Horizon Line SGT Profile Products & Services. Horizon Line provides software products, IT services and Business Process Outsourcing (BPO) for a variety.

Slides:



Advertisements
Similar presentations
Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
Advertisements

Govern the Flow of Data: Moving from Chaos to Control
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
The future of Desktops Transform Your Desktop with Virtualization.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Amdocs Services Reach New Heights of Success
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
22/9/ About Company Business Portfolios IT Solutions BPO Services Business Approach How we can Help Advantage of Outsourcing Why Crystal Business.
Dell Connected Security Solutions Simplify & unify.
V-DEFINE Global Info SERVICES Outsourcing BPO Company & Recruitment Solution Provider [Human Resource. Manpower]
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
·
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
E-Data Experts, Inc. An Introduction. 2 Agenda Introductions Introductions The Company Overview The Company Overview Our Services Portfolio Our Services.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Copyright© 2002 Avaya Inc. All rights reserved Anna Dorcey Director, Avaya DeveloperConnection Program August 4, 2004 Partnering in the VOIP World Anna.
INTRODUCTION TO MANAGEMENT INFORMATION SYSTEM. INTRODUCTION Now a day, there are many companies, which depend on their computers for their day-to-day.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
Building a Fully Trusted Authentication Environment
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
User and Device Management
Introduction to Exterity
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Simplifying IT, Empowering Business.
Association of Competitive Telecom Operators IPv6 & TELCOs Workshop On IPv6 New Delhi 21 st July 2009.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
© Copyright 2004 Frost & Sullivan. All Rights Reserved. Latin American Managed Network Security Services Market Internet Protocol Virtual Private Network.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
With the rapid advancement in technology and globalization, most of the leading companies and organizations generally operate with network connectivity.
NEXT GENERATION Banking Software Solutions. Next Generation Banking Platform Next generation banking platform is the result of : Collective knowledge.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Scales Technology FZCO
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
Cloud Security Market Share
Security Essentials for Small Businesses
BLACKVARD MANAGEMENT CONSULTING, LLC
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
The Software-Defined Perimeter in Action
GTS Mobility Services introduction – who are we?
Topic 12: Virtual Private Networks
Presentation transcript:

Horizon Line SGT Profile Products & Services

Horizon Line provides software products, IT services and Business Process Outsourcing (BPO) for a variety of industry verticals, predominantly Insurance, Banking, Capital Markets, Asset and Wealth Management. It also provides solutions for other verticals such as Government, Manufacturing and Retail. These solutions and services include various industry specific IP based software solutions and services such as Application Development & Maintenance Services (ADMS), Business Intelligence, Enterprise Applications, Testing & Compliance Services, IT Infrastructure Management Services (IMS), IT Consulting and Transaction Processing Services, including Payment Solutions. Horizon Line Delivery Model provides for the best resources to be drawn from its vast talent pool to offer optimal solutions. Horizon Line integrates its products and services to create customized solutions to allow you to undertake technology-based business transformation that allows reorganization in line with today's dynamic digital business environment.

SIMPLI-FI NETWORKING. WiFi · Wired · Cloud · Branch On-Demand A Modern Access Network— Accommodates the BYOD (Bring Your Own Device) client explosion Optimizes applications for mobile users Features ubiquitous Wi-Fi coverage with 8-10 times bandwidth improvements via n Enables Wi-Fi as a viable replacement for Ethernet Allows wired and wireless access to work together, interchangeably Provides simple, secure guest access Horizon Line a cloud networking company that provides comprehensive access solutions for the mobile first enterprise. Built from the ground up for today’s challenges, Horizon Line sets new standards for how to address these global trends that are impacting every organization with a unique and powerful combination of distributed networking intelligence, known as our Cooperative Control architecture, and an industry leading cloud services infrastructure. This allows Horizon Line to deliver secure, enterprise-class access to every site—from a large campus or headquarters to remote branches and even single teleworker offices – with consistent, predictable service and maximum security.

Products Secure Wireless Access Guest Access Management Smart Corporate Badge Key Management Digital Signature Mobile Device Management (MDM) Single Sign On (SSO) Anti-Distributed Denial of Service (anti-DDOS) Network Forensics Packet Capture Smart Card Management Next Generation Firewalls Intrusion Prevention System (IPS) Virtual Private Network (VPN) Strong Authentication Smart Cards Security Encryption Data Leakage Prevention Data Governance Archiving Network Access Control Bring Your Own Device (BYOD) Privileged Access Management Session Recording

Services End to End IT solutions Enterprise resource planning (ERP) Penetration Testing Vulnerability Management Risk Assessment Gap Analysis ISO Architecture Review Configuration Review Ethical Hacking Police & Procedure development Security Awareness Programs Incident Handling Identity and Access Management consulting Solution Integration & Implementation Providing end-to-end integrated communication solutions for our clients, from design, integration and deployment to maintenance and operations

 Abu Dhabi Islamic bank  Al Asateen integrated System  ADNOC  Al Hamra Trading EST  Al Noor Electrical  Al Rowed  Al Salman Electrical  Amana cont & steel Bldg  Atlas Telecom  Eye on Technology  Emircom  First Gulf Bank  Gulf Business Machine  Al Hilal bank  IBM  HSG Zander International  Mammut Contracting  New York university  Petrofac International  Al Rostamani Communication  Saraya Interiors  Schlumberger Middle East  Shield safety & security  Superior Technologies  Western Geco

Contacts : Mohammad Abuhilal Director Tel.: Fax: Mob: address: Kassem Shour Project Manager Tel.: Fax: Mob: address: Syed AsadUllah Admin Manager Tel.: Fax: Mob: address: