SlideShare una empresa de Scribd logo
1 de 41
Company Corporate Profile

                     Focusing on



              ICIL Technologies Pvt Ltd

4/8/2012                                  1
The Company

• ICIL Technologies Ltd is part of ICIL Pakistan. ICIL Pakistan is country’s only Credit Risk and
  Risk Consulting company. It maintain’s country’s largest credit information database and
  Has access to D&B world’s largest database of 100 million companies from over
  200 countries.
• ICIL Technologies Ltd has 5 business activites. Each Business has affiliations with foreign
  partners.




4/8/2012                                                                                   2
Local /            Local /                                      IT Solution,        Business           B–2–B
Global Credit         Global         Business         Regulatory    Biometric,        Continuity &         Credit
  Decision          Receivable       Training         Compliance      RFID &             IT DR            Bureau
  Support          Management        Services        AML - KYC       Security          Services           Service
  Services           Services                                       Solutions



  International Credit Information         ICIL Pvt. Limited         ICIL Technologies Pvt. Limited   Pak Credit Alert Pvt.
              Limited                                                                                       Limited
         www.pakbizinfo.com                 www.icilpk.com                  www.iciltek.com           www.pakcredit.com.pk




 4/8/2012                                                                                                           3
BOARD OF DIRECTORS

  Humayun Mufti FCA(England & Wales). He is an entrepreneur with industrial
 management background.

 Dr. Adil S. Mufti Ph.D (University of London) is also an an entrepreneur of
 proven corporate performance in Pakistan

 Amer Aziz Saiyied (Advocate) - Currently legal advisor to the Banking
 Ombudsman, Former Company Secretary & Legal Counsel Lever Brother Pakistan

 Arif Mufti (FCA) – He is currently Chairman & CEO Metlife American Life
 Insurance Company Ltd

 Salman T. Kureshi Leading marketing fractioned, formerly with Lever Brothers
 Pakistan, Brooke Bond, and Pak Com.

 Babar Mufti (M.Sc Economics, LSE) - CEO
4/8/2012                                                                        4
Technology         Business                                    Security
                                   Biometric
Solution & System   Continuity &               RFID Solutions   Surveillance
                                   Solutions
   Integration         I.T.D.R                                   Solutions




4/8/2012                                                                       5
Technology Solution & System Integration




        System                                                   Customize                      BI Solution
                                         ERP
    Integration and                                               Software                     Designing and
                                    Implementation
      Consulting                                                Development                   Implementation


• Integration among             • Specializes in ERP       • Specialized software        • Expertise in working on
  software components and         customization and          development using various     and implementing
  ERP                             implementation             tools and techniques               • Cognos BI
• Integrating various devices         • Oracle - EBS R12   • Website and multimedia             • MS Reporting
  with software                       • Microsoft -          presentations                         Services
• Business process                        Dynamics GP      • Expertise in implementing          • BIRT
  management                          • ICILtek -            various content             • Proven capabilities in
                                          eCorpStructure     management solution i.e.      programming database
                                                             Joomla, Word press            thus offers ETL tools
                                                                                           development services


 4/8/2012                                                                                                            6
Technology Solution & System Integration (cont..)

System Integration and Consulting
 System Integration
     “System integration is about linking sub systems together to take
     advantage of a system as whole. These sub systems could be software
     applications, devices, equipment and machines.”

 •     Broader experience of various business domains
 •     Experience of all major tools and technologies i.e. Java, MS. Net
       Framework, Open Source Technologies, Oracle, MySQL, SQL Server etc.
 •     Knowledge of almost all famous ERPs i.e. Oracle EBS, MS Dynamics,
       SAP, Sage
 •     Experienced in integrating devices, equipment and machinery that are
       capable of communicating




     4/8/2012                                                                             7
Technology Solution & System Integration (cont..)

System Integration and Consulting (cont..)
  Consulting Services
      “IT Consulting Service is about assisting organizations in carrying out IT
      related activities from preparing RFP to assisting in developing,
      implementing and delivering solutions, and incorporate best and suitable
      solutions for achieving business goals.”

  •     Business Process Management – Cross functional capabilities, focused
        work and result oriented approach enables ICILtek to achieve task
        efficiently
  •     IT Infrastructure Management Outsourcing – Hardware, Network,
        Database, Information Security and Application Administration for
        SMEs
  •     Assisting organizations in procuring right solutions for their business
        needs




      4/8/2012                                                                                8
Technology Solution & System Integration (cont..)

ERP Implementation

     “Enter Resource Planning systems are software applications consists of
     several integrated modules. Each module is responsible for managing
     and processing information of a particular business function, it also
     shares, input to and take output from other modules.”

 •     Oracle EBS R-12 Financials [for Large Enterprises] - General Ledger,
       Accounts Receivable, Accounts Payable, Cash Management, Fixed
       Assets

 •     Microsoft Dynamics Great Plan Financials [for Medium Enterprises] -
       General Ledger, Receivables Management, Payables Management, Cash
       Flow Management, Collection, Encumbrance.

 •     ICILtek eCorpStructure [for Small and Medium Enterprises] – Financials,
       Inventory Control, HRMS, CRM, Point of Sales, Institute Management
       System


     4/8/2012                                                                               9
Technology Solution & System Integration (cont..)

ERP Implementation (cont..)
 eCorpStructure - HRMSuite
     “Human Resource Management System manages processes related to
     HR of an organization. It reduces the efforts required for managing
     cumbersome and time taking processes of time management and payroll
     processing.”

 •     ICILtek offers HRMS on two different platforms
         • Web Based – ASP.Net and MySQL
         • Desktop Based – Forms and Reports 6i and Oracle Database
 •     Consists of following functions / modules
         • Recruitment
         • Personnel
         • Time Attendance
         • Compensation and Payroll
         • Training
 •     Can be used as an standalone system or integrated with any ERP or
       eCorpStructure ERP
     4/8/2012                                                                            10
Technology Solution & System Integration (cont..)

ERP Implementation (cont..)
 eCorpStructure – IMS
     “Institute Management Systems are specialized ERPs exclusively for
     academic institutions. It integrates data, automates and integrates
     operational, financials and academic business processes thus greatly
     improves the performance.”

 •     ICILtek offers IMS on two different platforms
         • Web Based – ASP.Net and MySQL and PHP and MySQL
         • Desktop Based – Oracle Forms and Reports 6i and Oracle
             Database
 •     Consists of following functions / modules
         • Student Information System
         • Campus Management
         • Financials
         • HRMS (Optional)
         • Inventory Control (Optional)


     4/8/2012                                                                             11
Technology Solution & System Integration (cont..)

ERP Implementation (cont..)
 eCorpStructure – POS
     “Point of Sales systems are integrated software applications specially
     designed for shops, wholesaler and retailers both. Consists of Sales,
     Inventory, Financials and limited functionality of CRM.”


 •     ICILtek offers POS on two different platforms
         • Oracle Based – Oracle Forms and Reports 6i and Oracle Database
         • Microsoft Based – Windows forms using C# and MySQL
 •     Consists of following functions / modules
         • Sales
         • Inventory
         • Financials
 •     Can be integrated with
         • RFID
         • Barcode Readers


     4/8/2012                                                                              12
Technology Solution & System Integration (cont..)

Customized Software Development - CSD

     “Customized Software Development is a service to develop a software
     application or solution for a specific organization based on its exclusive
     requirements. It is an opposite of off the shelf software packages that
     are based on general requirements.”

 •     Expert in business analysis
 •     Detailed requirement gathering using different techniques
 •     Effective project management
 •     Experienced with




     4/8/2012                                                                                13
Technology Solution & System Integration (cont..)

BI Designing and Implementation




  4/8/2012                                                          14
Business Continuity and I.T. D.R.




       Business                                      IT Disaster                       Testing and Audit
       Continuity                                     Recovery                           IT DR and BC
       Planning                                       Planning                               Plan


• Identifying critical and key             • Identifying key applications and    • Preparing compatibility report
  business processes                         critical IT processes                 against BCP and IT DR
• Risk assessment                          • Risk assessment                     • Recommending changes in
• Emergency evacuation planning            • Back and recovery planning and        existing BC and IT DR plan
• Communication planning                     testing                             • Updating and maintaining
• Operations recovery planning             • Planning for Hot or Cold recovery
• BCP drills and testing                     site
• Maintaining and updating BC plan         • Testing, maintaining and updating




 4/8/2012                                                                                                     15
Business Continuity and I.T. D.R. (cont..)

Business Continuity Planning

      “Business Continuity Planning is a process of developing strategies, plans
      and actions to protect critical business processes from any interruption
      or disaster. Disaster can be major like hurricane and minor like power
      failure, the aim is to ensure the survival of the organization”


  •     Offers following services under BCP
          • Business study and identifying critical business processes
          • Determining associated risks and preparing risk matrix against
              critical processes
          • Planning for emergency response , evacuation, communication
              and operations recovery
          • Testing plans and giving training to relevant personnel
          • Support - Maintaining and updating plan
  •     ICILtek has affiliation with Kingswell UK for BCP




      4/8/2012                                                                                   16
Business Continuity and I.T. D.R. (cont..)

IT Service Continuity Management




  4/8/2012                                                           17
Business Continuity and I.T. D.R. (cont..)

Testing and Audit IT DR and BC Plan

     It is a known fact that designer or developers cant be considered to be valid
     testers. ICILtek having good knowledge of the intricacies of IT Service
     Continuity can help organization test their IT Service Continuity Plan to ensure
     that the plan is valid and as per the expectation of their management. It offers
     the following advantages to the stakeholders
     • Give management assurance and IT will continue to give service to
          departments incase of any incident.
     • Ensure that all IT assets are secure
     • Give management assurance that all departments will continue to serve
          their customer thus retaining them
     • Ensure all key staff are familiar with their incident management, business
          recovery and technical recovery plans
     • Prove the ability to recover the technical IT and communication
          infrastructure


   4/8/2012                                                                             18
Biometric Solutions




                                                                                                      Voice
    Finger Tip            Palm Vein             Retina Scanning       Face Recognition
                                                                                                   Recognition



• Based on finger     • Based on palm vein      • Based on retina     • Based on face          •   Based on voice
  prints, fast in       scanning and              scanning and          geometry               •   More secure
  processing            recognition               recognition         • Accurate recognition   •   Time attendance
• Time attendance     • Approximately 100%      • More secure         • More secure            •   Access control
• Access control        accurate                • Access control      • Time attendance        •   Can be integrated
• Replaces manual     • Time attendance         • Can be integrated   • Access control             with software
  signatures          • Access control            with software       • Can be integrated          applications
• Can be integrated   • Can be integrated         applications          with software
  with software         with software                                   applications
  applications          applications                                  • Recommended for
                                                                        labor staff

    4/8/2012                                                                                                  19
Biometric Solutions (cont..)

Finger Tip
              ACTAtek is a world leader in ID Management solution. It is a leading
              web based, biometric, RFID smart card platform for enterprise wide
              solution.
                          2.8‘ TFT 256k color screen with slim and compact design
                          Embedded software, no software installation necessary.
                          State of the art embedded, encrypted Linux web server technology.
                          Control, configure & administrate via web browser
                          SSL encrypted communication between units & browser
                          Real time system update & configuration
                          500 DPI optical scanner
                          Auto-match support up to 500 users (1:N) FAM model
                          Auto-match support up to 3,000 users (1:N) FLI model
                          Operates in Standalone or Network modes
                          Robust and scalable for enterprise-wide deployment
                          IP 65 rated, weather & impact resistant casing (fluid ingress, dust, salt, fog protection)
                          Built-in Video/CMOS camera (optional)
                          1,000, 3,000 , 5,000 ,10,000, 15,000 or 20,000 users
                          Up to 75,000 event logs
                          Five Modes of authentication
                 o         Fingerprint only
                 o         Smart Card only
                 o         Smart Card + Fingerprint
                 o         ID + Fingerprint, and
                 o         ID + PIN.
   4/8/2012                                                                                                             20
Biometric Solutions (cont..)

Palm Vein

             This system is based on the palm vein-network, since they
             have multiple features that make each person unique.
             Specifically on the blood veinspattern, which is unique to
             every individual, even among identical twins.

             Moreover, the system needs blood circulation for it to work,
             ensuring liveness.

             “PalmSecure™”, technology captures an image from the vein
             patterns of the hand palm by radiating his/her hand with
             near-infrared rays. Veins are an internal element of the
             human body and have many features that make each person
             unique. Therefore, reducing false acceptance rates close to
             zero. Everybody has veins in their hands, which makes this
             technology different from other technologies based on
             external patterns and does not allow any significant false
             rejection rate.




  4/8/2012                                                                  21
Biometric Solutions (cont..)

Retina Scanning
                  Ganetec IRIS recognition is a secure, effortless, non
                  contact identity verification on the move. It delivers
                  security of iris recognition in a convenient, high
                  throughput system for access control. This portal
                  configuration has a processing speed of 30 people per
                  minute – subjects simply walk through a comfortable
                  place.

                  It also enables onboard enrollment and identifies
                  subjects in less than one second making it ideal for
                  high traffic locations such as airports, mass transit,
                  security checkpoints and other applications that
                  require positive identity verification for large number
                  of people.



  4/8/2012                                                                  22
Biometric Solutions (cont..)

Face Recognition - Hardware

                Facial recognition compares the facial features of a person to initiate a
                trigger. The Trigger can be as simple as marking attendance or granting
                access to particular place in office.

                Facial recognition is the most foolproof mechanism for any identity
                management application.

                Its uses special algorithms that identify faces by extracting landmarks or
                features from an image of the subject’s face. For example an algorithm may
                analyze the relative position, size and/or shape of the eyes, nose,
                cheekbones or jaws.

                F710 is embedded facial recognition system with leading “Dual Sensor” Facial
                recognition algorithm, which is generically used for time attendance and
                access control application.



  4/8/2012                                                                              23
Biometric Solutions (cont..)

Face Recognition - Software

    Using Outdoor and Indoor cameras,
    Ganhertec Analytics Identifies and tracks
    People using a realtime or manual enroll
    Of their faces.




   4/8/2012                                                                    24
Biometric Solutions (cont..)

Voice Recognition (under development)
  Voice biometrics products are designed to meet the
  dynamic security needs of the world’s leading financial
  institutions, telecom service providers, healthcare
  insurance companies, large enterprises, and law
  enforcement and government agencies. Organizations are
  empowered to improve security and comply with industry
  Regulations that require higher levels of security for authenticating identity, while
  reducing costs and delivering increased convenience to those they serve. Nuance
  voice biometrics technology provides an accurate, non-invasive, cost-effective
  identity verification solution that seamlessly integrates with existing contact center
  and VoiceXML platforms.




   4/8/2012                                                                                25
Biometric Solutions (cont..)

Biometric Applications




                                          Guard Management
 Time Management
                                               Solution




 Parking Management                      Visitor Management
   4/8/2012                                             26
Biometric Device Matrix

              Cost   Security   Efficiency    Applications
Fingerprint   Low    Medium     Medium        Access Control,
                                              Attendance
Facial        Low    High       High-Medium   Access control,
Recognition                                   security
Iris          High   High       High          Passport
                                              control
Palm Vein     High   High       Medium        Access Control,
                                              Attendance
Voice         High   High       Medium        Tele-Banking




  4/8/2012                                                      27
RFID Solutions




                  Active Tags                                                 Passive Tags
                  based RFID                                                   based RFID
                   Solutions                                                    Solutions



     • Identification of items through RFID tags               • Identification of items through RFID tags
     • Used to automate inventory (items / goods) IN           • Used to automate inventory (items / goods) IN
       and OUT processes                                         and OUT processes
     • Battery powered tags                                    • Reader powered tags
     • In case of removing tag illegally from an item,         • Inexpensive
       tag inform reader thus an alarm can activate            • Inventory management of goods and fixed
     • Inventory management of valuable goods i.e.               assets
       jewelry, machine parts etc.




4/8/2012                                                                                                         28
RFID Solutions (cont..)

RFID Applications

   RFID is the use of a wireless non-contact radio system to transfer data from a tag
   attached to an object, for the purposes of automatic identification and tracking.
   Some tags require no battery and are powered by the radio waves used to read
   them.


   Such a technology allows us to use it in a number of applications such as

     • Student Attendance and Tracking: Tag/ Student ID Card is detected by a reader to
       Mark attendance or determine his/her location




   4/8/2012                                                                             29
RFID Solutions (cont..)

RFID and its applications
  • Car Parking Management
    RFID can be used to automate and bring
    Efficiency into car parking management.
    A RFID tag can be attached anywhere on a
    Car, as the automobile approaches the barrier or
    road blocker, the reader detects he tag and
    detaches or open the barrier granting him
    access into the car parking lot.


  • Asset Tracking
    Applications for asset tracking include those
    that involve reusable or rental assets such as
    Containers, Library Items and other supply chain
    applications where assets circulate through the
    system. The tags in such cases have to be long life,
    durable, robust and be able to perform in rough
     conditions. It should also have the capability to be
    easily integrated with a customer’s existing infrastructure
   4/8/2012                                                                                 30
RFID Solutions (cont..)

RFID and its applications

  • Document Tracking
    The need to maintain information in hard copy form or
    Physically on files can never be discounted. RFID allows
    For a more secure and efficient way of managing archives.
    With Tags in the form of sticker attached to the document
    One can securely ensure that all file are processed maintained in an efficient manner.



  • Counterfeiting in Pharmaceutical
      RFID provides item level supply chain visibility by providing
      Information required for product authentication . Pharmaceutical
      Consumers benefit from improved product safety, quality and
      availability. Pharmaceutical companies benefit from reduced liability,
      brand protection and additional revenue that otherwise gets diverted
      to counterfeit drugs. By adopting a global RFID network businesses can
      get full visibility, track and trace capabilities from the birth of the
      product through to delivery to final customer
   4/8/2012                                                                                  31
RFID Solutions (cont..)

RFID and its applications

  • Distribution and Inventory Control
              RFID can offers tremendous advantage in distribution
              Industry where major cost involved is in managing the
              Inventory. It is a known fact that in distribution centres
              RFID has been used to eliminate the need to manually
              Track and scan products, reducing labor cost by 30% or
              more.

  • Counterfeiting in Pharmaceutical
      RFID provides item level supply chain visibility by providing
      Information required for product authentication . Pharmaceutical
      Consumers benefit from improved product safety, quality and
      availability. Pharmaceutical companies benefit from reduced liability,
      brand protection and additional revenue that otherwise gets diverted
      to counterfeit drugs. By adopting a global RFID network businesses can
      get full visibility, track and trace capabilities from the birth of the
      product through to delivery to final customer
   4/8/2012                                                                                   32
Security Surveillance Solutions




                                                                                 Integrated
                                                   IP Cameras                    Solutions
           CCTV Solutions
                                                    Solutions                   (Cameras and
                                                                               Access Control)



      • Security surveillance                • IP based                   • Integration among cameras
        through CCTV cameras                 • Each and every unit is       and Access Control
      • Less expensive                         accessible to authorized   • Tracking of unauthorized
      • In case of using IP based              user over LAN or WAN         access attempts
        DVR, streaming can be
        done on computer’s HDD
      • Compatibility with existing
        surveillance infrastructure




4/8/2012                                                                                                33
Security Surveillance Solutions (cont..)

Video Surveillance Solution (CCTV and IP)




   4/8/2012                                                              34
Security Surveillance Solutions (cont..)

Integrated Solutions (Cameras and Access Control)




   4/8/2012                                                                35
Security Surveillance Solutions (cont..)

           Intelligent Video Analytics


                                 Face and License Plate Recognition




                                   People Counting




4/8/2012                                                           36
Security Surveillance Solutions (cont..)

Intelligent Video Analytics


                                              Motion Detection and
                                              Forbidden Area Detection




                          Added Object
                              Monitors a specific area and prompts if an object of an
                              Kind is detected in that place



   4/8/2012                                                                     37
Security Surveillance Solutions (cont..)

Intelligent Video Analytics


                              Missing Object

                              Detects an object missing from a specific
                              Location being monitored by the camera.




   4/8/2012                                                               38
Major Customers
  Johnson and Johnson Pakistan Pvt Ltd


  Bank Al Habib Ltd



  Sind Police


  National Bank of Pakistan Ltd



  Aman Fundation




  4/8/2012                               39
Major Customers
  American Life Insurance Company (Pakistan) Ltd


  Grome Marketing (Cyprus) Ltd.



  Institute of Business Administration


  Tullow Pakistan (Developments) Ltd



  Gul Ahmed - Ideas




  4/8/2012                                         40
Contact Information




Malik Munir           Yasser Mufti       Hassan Shahzad          Malik Munir          Hassan Shahzad
03002616825           03002124461                                03002616825
malikmunir@tek.coim   yasser@iciltek.com hassanrizvi@iciltek.com malikmunir@iciltek.com
Skype: malikmunir     Skype: yasser_adil


     4/8/2012                                                                                          41

Más contenido relacionado

La actualidad más candente

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Introduction To Intelledox June 2010
Introduction To Intelledox June 2010Introduction To Intelledox June 2010
Introduction To Intelledox June 2010Kevin Burdette
 
Governance as Sustainability in the Enterprise Architecture Discipline
Governance as Sustainability in the Enterprise Architecture Discipline Governance as Sustainability in the Enterprise Architecture Discipline
Governance as Sustainability in the Enterprise Architecture Discipline Eric Stephens
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
BMO's Fully Automated SOA ETL Metadata Capture Soln
BMO's Fully Automated SOA ETL Metadata Capture SolnBMO's Fully Automated SOA ETL Metadata Capture Soln
BMO's Fully Automated SOA ETL Metadata Capture SolnMark Pahulje
 
Fully Automated SOA ETL Metadata Capture Soln
Fully Automated SOA ETL Metadata Capture SolnFully Automated SOA ETL Metadata Capture Soln
Fully Automated SOA ETL Metadata Capture SolnMarhaus Hooge
 
From IT service management to IT service governance: An ontological approach ...
From IT service management to IT service governance: An ontological approach ...From IT service management to IT service governance: An ontological approach ...
From IT service management to IT service governance: An ontological approach ...IJECEIAES
 
Silicus share point-overview-slideshare2
Silicus share point-overview-slideshare2Silicus share point-overview-slideshare2
Silicus share point-overview-slideshare2Silicus Technologies
 
R12 features and functionality in TCA and CDH/EBS
R12 features and functionality in TCA and CDH/EBSR12 features and functionality in TCA and CDH/EBS
R12 features and functionality in TCA and CDH/EBSRhapsody Technologies, Inc.
 
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...Fondazione CUOA
 
Tokio marine success story
Tokio marine success storyTokio marine success story
Tokio marine success storyCorticon
 
NEOS line of business
NEOS line of businessNEOS line of business
NEOS line of businessNeos d.o.o.
 
«Integration» - a necessary evil
«Integration» - a necessary evil«Integration» - a necessary evil
«Integration» - a necessary evilFulvio Corno
 
NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011Bizagi Inc
 
MDM Institute: Why is Reference data mission critical now?
MDM Institute: Why is Reference data mission critical now?MDM Institute: Why is Reference data mission critical now?
MDM Institute: Why is Reference data mission critical now?Orchestra Networks
 
Process based management examples of information technology enablers
Process based management examples of information technology enablersProcess based management examples of information technology enablers
Process based management examples of information technology enablersDeusto Business School
 

La actualidad más candente (19)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Introduction To Intelledox June 2010
Introduction To Intelledox June 2010Introduction To Intelledox June 2010
Introduction To Intelledox June 2010
 
EA foundations (views + repository)
EA foundations (views + repository)EA foundations (views + repository)
EA foundations (views + repository)
 
Governance as Sustainability in the Enterprise Architecture Discipline
Governance as Sustainability in the Enterprise Architecture Discipline Governance as Sustainability in the Enterprise Architecture Discipline
Governance as Sustainability in the Enterprise Architecture Discipline
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
BMO's Fully Automated SOA ETL Metadata Capture Soln
BMO's Fully Automated SOA ETL Metadata Capture SolnBMO's Fully Automated SOA ETL Metadata Capture Soln
BMO's Fully Automated SOA ETL Metadata Capture Soln
 
Fully Automated SOA ETL Metadata Capture Soln
Fully Automated SOA ETL Metadata Capture SolnFully Automated SOA ETL Metadata Capture Soln
Fully Automated SOA ETL Metadata Capture Soln
 
From IT service management to IT service governance: An ontological approach ...
From IT service management to IT service governance: An ontological approach ...From IT service management to IT service governance: An ontological approach ...
From IT service management to IT service governance: An ontological approach ...
 
Silicus share point-overview-slideshare2
Silicus share point-overview-slideshare2Silicus share point-overview-slideshare2
Silicus share point-overview-slideshare2
 
R12 features and functionality in TCA and CDH/EBS
R12 features and functionality in TCA and CDH/EBSR12 features and functionality in TCA and CDH/EBS
R12 features and functionality in TCA and CDH/EBS
 
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...
Approccio e Roadmap per la razionalizzazione dei sistemi analitici Corporate:...
 
Tokio marine success story
Tokio marine success storyTokio marine success story
Tokio marine success story
 
NEOS line of business
NEOS line of businessNEOS line of business
NEOS line of business
 
Dit yvol3iss2
Dit yvol3iss2Dit yvol3iss2
Dit yvol3iss2
 
«Integration» - a necessary evil
«Integration» - a necessary evil«Integration» - a necessary evil
«Integration» - a necessary evil
 
NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011NIEM and Oracle Overview October 2011
NIEM and Oracle Overview October 2011
 
MDM Institute: Why is Reference data mission critical now?
MDM Institute: Why is Reference data mission critical now?MDM Institute: Why is Reference data mission critical now?
MDM Institute: Why is Reference data mission critical now?
 
Process based management examples of information technology enablers
Process based management examples of information technology enablersProcess based management examples of information technology enablers
Process based management examples of information technology enablers
 

Similar a ICIL Technologies Pvt Ltd Corporate Profile and Technology Solutions

ICIL Technologies
ICIL Technologies ICIL Technologies
ICIL Technologies Yasser Adil
 
IBCS-PRIMAX ERP Solution
IBCS-PRIMAX ERP SolutionIBCS-PRIMAX ERP Solution
IBCS-PRIMAX ERP Solutionibcsprimaxbd
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecturesandeep gosain
 
OOW-CON3656-EA
OOW-CON3656-EAOOW-CON3656-EA
OOW-CON3656-EABen Duan
 
Nelito iibf candidate_life_cycle_management_case_study
Nelito iibf candidate_life_cycle_management_case_studyNelito iibf candidate_life_cycle_management_case_study
Nelito iibf candidate_life_cycle_management_case_studyisabelfabiano
 
Vil soft company group profile
Vil soft company group profileVil soft company group profile
Vil soft company group profileVilsoft
 
EOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOKTechnologies
 
PITSS General Presentation - Dec, 2012
PITSS General Presentation - Dec, 2012PITSS General Presentation - Dec, 2012
PITSS General Presentation - Dec, 2012jgmarra
 
Bizlogic Infosystems Presentation
Bizlogic Infosystems PresentationBizlogic Infosystems Presentation
Bizlogic Infosystems PresentationPiyush Pandey
 
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)Kommaneni Sreenivasulu
 
Prashant seth Resume
Prashant seth ResumePrashant seth Resume
Prashant seth ResumePRASHANT SETH
 
Erp by Mohammad Saeed Khan
Erp by Mohammad Saeed KhanErp by Mohammad Saeed Khan
Erp by Mohammad Saeed KhanMohd Saeed
 
Twpc Tech Services
Twpc Tech ServicesTwpc Tech Services
Twpc Tech ServicesTWPC
 
iWare Logic Oracle Applications And Technologies Services Company
iWare Logic Oracle Applications And Technologies Services Company iWare Logic Oracle Applications And Technologies Services Company
iWare Logic Oracle Applications And Technologies Services Company iWare Logic Technologies Pvt. Ltd.
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Muhambiga Selvaraja
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 

Similar a ICIL Technologies Pvt Ltd Corporate Profile and Technology Solutions (20)

ICIL Technologies
ICIL Technologies ICIL Technologies
ICIL Technologies
 
My CV
My CVMy CV
My CV
 
IBCS-PRIMAX ERP Solution
IBCS-PRIMAX ERP SolutionIBCS-PRIMAX ERP Solution
IBCS-PRIMAX ERP Solution
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecture
 
OOW-CON3656-EA
OOW-CON3656-EAOOW-CON3656-EA
OOW-CON3656-EA
 
Nelito iibf candidate_life_cycle_management_case_study
Nelito iibf candidate_life_cycle_management_case_studyNelito iibf candidate_life_cycle_management_case_study
Nelito iibf candidate_life_cycle_management_case_study
 
Vil soft company group profile
Vil soft company group profileVil soft company group profile
Vil soft company group profile
 
Mind Chips Consulting Offerings
Mind Chips Consulting   OfferingsMind Chips Consulting   Offerings
Mind Chips Consulting Offerings
 
EOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT servicesEOK Technologies - Healthcare IT services
EOK Technologies - Healthcare IT services
 
PITSS General Presentation - Dec, 2012
PITSS General Presentation - Dec, 2012PITSS General Presentation - Dec, 2012
PITSS General Presentation - Dec, 2012
 
Bizlogic Infosystems Presentation
Bizlogic Infosystems PresentationBizlogic Infosystems Presentation
Bizlogic Infosystems Presentation
 
ERP by saeed
ERP by saeedERP by saeed
ERP by saeed
 
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)
Caritor_Oracle System Integrator( Oracle On Prem and Oracle Cloud)
 
Prashant seth Resume
Prashant seth ResumePrashant seth Resume
Prashant seth Resume
 
Erp by Mohammad Saeed Khan
Erp by Mohammad Saeed KhanErp by Mohammad Saeed Khan
Erp by Mohammad Saeed Khan
 
Twpc Tech Services
Twpc Tech ServicesTwpc Tech Services
Twpc Tech Services
 
iWare Logic Oracle Applications And Technologies Services Company
iWare Logic Oracle Applications And Technologies Services Company iWare Logic Oracle Applications And Technologies Services Company
iWare Logic Oracle Applications And Technologies Services Company
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
Cobit_5_Checklist.pdf
Cobit_5_Checklist.pdfCobit_5_Checklist.pdf
Cobit_5_Checklist.pdf
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

ICIL Technologies Pvt Ltd Corporate Profile and Technology Solutions

  • 1. Company Corporate Profile Focusing on ICIL Technologies Pvt Ltd 4/8/2012 1
  • 2. The Company • ICIL Technologies Ltd is part of ICIL Pakistan. ICIL Pakistan is country’s only Credit Risk and Risk Consulting company. It maintain’s country’s largest credit information database and Has access to D&B world’s largest database of 100 million companies from over 200 countries. • ICIL Technologies Ltd has 5 business activites. Each Business has affiliations with foreign partners. 4/8/2012 2
  • 3. Local / Local / IT Solution, Business B–2–B Global Credit Global Business Regulatory Biometric, Continuity & Credit Decision Receivable Training Compliance RFID & IT DR Bureau Support Management Services AML - KYC Security Services Service Services Services Solutions International Credit Information ICIL Pvt. Limited ICIL Technologies Pvt. Limited Pak Credit Alert Pvt. Limited Limited www.pakbizinfo.com www.icilpk.com www.iciltek.com www.pakcredit.com.pk 4/8/2012 3
  • 4. BOARD OF DIRECTORS Humayun Mufti FCA(England & Wales). He is an entrepreneur with industrial management background. Dr. Adil S. Mufti Ph.D (University of London) is also an an entrepreneur of proven corporate performance in Pakistan Amer Aziz Saiyied (Advocate) - Currently legal advisor to the Banking Ombudsman, Former Company Secretary & Legal Counsel Lever Brother Pakistan Arif Mufti (FCA) – He is currently Chairman & CEO Metlife American Life Insurance Company Ltd Salman T. Kureshi Leading marketing fractioned, formerly with Lever Brothers Pakistan, Brooke Bond, and Pak Com. Babar Mufti (M.Sc Economics, LSE) - CEO 4/8/2012 4
  • 5. Technology Business Security Biometric Solution & System Continuity & RFID Solutions Surveillance Solutions Integration I.T.D.R Solutions 4/8/2012 5
  • 6. Technology Solution & System Integration System Customize BI Solution ERP Integration and Software Designing and Implementation Consulting Development Implementation • Integration among • Specializes in ERP • Specialized software • Expertise in working on software components and customization and development using various and implementing ERP implementation tools and techniques • Cognos BI • Integrating various devices • Oracle - EBS R12 • Website and multimedia • MS Reporting with software • Microsoft - presentations Services • Business process Dynamics GP • Expertise in implementing • BIRT management • ICILtek - various content • Proven capabilities in eCorpStructure management solution i.e. programming database Joomla, Word press thus offers ETL tools development services 4/8/2012 6
  • 7. Technology Solution & System Integration (cont..) System Integration and Consulting System Integration “System integration is about linking sub systems together to take advantage of a system as whole. These sub systems could be software applications, devices, equipment and machines.” • Broader experience of various business domains • Experience of all major tools and technologies i.e. Java, MS. Net Framework, Open Source Technologies, Oracle, MySQL, SQL Server etc. • Knowledge of almost all famous ERPs i.e. Oracle EBS, MS Dynamics, SAP, Sage • Experienced in integrating devices, equipment and machinery that are capable of communicating 4/8/2012 7
  • 8. Technology Solution & System Integration (cont..) System Integration and Consulting (cont..) Consulting Services “IT Consulting Service is about assisting organizations in carrying out IT related activities from preparing RFP to assisting in developing, implementing and delivering solutions, and incorporate best and suitable solutions for achieving business goals.” • Business Process Management – Cross functional capabilities, focused work and result oriented approach enables ICILtek to achieve task efficiently • IT Infrastructure Management Outsourcing – Hardware, Network, Database, Information Security and Application Administration for SMEs • Assisting organizations in procuring right solutions for their business needs 4/8/2012 8
  • 9. Technology Solution & System Integration (cont..) ERP Implementation “Enter Resource Planning systems are software applications consists of several integrated modules. Each module is responsible for managing and processing information of a particular business function, it also shares, input to and take output from other modules.” • Oracle EBS R-12 Financials [for Large Enterprises] - General Ledger, Accounts Receivable, Accounts Payable, Cash Management, Fixed Assets • Microsoft Dynamics Great Plan Financials [for Medium Enterprises] - General Ledger, Receivables Management, Payables Management, Cash Flow Management, Collection, Encumbrance. • ICILtek eCorpStructure [for Small and Medium Enterprises] – Financials, Inventory Control, HRMS, CRM, Point of Sales, Institute Management System 4/8/2012 9
  • 10. Technology Solution & System Integration (cont..) ERP Implementation (cont..) eCorpStructure - HRMSuite “Human Resource Management System manages processes related to HR of an organization. It reduces the efforts required for managing cumbersome and time taking processes of time management and payroll processing.” • ICILtek offers HRMS on two different platforms • Web Based – ASP.Net and MySQL • Desktop Based – Forms and Reports 6i and Oracle Database • Consists of following functions / modules • Recruitment • Personnel • Time Attendance • Compensation and Payroll • Training • Can be used as an standalone system or integrated with any ERP or eCorpStructure ERP 4/8/2012 10
  • 11. Technology Solution & System Integration (cont..) ERP Implementation (cont..) eCorpStructure – IMS “Institute Management Systems are specialized ERPs exclusively for academic institutions. It integrates data, automates and integrates operational, financials and academic business processes thus greatly improves the performance.” • ICILtek offers IMS on two different platforms • Web Based – ASP.Net and MySQL and PHP and MySQL • Desktop Based – Oracle Forms and Reports 6i and Oracle Database • Consists of following functions / modules • Student Information System • Campus Management • Financials • HRMS (Optional) • Inventory Control (Optional) 4/8/2012 11
  • 12. Technology Solution & System Integration (cont..) ERP Implementation (cont..) eCorpStructure – POS “Point of Sales systems are integrated software applications specially designed for shops, wholesaler and retailers both. Consists of Sales, Inventory, Financials and limited functionality of CRM.” • ICILtek offers POS on two different platforms • Oracle Based – Oracle Forms and Reports 6i and Oracle Database • Microsoft Based – Windows forms using C# and MySQL • Consists of following functions / modules • Sales • Inventory • Financials • Can be integrated with • RFID • Barcode Readers 4/8/2012 12
