SlideShare a Scribd company logo
1 of 33
Company Overview 
www.dts-solution.com 
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
DTS Solution
DTS Solution- Overview 
DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. 
We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. 
DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. 
The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
DTS Solution - Vision 
Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
DTS Solution - Services 
www.dts-solution.com 
PRE-SALES SERVICES 
STRATEGIC CONSULTING 
PROFESSIONAL SERVICES 
COMPLIANCE CONSULTING 
SECURITY ASSESSMENT
DTS Solution - Domains
Network Security
Data Security
Infrastructure Security
System Security
Application Security
Mobility / Wireless Security
Compliance Monitoring
Advance Threat Protection
Telecom Security
Cloud Security
SCADA / ICS Security
Security Operations Center
DTS Solution – Technology Partners
DTS Solution – Key Differentiators 
HIGH TECHNICAL COMPETENCY AND EXPERTISE 
TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS 
DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING 
BOTTOM-UP ORGANIZATION
DTS Solution – Services
DTS Solution – Service Offering 
Presales Services 
 RFP and RFI Documentation Services 
 Technical Requirements Gathering 
 Vendor Selection Process
Professional Services Architectural Design 
 Information Security Consulting 
 Documentation Services 
 Security Architecture Design 
 High Level Design 
 Low Level Design Deployment, Implementation and Operate 
 Implementation Services 
 Firewall Migration Services 
 Information and Service Flow Analysis 
 Network Security Audit On-site support 
 Resident Engineering Services 
DTS Solution – Service Offering
DTS Solution – Service Offering 
Information and Service Flow Analysis
DTS Solution – Service Offering 
Strategic Consulting 
 Capacity Planning 
 Cloud Computing Macroeconomics 
 Infrastructure Monitoring 
 IPTV Security Assessment 
 IPv4 to IPv6 transition 
 IPv6 Security 
 Management and Provisioning Platforms 
 Security Services Monetization
•ISO27001 
•ISA-99 / IEC-62443 
•PCI-DSS 3.0 
•Cloud Security Alliance – STAR 
•ADSIC – Abu Dhabi 
•ISR - Dubai
DTS Solution – Assessment Services 
Security Assessment Services 
Penetration Testing and Vulnerability Assessment 
Black Box Ethical Testing 
Vulnerability Management 
Unified Communications Audit 
VoIP / UC / Tele-presence security 
SCADA Security Evaluation Toolkit 
Industrial Control Systems Security Readiness 
Mobile Network Security 
UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce 
Fixed Mobile Convergence – SeGW and IMS Security 
Endpoint IP Discovery and Network Leakage Detection 
Rogue and Unknown Network Detection 
Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) 
Availability Assessment 
DDoS Protection – Botnet / Zombie Detection 
Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation 
Core Network Security 
MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion 
VPLS – Spanning Tree, ARP poisoning, MAC spoofing 
Social Engineering and Physical Security Review
DTS Solution – Some Key Facts +
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
DTS Solution – Some Key Facts + 
DTS Security Research Labs – http://labs.dts-solution.com
DTS Solution – Some Key Facts + 
•UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP 
•First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure 
•Development of a Security Operations Center for the largest O&G company worldwide 
•Design and Deployment of largest NAC solution in the Middle East 
•Middle East’s first Security Architecture integrating with SDN based Fabric Data Center 
•Development of SCADA/ICS Security Operations Center 
•Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR 
•Largest Firewall Management and Compliance Solution Deployment in the region 
•Security Design of Largest ISP data centers in the region (80 racks) 
•Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services 
•Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure 
… and more…..
Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

More Related Content

More from Shah Sheikh

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company PresentationShah Sheikh
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingShah Sheikh
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0Shah Sheikh
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 

More from Shah Sheikh (20)

DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration TestingDTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015DTS Solution - Outsourcing Outlook Dubai 2015
DTS Solution - Outsourcing Outlook Dubai 2015
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

