Upload
kuwait-computer-services
View
468
Download
2
Embed Size (px)
DESCRIPTION
Kuwait Computer Services (KCS) Lenel Value Added Reseller (VAR) / Dealer in Kuwait & Bahrain (http://kcs.com.kw) OnGuard's Total Security Knowledge Management Solutions seamlessly integrate synergistic technologies using open architecture design standards. Compatible with the Microsoft Windows Servers operating systems, OnGuard offers advanced access control, alarm monitoring, digital video, intrusion detection, asset tracking, information security integration, credential production, and employee and visitor management functionality. Individual application modules are available as standalone systems or can be deployed in any combination to deliver a single, seamlessly integrated solution.
Citation preview
Lenel Systems International Inc.CORPORATE OVERVIEW
PERPETUAL INNOVATION
Open ArchitectureLenel protects customer investments through open architecture in software design and hardware support, providing indispensable value as a customer’s investments in Lenel solutions expand and evolve. Lenel solutions are designed to grow as the customer’s security system grows. Whether that growth entails expansion of an existing system or the addition of new system modules, Lenel solutions will enable them to achieve their security objectives while minimizing risks commonly found with proprietary systems. Lenel is the open standard.
OnGuard OpenAccess™ Alliance ProgramIn the spirit of open architecture, Lenel has committed to fulfilling customers’ demands for integration through the OnGuard OpenAccess Alliance Program. Open to any manufacturer who pledges to continuously provide interfaces that support each OnGuard version, the Program reinforces Lenel’s belief that the customer should determine which products best meet their requirements. Lenel supports this initiative by making the OnGuard APIs available to participants. Any manufacturer, whether it offers complementary or competing technology, is welcome to join. Lenel makes partnering easy.
Total Cost of OwnershipLenel develops to industry standards, allowing customers to work with familiar technologies such as Microsoft Windows, Microsoft SQL Server and Oracle. In every instance, customers can choose to furnish their own computing power for desktops and data centers through their traditional acquisition vehicles. For example, Lenel offers solutions such as IP video management that enable customers to leverage their established purchasing vehicles for computing and storage. Customers who have adopted Oracle as their corporate standard for databases can use Oracle for their Lenel solutions. Lenel reduces cost.
Seamless IntegrationEach module in the Lenel product suite can be deployed as a stand-alone application or can be seamlessly integrated with any other applications in the suite. For example, OnGuard users can implement a stand-alone digital video solution, or can seamlessly integrate it with access control. All OnGuard products are developed using a single body of source code. They are designed to work together and share the same database, user interface and reporting mechanisms. Lenel defines integration.
InteroperabilityData accuracy is crucial to the success of any security system. Lenel solutions include tools to ensure that the customer’s security system data can be shared with any business information system, regardless of the objective. Data from external sources such as provisioning systems, human resources databases and web portals can be imported into Lenel systems. Imported data can include new cardholder information, visitor profiles or new event information used for forensic investigations. Lenel sets the standard for interoperability.
Ease of UseLenel solutions are built with the user in mind, and contain mechanisms that make system operation efficient and straightforward. Most critical actions can be accomplished with one or two mouse clicks, ensuring that operators can perform critical monitoring activities even in high pressure situations. Additionally, each application includes an interactive online help resource that can be accessed by clicking on the area of the screen in question. Lenel makes security easy.
Lenel Development PhilosophyStandards-oriented, Feedback-driven Development - Lenel develops using a standards-oriented approach that meets the demands of today’s security customer, serving both their immediate and long-term interests. Application critical customer feedback helps ensure that Lenel’s products provide solutions for the most sophisticated applications. Lenel consistently designs products that adhere to industry standards for networking, databases, computing, storage and inter-business system communications. Lenel develops for the future.
About LenelLenel Systems International is a global leader in the development and delivery of scalable, integrated systems for the commercial, industrial, and institutional security markets, with nearly 13,000 system implementations in more than 75 countries. Headquartered in Rochester, New York, Lenel has additional operational centers in London, Beirut, and Hong Kong, and sales and support coverage in all major world markets. Lenel is part of UTC Fire & Security, a United Technologies Corp. (NYSE:UTX) business unit. More information about Lenel can be found at www.lenel.com.
About UTC Fire & SecurityUTC Fire & Security is a business unit of United Technologies Corporation (NYSE:UTX). UTC Fire & Security is a global provider of fire safety and security solutions serving more than one million customers throughout the world. United Technologies Corp., based in Hartford, Conn., is a diversified company providing high technology products and services to building and aerospace industries worldwide. More information about UTC Fire & Security can be found at www.utcfireandsecurity.com.
Company MissionLenel’s mission is to provide innovative and superior solutions that enable organizations to protect their people, operations and information.
Lenel accomplishes this through relentless development of new security technology for the global marketplace. Lenel solutions are designed to leverage the customer’s IT infrastructure and standards, thus providing improved automation, responsiveness and productivity.
Lenel‘s greatest asset is its people. The company sustains a unique and thriving culture through a devotion to entrepreneurship, continuous learning, reinvention and adaptation, all tied to a drive to realize customers’ needs. Lenel employees act like owners and are empowered to make a difference. The Lenel team is comprised of a well-balanced mix of experienced industry and corporate veterans, new recruits from leading educational institutions, and highly-charged technology/customer service enthusiasts.
OnGuard ID CredentialCenterOnGuard ID CredentialCenter is a “one-stop shop” for enrolling and producing ID credentials. From designing graphical badge layouts to assigning physical access levels, OnGuard ID CredentialCenter gives organizations and their cardholders everything they need. Operators can produce new credentials efficiently with minimal training. Advanced capabilities such as LDAP Directory connection, biometrics and smart card enrollment are also available.
OnGuard VideoManagerOnGuard VideoManager is the most flexible offering on the market for organizations that are seeking an integrated video system. OnGuard VideoManager allows customers to manage both digital video recorders and network video recorders, enabling them to configure, monitor, analyze and manage an entire security video system from within one application.
OnGuard IntelligentVideoOnGuard IntelligentVideo combines the most advanced series of analytic capabilities available for use in everyday monitoring scenarios. The application can be configured to detect specific incidents or circumstances that would not be readily obvious to the untrained eye, thereby enabling system operators to respond immediately. Algorithms include Directional Motion, Object Left Behind, Object Removed, Congestion, Loitering and People Counting, among many others.
OnGuard VisitorOnGuard Visitor is a dependable and cost-effective visitor management application that enables an organization to manage and track visitors throughout its facilities, using standard desktop technology. OnGuard Visitor allows operators to institute a systematic process for enrolling and badging visitors. Photos of each visitor are captured and logically linked to the cardholder being visited.
OnGuard Area Access ManagerOnGuard Area Access Manager (AAM) is a business productivity solution that allows system administrators to decentralize to the department level the process of administering access permissions. This enables authorized managers to directly control cardholder access to specific physical areas for which they have responsibility. AAM is particularly valuable for departments that get frequently requests for access modifications.
OnGuard Integration ToolsUsing OnGuard Integration Tools, customers can develop interfaces to any business information system, to permit exchange of critical data between OnGuard and external systems. In leveraging Microsoft’s WMI, OnGuard Integration Tools offer customers a real-time, bidirectional data transfer solution.
OnGuard Fire & IntrusionOnGuard can be extended to manage events from intrusion panels, central station receivers and fire panels. Using OnGuard, intrusion and central station events can be easily managed, linked to other events and tied to video footage. Customers can send alarms from their fire panels to OnGuard for secondary annunciation.
OnGuard EnterpriseOnGuard Enterprise is the industry’s leading, patented multi-server, synchronized database solution, designed for enterprises with facilities in multiple regions spread across geographical locations. OnGuard Enterprise allows Corporate Security and IT managers to maintain central control over the entire integrated security system, while allowing regional offices to maintain independence and autonomous operations of their respective individual regional security systems.
OnGuard AccessOnGuard Access is an advanced access control application that includes a feature-rich alarm monitoring module. IP-enabled controllers allow the application to extend easily to all parts of the enterprise with the appropriate degree of security at the door. OnGuard Access has built-in support for all card technologies including DESFire, MIFARE and iCLASS smart cards, as well as biometrics and wireless access control devices.
OnGuard®
OnGuard is the most expansive security integration platform available on the market today. OnGuard is the brand of choice for the world’s most security-conscious customers, with applications relevant to every major industry, tools for integration to any business application, and more extensive device support than that offered by any other manufacturer. OnGuard is available in a wide variety of languages including Spanish, French, Chinese, Arabic, German and Hebrew, among others.
Global In-field, Pre-sales SupportLenel has built a global support system for customers and consultants. This support network includes regional business managers and field engineers tasked with ensuring that the marketplace understands the capabilities of Lenel solutions, and that customers can realize the full potential of those solutions. The list of Lenel’s Business Development and Regional Sales Managers is available at www.lenel.com.
Global VAR NetworkLenel goes to market through a best-of-breed Value Added Reseller (VAR) channel. Lenel VARs can be found in every major global market, reaching many multinational organizations. Lenel VARs must maintain a high level of technical competency and a track record of customer satisfaction and support. VARs handle all Lenel installations and often work together on multinational projects, enabling local competency to be achieved everywhere.
Lenel Factory IntegrationFrom desktop workstations to fault tolerant servers, the Lenel Systems Integration group is Microsoft-, Dell- and NEC-certified. This ensures customers of top-shelf services when deploying OnGuard systems on general purpose servers, or with high-availability redundant configurations such as NEC ExpressCluster or MS Clustering.
Lenel Learning SolutionsLenel offers factory training for VARs and system users worldwide through its competency centers in Rochester, London, Beirut and Hong Kong. Lenel also offers regional training courses for VARs and on-site training for system users. In addition to these classroom training options, Lenel offers an array of distance learning programs to help those already trained maintain their certification. Classes provide instruction in all aspects of OnGuard, and offer exposure to specialized OnGuard applications.
Global ServicesLenel employs a team of highly-trained security professionals who have extensive experience in a wide range of Lenel system deployments. This expertise enables the team to provide expert-level support services that complement the Lenel VAR. Lenel Global Services is there to assist, whether the need is to remotely manage some or all of a customer’s applications, deploy an OnGuard Enterprise or IdentityDefender solution, provide high-level interface scripting or have a Lenel professional working on-site. The Lenel Global Services team has provided customized solutions to hundreds of Lenel customers.
Technical SupportLenel’s Technical Support group is staffed by experienced professionals from the security and IT industries. The team strives to provide all Lenel customers with the best possible service experience. Standard Technical Support is provided through Lenel VARs. Emergency 24x7 and Direct System user support contracts are also available if needed.
Full Array of Support Services
IdentityDefender®
The IdentityDefender identity management suite offers a new and cutting-edge way to create a completely secure credential issuance and management solution for commercial or government applications. A smart card-enabled identity solution offers the freedom to fully customize and manage both physical and logical security systems in a workflow-based environment. The IdentityDefender suite is modular and includes the IdDirector identity management system (IDMS), the IdCollector enrollment module, the IdProducer card production module and the IdActivator card issuance module. An advanced series of intelligent checks and balances is built into each component to ensure that the first and foremost concern is a secure workflow. A truly intelligent identity solution must create a smart card ID that is fully utilized in both the physical and logical security environments. The complete IdentityDefender suite will integrate seamlessly into any existing configuration, whether it’s a large-scale enterprise model or a single internal setup. While other products provide only a portion of an end-to-end identity management solution, IdentityDefender delivers all capabilities required for a turnkey system. So whether an organization needs to build a system from the ground up or requires only a few pieces of the puzzle, IdentityDefender can help the customer achieve a cutting-edge identity management solution.
IdentityDefender is FIPS 201-compliant and is a GSA Approved Product.
Lenel Systems International, Inc.1212 Pittsford-Victor RoadPittsford, New York 14534 USATel 585.248.9720 Fax 585.248.9185www.lenel.com
© 2006 Lenel Systems International, Inc. Lenel and OnGuard are registered trademarks of Lenel Systems International Inc. Microsoft and Windows are registered trademarks of Microsoft Corporation. Other companies and products named herein may be trademarks or registered trademarks of their respective owners, and are hereby acknowledged.
United States & Canada■ Arizona State University■ Kaiser Permanente■ Port Authority of NY & NJ■ Qwest■ Target■ Telus■ United Health Group■ World Financial Center
■ Microsoft■ Motorola■ Nissan■ Oracle■ Schlumberger■ Symantec■ Texas Instruments■ Unisys
■ Agilent Technologies■ Biogen Idec■ Boston Scientific■ Cisco Systems■ Dell■ Hospira■ HP■ John Deere
Notable Global Customers
■ Avinor – Norwegian Civil Air Authorities (Norway)■ AXA Crown Center (Belgium)■ Carrefour (Belgium)■ Central Bank of Denmark (Denmark)■ Federation Tower (Russia)■ Forth Ports (United Kingdom)■ Gösgen Nuclear Power Plant (Switzerland)■ Imperial College (United Kingdom)■ Swedish Parliament (Sweden)■ University of Oslo (Norway)■ West Midlands Police (United Kingdom)
Europe
■ Asian Development Bank (Philippines)■ DHL (Malaysia)■ Galaxy Entertainment Group (Macau)■ Grand Lisbo Casino (Macau)■ Maersk (China)■ Scania (Australia)■ Singapore Prison Department (Singapore)■ Supreme Court of Victoria (Australia)
Asia Pacific
■ Qatar Foundation (Qatar)■ MTC Kuwait (Kuwait)■ Al Faisaliah Center (Saudi Arabia)■ Deloitte & Touche India (India)■ Qatar Petroleum (Qatar)■ BurJuman (United Arab Emirates)■ Dallah Telecom (Yemen)■ Saudi British Bank (Saudi Arabia)
Middle East
■ Animal & Plant Health Inspection Service (USDA – APHIS)■ Department of Homeland Security (DHS)■ General Services Administration (GSA)■ National Aeronautics and Space Administration (NASA)■ National Institute of Standards and Technology (NIST)■ Pacific Command (PACOM)■ US Navy
US Government Agencies
Latin America & Caribbean■ Bank of N.T. Butterfield (Bermuda)■ Central Bank of Barbados (Barbados)■ Citibank (Mexico)■ Embraer (Brazil)■ Panama Canal (Panama)■ Petroleos de Venezuela (Venezuela)■ SAP (Brazil)■ Telefonica (El Salvador)■ Telecom Italia Mobile TIM (Peru, Brazil)
Africa■ Banque Nationale du Rwanda (Rwanda)■ Discovery Health (South Africa)■ Kenya Airways (Kenya)■ Sonangol (Angola)■ African Cargo (Kenya)■ Unilever (South Africa)■ Schlumberger (Angola)
www.lenel.com
Lenel helps customers reach their full security potential.
KUWAIT COMPUTER SERVICESíéTéçÇÑJ)cTçéRÜÇÑJ)UKÜa^)íÇcl
Kuwait Computer Services (K.C.S)
Mussad Al-Saleh Bldg. Soor Street, Kuwait City
P.O.Box 5113, SAFAT 13052, Kuwait
Phone: + 965 241 0799
Fax: + 965 245 9019
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976
Kuwait Computer Services (HQ).
Kuwait Computer Services (KCS)
P.O.Box 5113 Safat 13052
Musaad Al-Saleh Bldg. Sour Street
Al-Sharq, Kuwait
Tel : + 965 22410878 +965 22410789
Fax : + 965 22459019
Directions from Kuwait International Airport: Airport Taxis can be hailed from the Kuwait International
Airport. Kuwait Computer Services is located on Sour Street Musaad Al-Saleh Bldg, opposite to the Al-
Kahleeja Building (Imara Al-Kahleeja). There are a number of hotels located in the Sharq Area for
International Travelers.
Bahrain Office.
Bahrain and Kuwait Computer Services (BKCS)
Manama, Bahrain, 11142
Tel : + 973 36601112 +973 17296711
Fax : + 973 17296712
E-mail :
Office No. 102, 10th Floor, Capital Plus Tower, bldg. 79, Road 2802, Block 428 Al-Seef District
Manama, Bahrain
Today 8:30 am - 5:30 pm
Saudi Office. Kuwait Computer Services (KCS)
Office Number: 1444, 28th Floor, Kingdom Tower Center
11321 Riyadh
Riyadh, Saudi Arabia
Tel : +966 (1) 401-2179
Fax : + 973 17296712
Kuwait Computer Services has an international strategic alliance that covers a large scope
of technology. We can help you enable world class solutions for your enterprise based on
various solutions in security and enterprise solution domains. For more information, contact
sales at [email protected]
Security Solutions Partners
Axis is the market leader in network video and a driving force behind the shift from analog to digital video
surveillance, which paves the way for a more secure, smarter and safer world. Axis offers network video
solutions for professional installations featuring products and solutions that are based on innovative and
open technical platforms.
Lenel Systems International, Inc. is the global leader in advanced security systems, developing software
and hardware that effectively and efficiently protects buildings, people and assets. Ninety-two of the
Fortune 100 companies utilize Lenel products.
NEC is a Japanese Multinational provider of IT Infrastructure for Small, Medium Business and Enterprise.
Some of their product range include Servers ( Rack, Tower & Fault Tolerant ) , Storage, Server and
Storage Virtualization, Infrastructure Software ( High Availability & Disaster Recovery ) and more.
AeroScout products combine real-time location, auto-identification and wireless sensing technologies to
automate business processes and deliver context-aware applications. Unified Asset Visibility solutions
from AeroScout go beyond standalone RFID, RTLS and sensor solutions by unifying all enterprise
visibility data on a single Wi-Fi-based platform.
FOMGuard is an intrusion detection system offering a complete perimeter security solution. Through high
innovation and engineering ingenuity, the FOMGuard system supplies the most complete and reliable
solution for perimeter security today.
HID Global sells physical access control products, logical access control solutions, and secure issuance
solutions that comprise cards, readers, networked access solutions, card printer/encoders and software.
Its other business segment includes virtualization technology, cashless payment, government ID, RFID
for industry and logistics and Animal ID solutions and professional services.
OnGuard 2013 showcases hardware integration in video, access control and visitor management, as well
as additional database and operating system support. OnGuard is a centralized security management
solution. Kuwait Computer Services(KCS) is the authorized Value Added Reseller (VAR) for Lenel
OnGuard in Kuwait and Bahrain.
With the trust and confidence in individual identities provided by L-1 Identity Solutions, our customers can
better guard the public against global terrorism, crime and identity theft fostered by fraudulent
identity.Leveraging the industry’s most advanced multi-modal biometric platform for finger, face, palm and
iris recognition, our solutions provide a circle of trust around all aspects of an identity and the credentials
assigned to it.
PEVAC stands for high quality VEHICLE ACCESS CONTROL SYSTEMS and is able to present a
number of WELL-KNOWN REFERENCES from around the world. PEVAC Middle East has a network of
specialised dealers who can provide excellent service. PEVAC has more than 20 years of experience in
access control systems for vehicles in the MIDDLE EAST.
Gatekeeper is the world leader in automatic under vehicle inspection and remote access control
technologies. Gatekeeper is actively involved in combating global terror through its development and
worldwide deployment of security systems that allow vehicles to be automatically searched and drivers
and passengers to be screened from a safe distance.
As the Market Leading Manufacturer of the World-renowned Fastlane range of Entrance Control Systems
and Door Detective anti-tailgating products, Integrated Design Limited (IDL) has grown organically since
Inception in 1985. A member of the British Security Industry Association with a commitment to Quality,
Innovation and Customer Service. Certified to IS09001:2008 Approved Quality Standard.
Once installed in the vehicle,the SecurySat Fleet beacon captures and transmits a series of data every
minute through the GRPS/SMS networks,such as geographic position, speed, direction,status of the
vehicle,date,day,time or any digital or analogue alerts.Through this facility, you can visualize your entire
fleet on the road and therefore control and optimize its activity
Enterprise Solutions Partners
HRB is a comprehensive and flexible software product, developed to satisfy present day Human
Resource Management(HRM) standards and business needs.HRB suite of products consists of a series
of fully integrated modules, which can be implemented as a standalone complete HRM solution or
deployed individually to address your specific HR needs.
