.gr

StrategizeProvide Strategic

Guidance & Advice

DesignPlan & Architect

Turnkey Solutions

ImplementIntegrated Technologies according to Customer

Preferences

EducateTrain the Reseller

Workforce and create Field Engineers

SupportMaintain & Support Ongoing Operations

Our Added Value

8www.nss.grQuality Management

NSS Data Assurance PolicyNSS places a high level of importance in protecting the data of the company and its customers as well as ensuring the quality of service it provides, according to the standards of ISO 27001:2013 and ISO 9001:2008 respectively.

NSS Quality Objectives

★ Absolute specialization in the fields of its business activity.

★ Continuous qualitative and quantitative improvement of the quality of products and services.

★ Modern and responsible treatment of all customers needs.

9www.nss.gr

3500CUSTOMERS

62mPEOPLE

13COUNTRIES

200RESELLERS

CYPRUSMALTA GREECE

BULGARIA

ALBANIA

ROMANIA

SERBIABOSNIA &HERZEGOVINA

CROATIA

SLOVENIA

MONTENEGRO

Countries of Engagement

FYROM

KOSOVO

10www.nss.grService Delivery Process

“We believe that Professional Services Quality is one of the most important aspects in successful

business activities. We continuously try to leverage our partners’ skills by continuous training, so that

they can deliver excellent field services and ensuring successful implementations at the same time”

SERVICE DELIVERYPartners are Trained Properly

to deliver Services following the best implementation

alternatives

BEST STATUS

NSS Relation with the

Customer is UNNECESSARY

GOOD STATUS

NSS Relation with the

Customer is NECESSARY

QUICKSTARTNSS is delivering the Services to the Customer on behalf of the Partner for a quickstart

QUALITY ASSURANCEWe are continuously assuring that the projects are delivered

according to the best practices

MAINTAIN STATUS

NSS Relation with the

Customer is NON EXISTENT

ON-JOB TRAININGPartner is delivering Services with the Help of NSS learning

actively the solution

BETTER STATUS

NSS Relation with the

Customer is USEFUL

NSS products are

always following the

Affordable Cutting

Edge principle

11www.nss.grProduct Portfolio

@

12www.nss.gr

Sophos Security Products are working Simple and can be integrated, working together and being Synchronized working together as One⦿ Unified Security concept for all solutions

⦿ Endpoint Security for Workstations & Servers

⦿ Data Encryption for Media, Net Shares, Cloud

⦿ Nextgen Web Security & Application Control

⦿ Email Security & Data Leakage Protection

⦿ Mobile Security for Phones & Tablets

⦿ Support for all Operating Systems

⦿ Synchronized Security and Analytics

Synchronized Security

Synchronized Security

Sophos Central Mgmt.

Root Cause Analysis

Script-based Malware

Phishing Attacks

.exe Malware

Non-.exe Malware

Malicious URLs

RemovableMedia

UnauthorizedApps

Exploits

13www.nss.gr

CyberArk provides a critical new layer in the overall security strategy, controlling the path of Privileged Account Security, the origin & target of every attack

Privileged Account Security

⦿ Discover, protect and manage all the

privileged account credentials in

Organizations

⦿ Control, isolate and monitor privileged access

and activity on servers and databases

⦿ Use real-time privileged account analytics to

detect and respond to in-progress attacks

14www.nss.gr

Trustwave helps businesses fight cybercrime, protect data and reduce security risk, using many integrated technologies and SpiderLabs research team⦿ Trustwave WAF delivers advanced, continuous

protection for all Web applications.

⦿ Trustwave Database Security solutions enable

companies to secure their relational

databases and big data stores with sensitive

data.

⦿ Trustwave NAC is a scalable solution

designed to protect any network

infrastructure, offering full protection for all

endpoints.

Smart Security on Demand

15www.nss.gr

Enorasys is a Security platform enabling continuous Situational Awareness and Targeted Response to threats to advanced cyber threat attacks

Security Analytics & Response Orchestration

⦿ Enorasys SOCStreams is streamlining all core

Security Operations Center (SOC) and Cyber

Incident Response Center (CIRT) processes

⦿ Enorasys Security Analytics delivers early

compromise detection by analyzing the logic and

exploitation paths of an attack

⦿ Enorasys SIEM is a scalable solution for both log

management and real time security analysis

16www.nss.gr

iboss Web Security goes beyond protecting the browser and is designed to secure any device anywhere, anytime, directly to cloud

Web Security, Analytics & MDM

⦿ Next Generation Web Security Gateway

⦿ FICO™ Behavioral Cyber Scoring Anti-Fraud

⦿ Malware Scanning & Behavioral Sandboxing

⦿ Network Anomaly Detection & Visibility

⦿ App Prioritization & Bandwidth Optimization

⦿ Risk Management & Threat Isolation

⦿ Incident Response / Logging & Reporting

⦿ MobileEther MDM Integrated Solution

17www.nss.gr

Using Boldon James Data classification companies can take decisions about how data is managed, protected and shared, both within and outside.

Document Classification

⦿ Improve data security awareness

⦿ Enforce corporate security policy

⦿ Identify and secure valuable data

⦿ Increase effectiveness of DLP & IRM

⦿ Demonstrate regulatory compliance

⦿ Empower users and transform company

security culture

18www.nss.gr

SealPath allows companies to Protect its Critical Documents wherever they are without high costs or complex technologies allowing them to be controlled

Document Security

⦿ Protect critical and confidential documents

⦿ Distribution & Access monitoring of documents

⦿ Private data environment controlled globally

⦿ Modify restriction policies dynamically

⦿ Revoke access to the documents in real time,

whenever & wherever they are

19www.nss.gr

GlobalSign Identity and Security Solutions enable enteprisesaround the world to conduct secure online communications

PKI Solutions & Identity Services

⦿ Globalsign Certificates are trusted by any

Browser, OS, Device and Application and are

used for Server Identification, Digital Document

Signing, Digital IDs, Timestamping etc.

⦿ GlobalSign Access Control & Authentication

Control which users, machines and devices can

access corporate networks and services

⦿ Code Signing certificates certify that a signed

application is legitimate and comes from a

known software vendor

20www.nss.gr

LogPoint is a simple but super powerful SIEM platform, with a straightforward architecture, categorization and a simple search language

SIEM & Log Management

⦿ Easy Integration & High Performance

⦿ Supporting many Vendor Devices by Templates

including Normalizations & Dashboards

⦿ Complex Processing with Simple Methodology

⦿ Easy deployment and Maintenance

⦿ High availability, Scalability & Decentralization

⦿ Affordable in Price

21www.nss.gr

Netsparker finds and reports Web Application Vulnerabilities, with unique and accurate Proof-Based Scanning Technologies producing a Proof of Concept to without false positives.

Web Application Security Scanning

⦿ Fully automated (pre-scan and post-scan)

⦿ Automatically detects security issues in

websites, web applications and web services.

⦿ Detects SQL Injection, Cross-site Scripting and

other Web Application Vulnerabilities

⦿ Provides vulnerability remediation solutions

⦿ Easy deployment and Maintenance

22www.nss.gr

Corero Network Security is dedicated to improving the security and availability of the Internet with innovative DDoS & Network Security Solutions

DDoS Protection & Mitigation Services

⦿ Protect against DDoS attacks and cyber threats

⦿ Combination of signature matching and

protocol behavioral analysis to safeguard

against zero-day attacks

⦿ Comprehensive attack visibility and forensics

⦿ Behavioral & Multi-Layer Defense analysis

⦿ Available for the Enterprise or Carriers with

Modular Increments of 10 Gbps

23

Array Networks creates Network Optimization solutions that can increase employee Productivityand business agility with dramatic cost savings⦿ Array’s secure access solutions seamlessly

connect personnel with the business applications

they need to drive productivity and profitability

⦿ Array solutions can easily adapt to meet the

access requirements of any organization

⦿ Vodafone, Humana, KDDI, Amdocs, ChinaCache,

Morgan Stanley, Moody's KMV, CNN, Bank of New

York, Bank of China and many others use Array

Server Load Balancing, Secure GW, WAN Optimizationwww.nss.gr

ApplicationServers

External Users

InternalUsers

Storage

24

comBOX Virtual Leased Line guarantees a single, optimized, uninterruptible connection to the Internet through bonding of all existing types of connections including DSL, Cell, Satellite etc⦿ Maximum reliability, speed & redundancy

⦿ Adaptive self-tuning for traffic distribution

⦿ Real-time data compression

⦿ Adaptive TCP tuning

⦿ Performance enhancing proxy (TCP split)

⦿ Dynamic traffic shaping

⦿ Advanced congestion control

WAN Bonding & Cloud Connectivitywww.nss.gr

25www.nss.gr

PePLink specializes in Internet redundancy, WAN Link Load Balancing, Failover, High Availability, Wireless and Business Continuity solutions

Link Load Balancing, Wifi & SDWAN

⦿ PePLink Load Balancers enable the combination

of multiple lower-cost internet connections

⦿ All devices are easily managed and can be setup

without deep knowledge of networking

⦿ PePLink creates wireless mobility solutions for

business or large city-wide deployments

⦿ MediaFast Content Caching Technology enables

on-the-fly content delivery and downloads.