DTS Solution - Company Profile

  • 1. Company Overview www.dts-solution.com Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com
  • 3. DTS Solution- Overview DTS Solution is a highly specialized information and network security solutions consulting firm providing complete system integration services. We design, architect, deploy, implement, integrate, operate and maintain complex and critical ICT and security infrastructure. We are not an ordinary System Integrator – we consider ourselves as consultants. We are trusted by technology vendors to act as their Professional Services arm to execute projects on their behalf and through our stage gated approach to project management we ensure every project is meticulous in terms of planning and execution. DTS is seen as a trusted advisor by major organizations in the region – this reputation has been built on the success stories we have accumulated since formation. The Technical Leads/Architects from DTS have extensive experience and expertise in the field of information and network security – having worked on some of the most critical security projects in the region. We live and breath information and network security…..
  • 4. DTS Solution - Vision Our vision is to be the market leaders and be considered as trusted experts and advisors within the integrated network and security solution industry.
  • 5. DTS Solution - Services www.dts-solution.com PRE-SALES SERVICES STRATEGIC CONSULTING PROFESSIONAL SERVICES COMPLIANCE CONSULTING SECURITY ASSESSMENT
  • 6. DTS Solution - Domains
  • 17. SCADA / ICS Security
  • 19. DTS Solution – Technology Partners
  • 20. DTS Solution – Key Differentiators HIGH TECHNICAL COMPETENCY AND EXPERTISE TOTAL INTEGRATED NETWORK AND SECURITY SOLUTIONS DRIVEN BY COMPLETE PROJECT LIFECYCLE UNDERSTANDING BOTTOM-UP ORGANIZATION
  • 21. DTS Solution – Services
  • 22. DTS Solution – Service Offering Presales Services  RFP and RFI Documentation Services  Technical Requirements Gathering  Vendor Selection Process
  • 23. Professional Services Architectural Design  Information Security Consulting  Documentation Services  Security Architecture Design  High Level Design  Low Level Design Deployment, Implementation and Operate  Implementation Services  Firewall Migration Services  Information and Service Flow Analysis  Network Security Audit On-site support  Resident Engineering Services DTS Solution – Service Offering
  • 24. DTS Solution – Service Offering Information and Service Flow Analysis
  • 25. DTS Solution – Service Offering Strategic Consulting  Capacity Planning  Cloud Computing Macroeconomics  Infrastructure Monitoring  IPTV Security Assessment  IPv4 to IPv6 transition  IPv6 Security  Management and Provisioning Platforms  Security Services Monetization
  • 26. •ISO27001 •ISA-99 / IEC-62443 •PCI-DSS 3.0 •Cloud Security Alliance – STAR •ADSIC – Abu Dhabi •ISR - Dubai
  • 27. DTS Solution – Assessment Services Security Assessment Services Penetration Testing and Vulnerability Assessment Black Box Ethical Testing Vulnerability Management Unified Communications Audit VoIP / UC / Tele-presence security SCADA Security Evaluation Toolkit Industrial Control Systems Security Readiness Mobile Network Security UMTS / LTE – GTP Scan / Spoofed TEID / SCTP Scan / APN bruteforce Fixed Mobile Convergence – SeGW and IMS Security Endpoint IP Discovery and Network Leakage Detection Rogue and Unknown Network Detection Backdoor connections (3G / xDSL / Rogue WiFi and leaking endpoints discovery and classification) Availability Assessment DDoS Protection – Botnet / Zombie Detection Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation Core Network Security MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion VPLS – Spanning Tree, ARP poisoning, MAC spoofing Social Engineering and Physical Security Review
  • 28. DTS Solution – Some Key Facts +
  • 29. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 30. DTS Solution – Some Key Facts + Developers of Firewall Policy Builder – www.firewallpolicybuilder.com
  • 31. DTS Solution – Some Key Facts + DTS Security Research Labs – http://labs.dts-solution.com
  • 32. DTS Solution – Some Key Facts + •UAE Nationwide DDoS Mitigation Solution Deployment for largest ISP •Pakistan Nationwide DDoS Mitigation Solution Deployment for largest ISP •First deployment of SCADA Security Firewalls – Oil and Gas Critical Infrastructure •Development of a Security Operations Center for the largest O&G company worldwide •Design and Deployment of largest NAC solution in the Middle East •Middle East’s first Security Architecture integrating with SDN based Fabric Data Center •Development of SCADA/ICS Security Operations Center •Development of Automated Compliance Tool for Abu Dhabi ADSIC and Dubai ISR •Largest Firewall Management and Compliance Solution Deployment in the region •Security Design of Largest ISP data centers in the region (80 racks) •Deployment of the first end to end IPv4/IPv6 Dual Stack Data Center with Security Services •Development of a Cyber Security Management System for Energy Sector Client – Critical Infrastructure … and more…..
  • 33. Shah H Sheikh – Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK shah@dts-solution.com

Editor's Notes

  1. DTS Solution’s vision is based on simple ethos, our primary objective is to be seen as a trusted security advisor within the information and network security field. Providing best-in-class security services to your organization our aim is to ensure complete client satisfaction not only during project engagement but more importantly after the project delivery lifecycle.Providing a high degree of client confidence and assurance, value based security services, lateral security consulting approach and innovating in the security industry are a few of our key goals.Security is a dynamic operation and DTS is no different; our organization ethic is based on its ability to be elastic in nature and adapt to market needs. As we develop a strong portfolio of established technology vendors and niche security industry players, DTS is committed to provide a complete end-to-end solution delivery; ranging from pre-sales to post-sales services.
  2. Juniper – Network & SecurityFortinet – Security, UTM Specialist, Mail, Web, DBRadware – Application Delivery, Former AlteonLoadbalancerSipera – VOIP SecurityArbor Networks – DDOS, Traffic Management and VisualiztaionPalo Alto – Next Generation Firewall, Application ControlRadisys – Mobile Security, LTE, 3G, FemotocellFireEye – Malware Protection