IBM Cognos Business Intelligence delivers a revolutionary new user experience and expands traditional
business intelligence (BI) with planning, scenario modeling, real-time monitoring and predictive analytics.
Using a limitless BI workspace that supports how people think and work—in the office, on the go and
even offline—you can interact with, search and assemble all perspectives of your business. Built on a
proven technology platform, Cognos Business Intelligence is designed to upgrade seamlessly and to
scale cost-effectively for the broadest of deployments.
Click here to know more about Kuwait Computer Services IBM Solutions
Infosys Limited is an Indian multinational provider of business consulting, information technology,
software engineering and outsourcing services. It is headquartered in Bangalore.Infosys is the third-
largest India-based IT services company by 2012 revenues.
Infor offers a full range of enterprise business software including customer relationship management,
enterprise asset management, enterprise resource planning, financial management, human capital
management, performance management, product lifecycle management, supplier relationship
management, and supply chain management, including business specific inventory management,
transportation logistics and warehouse management software.
Microsoft Corporation is an American public multinational corporation headquartered in Redmond,
Washington, USA that develops, manufactures, licenses, and supports a wide range of products and
services predominantly related to computing through its various product divisions.
Visit us on Microsoft Pinpoint: Kuwait | Bahrain |Saudi Arabia
OpenTrust SPI (Signature and Proof Infrastructure) is a complete electronic signature and proof
management solution, ideal for large organizations. It facilitates secure archiving and provides powerful
audit trail capabilities to ensure that the signature and the file associated are regarded as valid and
binding. .
The OpenTrust SPI software suite targets all organizations seeking to secure their paperless
transactions. It provides an industrialized infrastructure to rapidly implement and integrate electronic
signatures into business processes, easing the management of legally recognized elements of proof
within the ERM and BPM.
Oracle provides the world’s most complete, open, and integrated business software and hardware
systems, with more than 370,000 customers—including 100 of the Fortune 100—representing a variety of
sizes and industries in more than 145 countries around the globe. Oracle's product strategy provides
flexibility and choice to our customers across their IT infrastructure. Now, with Sun server, storage,
operating-system, and virtualization technology, Oracle is the only vendor able to offer a complete
technology stack in which every layer is integrated to work together as a single system. In addition,
Oracle's open architecture and multiple operating-system options gives our customers unmatched
benefits from industry-leading products, including excellent system availability, scalability, energy
efficiency, powerful performance, and low total cost of ownership.
Wacom Signature Tablets
Signature tablets help lower costs and eliminate inefficiencies associated with traditional paper
documentation, such as printing, filing, archiving, mailing, transporting, securing and recycling.
Wacom's signature tablets feature a patented pressure-sensitive, battery-free and cordless pen
technology to capture clear, true-to-life signatures. Pens never need batteries or a cord to carry an
electronic signal, and since no electronic signals are passed through the pen tether, pen operation cannot
be affected by damage to the tether.
Wacom's signature tablets deliver outstanding longevity and, unlike resistive technologies, are not
impacted by wear or scratches to the screen surface. They deliver superior contrast and provide an
intuitive signing experience.
ActivIdentity provides key building blocks for securing IT infrastructures and digital transactions to defend
against security threats and identity fraud and at the same time increase your organization's resource
utilization, improve productivity, and maximize ROI.
ActivIdentity offers six product lines that are the foundation for its Enterprise, Online Banking, and
Government solutions.
» Versatile Authentication
» Credential Management
» Authentication Devices
» Security Clients
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
02 15
Organization Summary Technology Project Management
Company Name: Kuwait Computer Services (K.C.S)
Head office: Mussad Al-Saleh Bldg. Soor Street, Kuwait CityP.O.Box 5113, SAFAT 13052, KuwaitPhone: + 965 241 0799Fax: + 965 245 9019www.kcs.com.kw
FoundedIncorporated in 1976 in Kuwait as a Private Kuwaiti Shareholding Company
Operation OfficesBahrain, KSA, Kuwait
Vision:Become the Premium System Integration Solutions Provider for the Region
Mission: Maintain up-to-date high level in-house expertise to develop and localize solutions as per market
requirements. This is reinforced by sustaining the partnerships with the international network of
technology providers
Core Technologies:Video, Voice and Data (Information Technology and Telecommunications)
Specialty Operations:Security (Managed & Unmanaged), Smart Facilities, Enterprise Systems & Applications Integration,
Access Control, Time Attendance, Biometrics identification
Technology Partners: Lenel, Derwent, Securysat Fleet, Aeroscout, FOMGUARD, PEVAC-ME, IDL Turnstile Gates, Webmethods,
Cognos, ActiveIdentity, Infor Systems, Robertson & Blums Corp., Identix, A4Vision.
KCS maintains a high level of project implementation standards. Such standards and protocols adhere
to the international standards published by PRINCE2 and PMI.
KCS project management definition is “Project Management is the discipline of organizing and
managing resources (e.g. people) in such a way that the project is completed within defined scope,
quality, time and cost constraints”.
Scope, quality, time and cost are the main parameters of KCS management of any project. Maintaining
a small variance between Planned and Actual values is the next ambitious value during project
management.
In general, KCS internal project management system differentiates stages and phases of projects as:
1. Phase 1: Initiation2. Phase 2: Planning3. Phase 3: Execution4. Phase 4: Controlling5. Phase 4: Closing
In each of the phases defined tasks are set to meet per phase goals and objectives. A strategic overlay
of integrated phase approach allows cost effective implementation and project life cycle. The integrated
system also serves the quality control and time of implementation by dynamically allocated proper
resources when needed.
During the initiation phase, KCS management issues the project charter as a key deliverable of the
phase. In the project charter we find the assignment of the project manager, final Scope of Work, sealing
cost, time and quality constrains. Moreover, a partial authority’s matrix is presented with internal
workflow QA system reference.
In the Planning phase, the project manager prepares his resources to work as an integrated unit to meet
planned objectives. The resources are categorized as:
1. Financial2. Human3. Materials4. Tools5. Space
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
14 03
Technology & Relationships Organization Summary
ActivIdentity Corporation is the trusted provider of identity
assurance solutions for the enterprise, government, healthcare,
and financial services markets worldwide. The company
provides the only fully-integrated platform enabling
organizations to issue, manage and use identity devices and
credentials for secure access, secure communications, legally
binding digital transactions, as well as smart citizen services.
A4Vision develops advanced biometric solutions using
breakthrough 3D machine vision technology. Our Intelligent
Identity solutions provide the ability to make secure and
informed decisions using advanced 3D face recognition.
Secury SAT, is a leading provider of satellite tracking systems.