26

CommuniGate Pro unifies Communications, including Email, Presence, IM, VoIP and Mobile Access using Standards for maximum Flexibility⦿ Maximum scalability and High performance

⦿ Ease of Administration and Granular Delegation

⦿ Robust & Open Development environment with

Rich APIs including XML

⦿ Support for UNIX, Linux, Windows, BSD, OSX etc

⦿ Dynamic Clustering with Open-End Architecture

⦿ PBX, Voicemail, ACD, Email and IM applications

⦿ Supporting standard clients including Outlook,

Thunderbird, Apple Mail, IM Clients etc

Unified Communicationswww.nss.gr

Email ContactCenter

Collaboration

Calendar

InstantMessaging

Mobility

Scalability

WebApps

VideoCalls

VoiceMessages

IPTelephony

AudioConferenceUnified

CommunicationsServer

SMTP, SIP, IMAP, LDAPXIMSS, CALDAV, WEBDAV

RADIUS, FTP, HTTP,

27

Mobile Office is an effective combination of many superior products in order to create a Unified Communications experi-ence in the Cloud as a service⦿ Cross platform solution, easily customized

⦿ WebRTC browser Voice & Video Calling

⦿ Android & iOS Mobile Native apps

⦿ VoIP PBX & IVR with Multilanguage Support

⦿ Security features including Antivirus Protection,

Sandboxing and Multi-Layer Antispam

⦿ Unparalleled Scalability with easy Third-Party

Systems Integration

Unified Communications & Security (SaaS)www.nss.gr

28

Patton is a leader in the area of Connectivity and Network Solutions, bringing innovative technologies easy to integrate to existing infrastructures⦿ VoIP gateways & routers

⦿ Multi-service access systems

⦿ Interface converters & ethernet extenders

⦿ Serial communication systems

⦿ G.SHDSL ipDSLAMs

⦿ Dedicated (xDSL) access servers

⦿ Network termination units (NTUs)

Communication, Access & Network Solutionswww.nss.gr

29

Infrascale solutions consist of Enterprise Disaster Recovery and Cloud Backup helping to mitigate the downtime caused by server crashes, ransomware attacks, or natural disasters.

www.nss.gr

⦿ Platform Independent supporting Windows,

Linux, UNIX, MacOS X and more

⦿ Software Defined Networking

⦿ Hybrid & Cloud Options

⦿ Triple Layer Encryption

⦿ Ransomware Mitigation

DR as a Service (DRaaS) & Cloud Backup

30

SEP provides a comprehensive and highly Scalable Backup and Disaster Recovery solution, supporting all OS architectures of various sizes and diversity

Physical / Virtual Backup & Disaster Recoverywww.nss.gr

Database Level

Application Level

Virtu

aliza

tion

⦿ Platform Independent supporting Windows,

Linux, UNIX, MacOS X and more

⦿ Multi-Streaming Technology

⦿ VMware, RHV, Hyper-V and Citrix Virtual Support

⦿ Data Deduplication & Replication

⦿ Supporting backup for Exchange, GroupWise,

Lotus Notes, Scalix, Zarafa, OX and more

⦿ Bare Metal Disaster Recovery

31

Proxmox is an innovative Virtualization Platform with very powerful Enterprise Features like Clustering, Auto Migration and Snapshots⦿ Proxmox is based on KVM virtualization and

container-based virtualization and manages

KVM virtual machines, Linux containers (LXC),

storage, virtualized networks, and HA clusters

⦿ The management interface of Proxmox is a

powerful intuitive Web Interface

⦿ Online migration does require shared back-end

storage like NFS

Innovative Virtualizationwww.nss.gr

32

Jacarta Environmental Monitoring devices support temperature, humidity, water leak, smoke, voltage, security & power consumption monitoring⦿ Jacarta products are highly reliable solutions

that are straightforward to install and use, but

also extremely cost-effective

⦿ Environmental conditions can be monitored and

logged, alarm thresholds configured, and

automated early-warning alerts delivered to key

IT personnel via telephone voice messages,

SMS, email, web browser and SNMP traps

Power & Environmental Monitoringwww.nss.gr

Get in Touch

[email protected]

+30 2105914326

@nsscorp

nss-corporation

facebook.com/nsscorpgr

NSS Corp

NSSCorporation

nss.gr/en/rss