  • 13. Technology Solution & System Integration (cont..) Customized Software Development - CSD “Customized Software Development is a service to develop a software application or solution for a specific organization based on its exclusive requirements. It is an opposite of off the shelf software packages that are based on general requirements.” • Expert in business analysis • Detailed requirement gathering using different techniques • Effective project management • Experienced with 4/8/2012 13
  • 14. Technology Solution & System Integration (cont..) BI Designing and Implementation 4/8/2012 14
  • 15. Business Continuity and I.T. D.R. Business IT Disaster Testing and Audit Continuity Recovery IT DR and BC Planning Planning Plan • Identifying critical and key • Identifying key applications and • Preparing compatibility report business processes critical IT processes against BCP and IT DR • Risk assessment • Risk assessment • Recommending changes in • Emergency evacuation planning • Back and recovery planning and existing BC and IT DR plan • Communication planning testing • Updating and maintaining • Operations recovery planning • Planning for Hot or Cold recovery • BCP drills and testing site • Maintaining and updating BC plan • Testing, maintaining and updating 4/8/2012 15
  • 16. Business Continuity and I.T. D.R. (cont..) Business Continuity Planning “Business Continuity Planning is a process of developing strategies, plans and actions to protect critical business processes from any interruption or disaster. Disaster can be major like hurricane and minor like power failure, the aim is to ensure the survival of the organization” • Offers following services under BCP • Business study and identifying critical business processes • Determining associated risks and preparing risk matrix against critical processes • Planning for emergency response , evacuation, communication and operations recovery • Testing plans and giving training to relevant personnel • Support - Maintaining and updating plan • ICILtek has affiliation with Kingswell UK for BCP 4/8/2012 16
  • 17. Business Continuity and I.T. D.R. (cont..) IT Service Continuity Management 4/8/2012 17
  • 18. Business Continuity and I.T. D.R. (cont..) Testing and Audit IT DR and BC Plan It is a known fact that designer or developers cant be considered to be valid testers. ICILtek having good knowledge of the intricacies of IT Service Continuity can help organization test their IT Service Continuity Plan to ensure that the plan is valid and as per the expectation of their management. It offers the following advantages to the stakeholders • Give management assurance and IT will continue to give service to departments incase of any incident. • Ensure that all IT assets are secure • Give management assurance that all departments will continue to serve their customer thus retaining them • Ensure all key staff are familiar with their incident management, business recovery and technical recovery plans • Prove the ability to recover the technical IT and communication infrastructure 4/8/2012 18
  • 19. Biometric Solutions Voice Finger Tip Palm Vein Retina Scanning Face Recognition Recognition • Based on finger • Based on palm vein • Based on retina • Based on face • Based on voice prints, fast in scanning and scanning and geometry • More secure processing recognition recognition • Accurate recognition • Time attendance • Time attendance • Approximately 100% • More secure • More secure • Access control • Access control accurate • Access control • Time attendance • Can be integrated • Replaces manual • Time attendance • Can be integrated • Access control with software signatures • Access control with software • Can be integrated applications • Can be integrated • Can be integrated applications with software with software with software applications applications applications • Recommended for labor staff 4/8/2012 19
  • 20. Biometric Solutions (cont..) Finger Tip ACTAtek is a world leader in ID Management solution. It is a leading web based, biometric, RFID smart card platform for enterprise wide solution.  2.8‘ TFT 256k color screen with slim and compact design  Embedded software, no software installation necessary.  State of the art embedded, encrypted Linux web server technology.  Control, configure & administrate via web browser  SSL encrypted communication between units & browser  Real time system update & configuration  500 DPI optical scanner  Auto-match support up to 500 users (1:N) FAM model  Auto-match support up to 3,000 users (1:N) FLI model  Operates in Standalone or Network modes  Robust and scalable for enterprise-wide deployment  IP 65 rated, weather & impact resistant casing (fluid ingress, dust, salt, fog protection)  Built-in Video/CMOS camera (optional)  1,000, 3,000 , 5,000 ,10,000, 15,000 or 20,000 users  Up to 75,000 event logs  Five Modes of authentication o Fingerprint only o Smart Card only o Smart Card + Fingerprint o ID + Fingerprint, and o ID + PIN. 4/8/2012 20
  • 21. Biometric Solutions (cont..) Palm Vein This system is based on the palm vein-network, since they have multiple features that make each person unique. Specifically on the blood veinspattern, which is unique to every individual, even among identical twins. Moreover, the system needs blood circulation for it to work, ensuring liveness. “PalmSecure™”, technology captures an image from the vein patterns of the hand palm by radiating his/her hand with near-infrared rays. Veins are an internal element of the human body and have many features that make each person unique. Therefore, reducing false acceptance rates close to zero. Everybody has veins in their hands, which makes this technology different from other technologies based on external patterns and does not allow any significant false rejection rate. 4/8/2012 21
  • 22. Biometric Solutions (cont..) Retina Scanning Ganetec IRIS recognition is a secure, effortless, non contact identity verification on the move. It delivers security of iris recognition in a convenient, high throughput system for access control. This portal configuration has a processing speed of 30 people per minute – subjects simply walk through a comfortable place. It also enables onboard enrollment and identifies subjects in less than one second making it ideal for high traffic locations such as airports, mass transit, security checkpoints and other applications that require positive identity verification for large number of people. 4/8/2012 22
  • 23. Biometric Solutions (cont..) Face Recognition - Hardware Facial recognition compares the facial features of a person to initiate a trigger. The Trigger can be as simple as marking attendance or granting access to particular place in office. Facial recognition is the most foolproof mechanism for any identity management application. Its uses special algorithms that identify faces by extracting landmarks or features from an image of the subject’s face. For example an algorithm may analyze the relative position, size and/or shape of the eyes, nose, cheekbones or jaws. F710 is embedded facial recognition system with leading “Dual Sensor” Facial recognition algorithm, which is generically used for time attendance and access control application. 4/8/2012 23