The system presented is the core of all service solutions
presented. The essence of the service is asset protection and
tracking.
PEVAC ME, The services of specialized firms have always been
used for access control of military installations, embassies,
airports etc. However in today's society, this subject is no longer
limited to these specific vulnerable sectors. Companies as well
as private people are showing increased interest in the safety of
their property, know-how, etc. and are looking for effective
solutions to protect themselves.
Services: Technology engineering & design, procurement, installation, testing, commissioning, project
management, help desk support, workshop services, operation & maintenance, training, certification,
remote support management, Third Party Inspection.
Projects Geography:Kuwait, Bahrain, KSA, Iraq, Qatar, UAE, Jordan, Iran, Yemen, Sudan, Syria, Egypt & Oman
Human Resources: (65) staff, (30) contracted.
Strategic Alliances: 14 international companies
Insurance: Al-Takafuliah Private Insurance
Bank: Commercial Bank of Kuwait, Gulf Bank, National Bank of Kuwait
Solicitors:Al-Saleh and Partners Law Firm
Certification: All major represented products.
Quality Assurance: Internal QA Policy guided by the ISO 9001
Memberships and Affiliations:International Organizations and Universities Research Centers.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
04 13
Our Vision Technology & Relationships
“Become the Premium System Integration Solutions Provider for the Region”
Cognos is the world leader in business intelligence (BI) and
performance management solutions. We provide world-class
enterprise BI, planning and consolidation software and services
to help companies plan, understand and manage financial and
operational performance.
Infor delivers business-specific software that helps enterprising
organizations of all sizes adapt to rapid change. With
experience built in, our solutions are helping more than 70,000
companies meet their goals in a global marketplace. So go
ahead. Be as innovative as you want to be. As ready to seize
new opportunities. Infor is right beside you. Changing what you
expect from a business software company.
SunSystems is a portfolio of integrated financial management
and business intelligence applications, which help
decision-makers, gain a broader perspective on the business,
and provide the ability to analyze the operational detail. For
more than 20 years, we have delivered global, low-risk solutions
that are designed for rapid, low-cost deployment, helping our
users to meet the demands placed on the finance function.
Robertson & Blums Corporation is a leading consulting
company, providing IT and management solutions based on ERP
II class systems, which enable companies to raise their
competitive edge.
L-1 (parent of identix) L-1 Identity Solutions provides a full
range of fingerprint and palm, facial and iris biometric
technologies, as well as systems and solutions that empower
the identification of individuals in large-scale identity
management programs.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
12 05
Technology & Relationships Our Mission
AeroScout's enterprise visibility solutions use standard Wi-Fi
wireless networks to accurately locate and manage assets and
people in multiple environments. The AeroScout system includes
indoor and outdoor real-time asset location (RTLS), long range
Active RFID, choke-point visibility and telemetry, enabling
customers in numerous industries to drive revenues and cut
costs.
FOMGuard is a representative product of all the fiber optic
sensing and detection solutions developed by FOMGuard Inc.,
which impeccably detects intruders’ attempts to cut the fence or
break it using excessive forces. The operational mechanism of
the fiber optic sensor system is to measure the strengths and
travel times of the light wave pulse it sends to and receives from
the fiber optic sensor net attached to the existing fence and
check any discrepancies in the strengths or travel time of the
pulse.
3COM is a leading global provider of enterprise and
small-business networking solutions that help organizations
achieve their business and networking objectives. The company
has had a major impact on computer networking since the
creation of Ethernet in the 1970s.
WebMethods is a leading solutions provider for EAI. After
WebMethods has merged with Software AG, both create the
largest EAI software provider in the world. 4,000 global
customers achieve measurable business results by modernizing
and automating their IT systems and rapidly building new
systems to meet growing business demands.
“KCS is its Employees Who are the Loyal Trained Capabilities that Constitute the Center of Excellence used by Clients to Profit from the use of Advanced Technology”
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
06 11
Offerings (Products & Services) Technology & Relationships
KCS core competencies are spread over two functional strategic business units (SBU’s). These two units
consist of independent business processes and quality systems that govern compliance with industry
best practice and international standards/regulations.
Moreover, the solutions presented by KCS to its clients are unique. This is evident as KCS team of
engineers assists the client at the conceptual level, proof of concept, implementation and operation and
maintenance. Also, the solutions are made of multiple technologies with consideration to its current and
future application. KCS consultants work on gathering information that is critical to the solution
integrity and application.
Security Management Solutions (SMS)This SBU deals with digital security solutions related to CCTV, Access control, Physical Asset
Management (Tracking), command centers and others. The unit solutions are engineered, designed and
implemented by KCS staff in collaboration with international technology providers. The solutions core
relies on LENEL Systems products and services and its high level of adaptability and modularity.
Enterprise Solutions (ES)This SBU is specialized in enterprise centric solutions related to business intelligence, enterprise
performance management, CRM and others. These solutions are also produced in-house with open
platform technologies presented by international companies.
Some of the companies that KCS has direct or in-direct
relationship with are:
Microsoft, we're motivated and inspired every day by how our
customers use our software to find creative solutions to
business problems, develop breakthrough ideas, and stay
connected to what's most important to them.
Oracle, For almost 30 years, Oracle has been helping customers
like you manage your business systems and information with
reliable, secure, and integrated technologies.
Lenel Systems International is a UTC fire and security
company. Lenel proven field experience and multidisciplinary
approach as of its alliances with other sister companies such as
(OTIS, CARRIER, PRATT AND WHITNEY) allows accurate
solutions implementations with high level of integration.
Derwent design, develop and manufacture advanced infrared
illumination and number plate capture solutions which define
performance levels for critical technical surveillance. With a 15
year history based on engineering expertise, Derwent's field
proven products are today being delivered to critical locations
on every continent.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
10 07
Enterprise Solutions Security Management Solutions
KCS successfully helps you increase the value your IT organization provides the enterprise and to achieve
business results faster by revolutionizing the way you build systems, improve business processes,
integrate applications and leverage existing investments through our well known EAI, BPM & SOA
product suites & toolsets.
At the core of our EAI suite is an advanced ESB (Enterprise Service Bus) that provides the foundation for
your SOA with enterprise-class features you need, ensuring success. It uniquely combines proven
application integration capabilities, high-speed messaging, and support for B2B, legacy applications
and event-driven technologies to create the most complete integration infrastructure available.
Professional ServicesFollowing our Consultation, development, implementation and successful deployment of solutions, we
continue to provide consulting services and production support to our clients in order to ensure that we
address any immediate and future applicable changes that might be arise out of emerging technologies,
business process changes or compliance to match newer standards and policies.
Training and knowledge transfer: Educating your people is essential to make the most of your IT
infrastructure, but time and budgets can be limiting, resulting in a lower return on your technology
investment. A flexible education structure is needed to meet the demands of your workforce and your
business.
KCS helps you identify a set of your resources that work with us throughout the development and
implementation phase and learn from our implementation and best practices methodologies, thus
enabling you to maximize performance and productivity.
KCS Professional Services capabilities are extended through partnerships with high performing vendors
and technology implementation partners such as Software AG, webMethods, Cognos, Infor, Roberston
& Blums, Viaserv, ActiveIdentity. Oracle and Microsoft.
The security industry is on the top of the list of industries that
incorporated technology to change the way its services are created,
implemented, operated and managed. Technology applications
became an integral part of any modern security solution.
Whether, the client needs are surveillance, access control or merely
tracking of assets, multiple technologies constitute the final
solution. The common denominators of any technology based security solutions are acquiring,
transmitting, collecting, analyzing and storing.
At KCS, our security core competencies revolve around the common denominators. The in-house
expertise can accommodate high end secure technologies to use in any of the denominators phases. It
is important to allow our client to have freedom of design and create an independent solution of
trademarks that is functionality centric. Therefore, KCS has chosen to use LENEL as the core of its
systems and designs for its high level of integration to multiple technologies and machine language.
Having said that, KCS classifies its security solutions based on the level of modularity and complexity. In
general, there are three distinct classes of offering that are:
1. Enterprise Security Management Solutions (ESMS)2. Total Security Management Solutions (TSMS)3. Custom Security Management Solutions (CSMS)
Enterprise Security Management Solutions (ESMS©)This solution offering is considered the most modular solution. It is also empowered by its centralization
ability that presents seamless integration with the enterprise existing infrastructure and core services.
The fact that the solution is centralized offers today’s IT departments the ease of controlling remote
location, configuring new sites, centralized alarm management, redundancy, fault tolerance and
command center capabilities.
Most of our clients evolve into the ESMS as part of their strategic security plan side by side with their
business development plans. We join our clients at the stage of drawing board to assist them to choose
competent solutions that fits their current and future needs.
C O M P L E X I T Y
MODULARITY
ESMSTSM
SSCMS
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
08 09
Security Management Solutions Enterprise Solutions
Total Security Management Solutions (TSMS©)This is client’s entry level to medium security solution with less complexity and modularity. It
incorporates multiple functionalities and services that are specific to a unified homogenous system
(Template System) or to a geographical location.
The capabilities of the offering are wide in comparison to your day to day security needs. The solutions
will present clients with a turnkey solution to manage all their day to day security department activities.
This can include indoor/outdoor access control, parking, badging, alarm management and visitor’s
control.
The solutions are not industry specific as it is more functionality specific. Hence, the limitations of
implementation of such solutions are governed by client’s requirements.
Custom Security Management Solutions (CSMS©)The CSMS solutions are very specific solutions to a specific need. These solutions can be part of a larger
existing client security infrastructure or part of a building management system. In essence, custom
solutions are made with any degree of modularity based on existing systems and required
functionalities. In addition, at this level of solutions the environment of implementation will play a great
role in dictating the solutions parameters.
Clients tend to choose these solutions when they have immediate or very specific needs. This then will
be handled by our customization team in parallel with our technology partners.
Kuwait Computer Services offers a range of business-specific solutions to address your toughest
enterprise challenges.
Enterprise ApplicationsWhen it comes to business challenges, one size clearly doesn't fit all. Specific problems demand specific
solutions. And the solutions that give you the most value come packaged with the right functionality, so
they require less customization, shorter implementation times, and fewer IT resources to maintain. Those
same solutions must be delivered by a company with the business expertise, commitment, scale, and
financial stability to address any and all of your requirements-from small to large, from local to global-as
you grow and change.
KCS has invested in trained consultants and expertise in packaged solutions such as Business
Intelligence, Enterprise Planning, Financial Management System, Performance Management, Human
Capital Management, Enterprise Asset Management, Time & Attendance solutions.
Enterprise Application Integration & SOAIntegrated Enterprise systems have become an
imperative in today's global and dynamic business
environment. Many enterprises are still struggling with
implementation, customization, integration, upgrade
and maintenance issues, thus requiring a cost effective
implementation approach.
FMSCRM EPM HCM BI
ESSO
Standalone Applications
FMS
CRMEPM
BI
HCM
ESSO
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
08 09
Security Management Solutions Enterprise Solutions
Total Security Management Solutions (TSMS©)This is client’s entry level to medium security solution with less complexity and modularity. It
incorporates multiple functionalities and services that are specific to a unified homogenous system
(Template System) or to a geographical location.
The capabilities of the offering are wide in comparison to your day to day security needs. The solutions
will present clients with a turnkey solution to manage all their day to day security department activities.
This can include indoor/outdoor access control, parking, badging, alarm management and visitor’s
control.
The solutions are not industry specific as it is more functionality specific. Hence, the limitations of
implementation of such solutions are governed by client’s requirements.
Custom Security Management Solutions (CSMS©)The CSMS solutions are very specific solutions to a specific need. These solutions can be part of a larger
existing client security infrastructure or part of a building management system. In essence, custom
solutions are made with any degree of modularity based on existing systems and required
functionalities. In addition, at this level of solutions the environment of implementation will play a great
role in dictating the solutions parameters.
Clients tend to choose these solutions when they have immediate or very specific needs. This then will
be handled by our customization team in parallel with our technology partners.
Kuwait Computer Services offers a range of business-specific solutions to address your toughest
enterprise challenges.
Enterprise ApplicationsWhen it comes to business challenges, one size clearly doesn't fit all. Specific problems demand specific
solutions. And the solutions that give you the most value come packaged with the right functionality, so
they require less customization, shorter implementation times, and fewer IT resources to maintain. Those
same solutions must be delivered by a company with the business expertise, commitment, scale, and
financial stability to address any and all of your requirements-from small to large, from local to global-as
you grow and change.
KCS has invested in trained consultants and expertise in packaged solutions such as Business
Intelligence, Enterprise Planning, Financial Management System, Performance Management, Human
Capital Management, Enterprise Asset Management, Time & Attendance solutions.
Enterprise Application Integration & SOAIntegrated Enterprise systems have become an
imperative in today's global and dynamic business
environment. Many enterprises are still struggling with
implementation, customization, integration, upgrade
and maintenance issues, thus requiring a cost effective
implementation approach.
FMSCRM EPM HCM BI
ESSO
Standalone Applications
FMS
CRMEPM
BI
HCM
ESSO
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
10 07
Enterprise Solutions Security Management Solutions
KCS successfully helps you increase the value your IT organization provides the enterprise and to achieve
business results faster by revolutionizing the way you build systems, improve business processes,
integrate applications and leverage existing investments through our well known EAI, BPM & SOA
product suites & toolsets.
At the core of our EAI suite is an advanced ESB (Enterprise Service Bus) that provides the foundation for
your SOA with enterprise-class features you need, ensuring success. It uniquely combines proven
application integration capabilities, high-speed messaging, and support for B2B, legacy applications
and event-driven technologies to create the most complete integration infrastructure available.
Professional ServicesFollowing our Consultation, development, implementation and successful deployment of solutions, we
continue to provide consulting services and production support to our clients in order to ensure that we
address any immediate and future applicable changes that might be arise out of emerging technologies,
business process changes or compliance to match newer standards and policies.
Training and knowledge transfer: Educating your people is essential to make the most of your IT
infrastructure, but time and budgets can be limiting, resulting in a lower return on your technology
investment. A flexible education structure is needed to meet the demands of your workforce and your
business.
KCS helps you identify a set of your resources that work with us throughout the development and
implementation phase and learn from our implementation and best practices methodologies, thus
enabling you to maximize performance and productivity.
KCS Professional Services capabilities are extended through partnerships with high performing vendors
and technology implementation partners such as Software AG, webMethods, Cognos, Infor, Roberston
& Blums, Viaserv, ActiveIdentity. Oracle and Microsoft.
The security industry is on the top of the list of industries that
incorporated technology to change the way its services are created,
implemented, operated and managed. Technology applications
became an integral part of any modern security solution.
Whether, the client needs are surveillance, access control or merely
tracking of assets, multiple technologies constitute the final
solution. The common denominators of any technology based security solutions are acquiring,
transmitting, collecting, analyzing and storing.
At KCS, our security core competencies revolve around the common denominators. The in-house
expertise can accommodate high end secure technologies to use in any of the denominators phases. It
is important to allow our client to have freedom of design and create an independent solution of
trademarks that is functionality centric. Therefore, KCS has chosen to use LENEL as the core of its
systems and designs for its high level of integration to multiple technologies and machine language.
Having said that, KCS classifies its security solutions based on the level of modularity and complexity. In
general, there are three distinct classes of offering that are:
1. Enterprise Security Management Solutions (ESMS)2. Total Security Management Solutions (TSMS)3. Custom Security Management Solutions (CSMS)
Enterprise Security Management Solutions (ESMS©)This solution offering is considered the most modular solution. It is also empowered by its centralization
ability that presents seamless integration with the enterprise existing infrastructure and core services.
The fact that the solution is centralized offers today’s IT departments the ease of controlling remote
location, configuring new sites, centralized alarm management, redundancy, fault tolerance and
command center capabilities.
Most of our clients evolve into the ESMS as part of their strategic security plan side by side with their
business development plans. We join our clients at the stage of drawing board to assist them to choose
competent solutions that fits their current and future needs.
C O M P L E X I T Y
MODULARITY
ESMSTSM
SSCMS
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
06 11
Offerings (Products & Services) Technology & Relationships
KCS core competencies are spread over two functional strategic business units (SBU’s). These two units
consist of independent business processes and quality systems that govern compliance with industry
best practice and international standards/regulations.
Moreover, the solutions presented by KCS to its clients are unique. This is evident as KCS team of
engineers assists the client at the conceptual level, proof of concept, implementation and operation and
maintenance. Also, the solutions are made of multiple technologies with consideration to its current and
future application. KCS consultants work on gathering information that is critical to the solution
integrity and application.
Security Management Solutions (SMS)This SBU deals with digital security solutions related to CCTV, Access control, Physical Asset
Management (Tracking), command centers and others. The unit solutions are engineered, designed and
implemented by KCS staff in collaboration with international technology providers. The solutions core
relies on LENEL Systems products and services and its high level of adaptability and modularity.
Enterprise Solutions (ES)This SBU is specialized in enterprise centric solutions related to business intelligence, enterprise
performance management, CRM and others. These solutions are also produced in-house with open
platform technologies presented by international companies.
Some of the companies that KCS has direct or in-direct
relationship with are:
Microsoft, we're motivated and inspired every day by how our
customers use our software to find creative solutions to
business problems, develop breakthrough ideas, and stay
connected to what's most important to them.
Oracle, For almost 30 years, Oracle has been helping customers
like you manage your business systems and information with
reliable, secure, and integrated technologies.
Lenel Systems International is a UTC fire and security
company. Lenel proven field experience and multidisciplinary
approach as of its alliances with other sister companies such as
(OTIS, CARRIER, PRATT AND WHITNEY) allows accurate
solutions implementations with high level of integration.
Derwent design, develop and manufacture advanced infrared
illumination and number plate capture solutions which define
performance levels for critical technical surveillance. With a 15
year history based on engineering expertise, Derwent's field
proven products are today being delivered to critical locations
on every continent.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
12 05
Technology & Relationships Our Mission
AeroScout's enterprise visibility solutions use standard Wi-Fi
wireless networks to accurately locate and manage assets and
people in multiple environments. The AeroScout system includes
indoor and outdoor real-time asset location (RTLS), long range
Active RFID, choke-point visibility and telemetry, enabling
customers in numerous industries to drive revenues and cut
costs.
FOMGuard is a representative product of all the fiber optic
sensing and detection solutions developed by FOMGuard Inc.,
which impeccably detects intruders’ attempts to cut the fence or
break it using excessive forces. The operational mechanism of
the fiber optic sensor system is to measure the strengths and
travel times of the light wave pulse it sends to and receives from
the fiber optic sensor net attached to the existing fence and
check any discrepancies in the strengths or travel time of the
pulse.
3COM is a leading global provider of enterprise and
small-business networking solutions that help organizations
achieve their business and networking objectives. The company
has had a major impact on computer networking since the
creation of Ethernet in the 1970s.
WebMethods is a leading solutions provider for EAI. After
WebMethods has merged with Software AG, both create the
largest EAI software provider in the world. 4,000 global
customers achieve measurable business results by modernizing
and automating their IT systems and rapidly building new
systems to meet growing business demands.
“KCS is its Employees Who are the Loyal Trained Capabilities that Constitute the Center of Excellence used by Clients to Profit from the use of Advanced Technology”
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
04 13
Our Vision Technology & Relationships
“Become the Premium System Integration Solutions Provider for the Region”
Cognos is the world leader in business intelligence (BI) and
performance management solutions. We provide world-class
enterprise BI, planning and consolidation software and services
to help companies plan, understand and manage financial and
operational performance.
Infor delivers business-specific software that helps enterprising
organizations of all sizes adapt to rapid change. With
experience built in, our solutions are helping more than 70,000
companies meet their goals in a global marketplace. So go
ahead. Be as innovative as you want to be. As ready to seize
new opportunities. Infor is right beside you. Changing what you
expect from a business software company.
SunSystems is a portfolio of integrated financial management
and business intelligence applications, which help
decision-makers, gain a broader perspective on the business,
and provide the ability to analyze the operational detail. For
more than 20 years, we have delivered global, low-risk solutions
that are designed for rapid, low-cost deployment, helping our
users to meet the demands placed on the finance function.
Robertson & Blums Corporation is a leading consulting
company, providing IT and management solutions based on ERP
II class systems, which enable companies to raise their
competitive edge.
L-1 (parent of identix) L-1 Identity Solutions provides a full
range of fingerprint and palm, facial and iris biometric
technologies, as well as systems and solutions that empower
the identification of individuals in large-scale identity
management programs.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
14 03
Technology & Relationships Organization Summary
ActivIdentity Corporation is the trusted provider of identity
assurance solutions for the enterprise, government, healthcare,
and financial services markets worldwide. The company
provides the only fully-integrated platform enabling
organizations to issue, manage and use identity devices and
credentials for secure access, secure communications, legally
binding digital transactions, as well as smart citizen services.
A4Vision develops advanced biometric solutions using
breakthrough 3D machine vision technology. Our Intelligent
Identity solutions provide the ability to make secure and
informed decisions using advanced 3D face recognition.
Secury SAT, is a leading provider of satellite tracking systems.
The system presented is the core of all service solutions
presented. The essence of the service is asset protection and
tracking.
PEVAC ME, The services of specialized firms have always been
used for access control of military installations, embassies,
airports etc. However in today's society, this subject is no longer
limited to these specific vulnerable sectors. Companies as well
as private people are showing increased interest in the safety of
their property, know-how, etc. and are looking for effective
solutions to protect themselves.
Services: Technology engineering & design, procurement, installation, testing, commissioning, project
management, help desk support, workshop services, operation & maintenance, training, certification,
remote support management, Third Party Inspection.
Projects Geography:Kuwait, Bahrain, KSA, Iraq, Qatar, UAE, Jordan, Iran, Yemen, Sudan, Syria, Egypt & Oman
Human Resources: (65) staff, (30) contracted.
Strategic Alliances: 14 international companies
Insurance: Al-Takafuliah Private Insurance
Bank: Commercial Bank of Kuwait, Gulf Bank, National Bank of Kuwait
Solicitors:Al-Saleh and Partners Law Firm
Certification: All major represented products.
Quality Assurance: Internal QA Policy guided by the ISO 9001
Memberships and Affiliations:International Organizations and Universities Research Centers.
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
02 15
Organization Summary Technology Project Management
Company Name: Kuwait Computer Services (K.C.S)
Head office: Mussad Al-Saleh Bldg. Soor Street, Kuwait CityP.O.Box 5113, SAFAT 13052, KuwaitPhone: + 965 241 0799Fax: + 965 245 9019www.kcs.com.kw
FoundedIncorporated in 1976 in Kuwait as a Private Kuwaiti Shareholding Company
Operation OfficesBahrain, KSA, Kuwait
Vision:Become the Premium System Integration Solutions Provider for the Region
Mission: Maintain up-to-date high level in-house expertise to develop and localize solutions as per market
requirements. This is reinforced by sustaining the partnerships with the international network of
technology providers
Core Technologies:Video, Voice and Data (Information Technology and Telecommunications)
Specialty Operations:Security (Managed & Unmanaged), Smart Facilities, Enterprise Systems & Applications Integration,
Access Control, Time Attendance, Biometrics identification
Technology Partners: Lenel, Derwent, Securysat Fleet, Aeroscout, FOMGUARD, PEVAC-ME, IDL Turnstile Gates, Webmethods,
Cognos, ActiveIdentity, Infor Systems, Robertson & Blums Corp., Identix, A4Vision.
KCS maintains a high level of project implementation standards. Such standards and protocols adhere
to the international standards published by PRINCE2 and PMI.
KCS project management definition is “Project Management is the discipline of organizing and
managing resources (e.g. people) in such a way that the project is completed within defined scope,
quality, time and cost constraints”.
Scope, quality, time and cost are the main parameters of KCS management of any project. Maintaining
a small variance between Planned and Actual values is the next ambitious value during project
management.
In general, KCS internal project management system differentiates stages and phases of projects as:
1. Phase 1: Initiation2. Phase 2: Planning3. Phase 3: Execution4. Phase 4: Controlling5. Phase 4: Closing
In each of the phases defined tasks are set to meet per phase goals and objectives. A strategic overlay
of integrated phase approach allows cost effective implementation and project life cycle. The integrated
system also serves the quality control and time of implementation by dynamically allocated proper
resources when needed.
During the initiation phase, KCS management issues the project charter as a key deliverable of the
phase. In the project charter we find the assignment of the project manager, final Scope of Work, sealing
cost, time and quality constrains. Moreover, a partial authority’s matrix is presented with internal
workflow QA system reference.
In the Planning phase, the project manager prepares his resources to work as an integrated unit to meet
planned objectives. The resources are categorized as:
1. Financial2. Human3. Materials4. Tools5. Space
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976 Excellence Since 1976
Excellence Since 1976 Excellence Since 1976 Excellence Since 1976 Excellence Since 1976
16 01
Technology Project Management Managing Directors Letter
During the planning phase we also manage to produce a more detailed project plan. The level of details
produced works as the reference and guide for all project departments. This implementation guide will
become the final reference for any information required during the project life cycle.
Post planning phase is execution. In this phase, the project manager authorized partial or total task
groups based on the detailed plan. Mobilization and deployment of resources as per their respective
planned values are initiated.
The increasing number of resources needed for a project should be controlled for optimization. This
places a project in a parallel phase of controlling. In this phase the project manager assigned control
department/unit initiates its quality, cost, time and resources controls. The activation of these protocols
will enhance the project deliverables at closing time. Then such information post closing can be used as
a reference for a real-time event viewer of the project life cycle.
As for the closing phase, the project manager applies the final check list and confirms on the
deliverables matching the intended goals and objectives prior to client handover. A loop cycle of
corrections could be initiated if a variance is higher than tolerance rate.
While managing a project many knowledge areas are applied such as the accredited:
1. Integration Management 2. Scope Management 3. Time Management 4. Cost Management 5. Quality Management 6. Human Resource Management 7. Communications Management 8. Risk Management 9. Procurement Management
By applying the techniques of project management, KCS adds to its corporate structure a very rich
method statement of approaching client’s needs. This is summarized by the output of the project
standards applied during implementation, which in return provides clients with utmost real-time data to
predict project deliverables.
Excellence Since 1976
www.kcs.com.kw
KUWAIT COMPUTER SERVICESíéTéçÇÑJ)cTçéRÜÇÑJ)UKÜa^)íÇcl
Kuwait Computer Services (K.C.S)
Mussad Al-Saleh Bldg. Soor Street, Kuwait City
P.O.Box 5113, SAFAT 13052, Kuwait
Phone: + 965 241 0799
Fax: + 965 245 9019
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
Excellence Since 1976