  • 24. Biometric Solutions (cont..) Face Recognition - Software Using Outdoor and Indoor cameras, Ganhertec Analytics Identifies and tracks People using a realtime or manual enroll Of their faces. 4/8/2012 24
  • 25. Biometric Solutions (cont..) Voice Recognition (under development) Voice biometrics products are designed to meet the dynamic security needs of the world’s leading financial institutions, telecom service providers, healthcare insurance companies, large enterprises, and law enforcement and government agencies. Organizations are empowered to improve security and comply with industry Regulations that require higher levels of security for authenticating identity, while reducing costs and delivering increased convenience to those they serve. Nuance voice biometrics technology provides an accurate, non-invasive, cost-effective identity verification solution that seamlessly integrates with existing contact center and VoiceXML platforms. 4/8/2012 25
  • 26. Biometric Solutions (cont..) Biometric Applications Guard Management Time Management Solution Parking Management Visitor Management 4/8/2012 26
  • 27. Biometric Device Matrix Cost Security Efficiency Applications Fingerprint Low Medium Medium Access Control, Attendance Facial Low High High-Medium Access control, Recognition security Iris High High High Passport control Palm Vein High High Medium Access Control, Attendance Voice High High Medium Tele-Banking 4/8/2012 27
  • 28. RFID Solutions Active Tags Passive Tags based RFID based RFID Solutions Solutions • Identification of items through RFID tags • Identification of items through RFID tags • Used to automate inventory (items / goods) IN • Used to automate inventory (items / goods) IN and OUT processes and OUT processes • Battery powered tags • Reader powered tags • In case of removing tag illegally from an item, • Inexpensive tag inform reader thus an alarm can activate • Inventory management of goods and fixed • Inventory management of valuable goods i.e. assets jewelry, machine parts etc. 4/8/2012 28
  • 29. RFID Solutions (cont..) RFID Applications RFID is the use of a wireless non-contact radio system to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered by the radio waves used to read them. Such a technology allows us to use it in a number of applications such as • Student Attendance and Tracking: Tag/ Student ID Card is detected by a reader to Mark attendance or determine his/her location 4/8/2012 29
  • 30. RFID Solutions (cont..) RFID and its applications • Car Parking Management RFID can be used to automate and bring Efficiency into car parking management. A RFID tag can be attached anywhere on a Car, as the automobile approaches the barrier or road blocker, the reader detects he tag and detaches or open the barrier granting him access into the car parking lot. • Asset Tracking Applications for asset tracking include those that involve reusable or rental assets such as Containers, Library Items and other supply chain applications where assets circulate through the system. The tags in such cases have to be long life, durable, robust and be able to perform in rough conditions. It should also have the capability to be easily integrated with a customer’s existing infrastructure 4/8/2012 30
  • 31. RFID Solutions (cont..) RFID and its applications • Document Tracking The need to maintain information in hard copy form or Physically on files can never be discounted. RFID allows For a more secure and efficient way of managing archives. With Tags in the form of sticker attached to the document One can securely ensure that all file are processed maintained in an efficient manner. • Counterfeiting in Pharmaceutical RFID provides item level supply chain visibility by providing Information required for product authentication . Pharmaceutical Consumers benefit from improved product safety, quality and availability. Pharmaceutical companies benefit from reduced liability, brand protection and additional revenue that otherwise gets diverted to counterfeit drugs. By adopting a global RFID network businesses can get full visibility, track and trace capabilities from the birth of the product through to delivery to final customer 4/8/2012 31
  • 32. RFID Solutions (cont..) RFID and its applications • Distribution and Inventory Control RFID can offers tremendous advantage in distribution Industry where major cost involved is in managing the Inventory. It is a known fact that in distribution centres RFID has been used to eliminate the need to manually Track and scan products, reducing labor cost by 30% or more. • Counterfeiting in Pharmaceutical RFID provides item level supply chain visibility by providing Information required for product authentication . Pharmaceutical Consumers benefit from improved product safety, quality and availability. Pharmaceutical companies benefit from reduced liability, brand protection and additional revenue that otherwise gets diverted to counterfeit drugs. By adopting a global RFID network businesses can get full visibility, track and trace capabilities from the birth of the product through to delivery to final customer 4/8/2012 32
  • 33. Security Surveillance Solutions Integrated IP Cameras Solutions CCTV Solutions Solutions (Cameras and Access Control) • Security surveillance • IP based • Integration among cameras through CCTV cameras • Each and every unit is and Access Control • Less expensive accessible to authorized • Tracking of unauthorized • In case of using IP based user over LAN or WAN access attempts DVR, streaming can be done on computer’s HDD • Compatibility with existing surveillance infrastructure 4/8/2012 33
  • 34. Security Surveillance Solutions (cont..) Video Surveillance Solution (CCTV and IP) 4/8/2012 34
  • 35. Security Surveillance Solutions (cont..) Integrated Solutions (Cameras and Access Control) 4/8/2012 35
  • 36. Security Surveillance Solutions (cont..) Intelligent Video Analytics Face and License Plate Recognition People Counting 4/8/2012 36
  • 37. Security Surveillance Solutions (cont..) Intelligent Video Analytics Motion Detection and Forbidden Area Detection Added Object Monitors a specific area and prompts if an object of an Kind is detected in that place 4/8/2012 37
  • 38. Security Surveillance Solutions (cont..) Intelligent Video Analytics Missing Object Detects an object missing from a specific Location being monitored by the camera. 4/8/2012 38
  • 39. Major Customers Johnson and Johnson Pakistan Pvt Ltd Bank Al Habib Ltd Sind Police National Bank of Pakistan Ltd Aman Fundation 4/8/2012 39
  • 40. Major Customers American Life Insurance Company (Pakistan) Ltd Grome Marketing (Cyprus) Ltd. Institute of Business Administration Tullow Pakistan (Developments) Ltd Gul Ahmed - Ideas 4/8/2012 40
  • 41. Contact Information Malik Munir Yasser Mufti Hassan Shahzad Malik Munir Hassan Shahzad 03002616825 03002124461 03002616825 malikmunir@tek.coim yasser@iciltek.com hassanrizvi@iciltek.com malikmunir@iciltek.com Skype: malikmunir Skype: yasser_adil 4/8/2012 41