SlideShare una empresa de Scribd logo
1 de 8
WHO WE ARE
ETNOS IT SOLUTIONS-------- we help you to succeed

In this age of vast business processes and complex networking system there is an ever increasing
need for unique IT security products and solutions to tackle the multifaceted threats emerging in the
technology space. At Ethnos we offer you state-of-the-art solution in information systems security.
Our services focus on products, service and training. We are committed to supporting organizations
as they face growing and rapidly evolving set of security threats including, cybercrime, workforce
mobility and data breach. Our vision—to help you succeed—is not only grounded in our history, it is
also the conviction that propels the company forward.

We are focused on this mission to deliver intelligent technology for the most efficient and effective
security across all sectors; and strive to be a world class company in real-time adaptive information
systems security, giving organizations maximum knowledge and capacity to protect themselves
against currently growing and sophisticated targeted attacks.

With our growing list of globally leading technical partners, we are deeply committed to over 15
active partners around the world including some of the most influential Info Security experts. Our
products and solutions reflect our commitment to delivering a comprehensive and robust platform of
secure mission critical business environment.

Our business is divided into three strategic areas.

Security: we offer IT security appliances and support that ensure organization’s critical information
assets like sensitive data and IT infrastructure are better protected against attacks..

Services: we provide our client with the needed leverage to satisfy and comply with the global
security industry standard and regulation such as PCI DSS, ISO 27001/27002 etc

Training: we empower executives to efficiently and intelligently manage their enterprise resources as
favorably as can be achieved


Contacts

ethnos| 15, Kusenla Road, Ikate Elegushi, Lekki Victoria Island Lagos.
+234 (0)1 8447001|
mail@ethnosit.net| www.ethnosit.net


Security|Compliance|Training
Compliance
Ethnos is an innovative security company in Nigeria certified by Trustwave to offer the payment card
industry data security standard validation service.
Ethnos is at the forefront of delivering on-demand compliance tools and data security solutions for
the payments industry. Our tool offers you the highest compliance achievement rates in the industry,
and will help you wade through the complexity of the Payment Card Industry Data Security
Standard (PCI DSS) is a set of requirements designed to ensure that all companies that process,
store or transmitcredit card information maintain a secure environment compliance process. We
provide our client with the needed leverage to satisfy and comply with the global security industry
standard and regulation-PCI DSS, ISO 27001/27002 etc. trustwave present accounts for over 50
percent of the global card market and had accredited Ethos as vendors and strategic patners


Security
Over the past decades, the cyber environment has evolved rapidly to dominate almost every aspect of
human interaction. Businesses now depend on cyberspace more then ever to manage their banking
transactions, investments, work and personal communication, shopping, travel, utilities, news, and
even social networking. With this growing dependence inevitably comes an increased vulnerability.
Ethnos is a value added distributor of leading cyber security solutions that offers your business top of
the range protection for your network infrastructure, data center and security solutions with a global
network of strategic technical partners. Our expertise provides exceptional technical support to
accelerate the business of our clients. Our aim is to offer you information systems security appliances
and support that ensures your organization’s critical information assets like sensitive data and IT
infrastructure are better protected against attacks.

Our security solutions:
Anti-virus
Encryption
Firewall
Endpoint security solution
Newt Access control
Vulnerability Scanning
Penetration testing appliances
Tokenization
Messaging solution
Unified threat management
File Integrity Monitoring
Incident Response
Policy & Procedures
Security Assessment
Secure Email
Security Research
Secure Socket Layer Certificate
Security Information and Event Management (SIEM
Web and application filtering
Security Education
Authentication
Intrusion Prevent System / Intrusion Detection System
Web application firewall
Data security and activity monitoring
Data Loss Prevention solution
Two factor authentication:
Fraud detection solution:
Patch management
Training:
With us you can experience first hand the future of information security education on a wide variety
of categories such as
Cyber security application training
PCI DSS and other compliance validation training
Financial crime investigation and lots more

We partner with world class security organization to empower executives to efficiently and
intelligently manage their enterprise resources as favorably as can be achieved
We are presently working with London City Police and Career Academy in providing you with
ample opportunity to be a part of an educative forum that will sky rocket your knowledge base and
help you deal with the cyber revolution and threats plaguing the 21st Century


IT Security Quotes
Phishing is a major problem because there really is no patch for human stupidity — Mike Danseglio,
program manager in the Security Solutions group at Microsoft,

In 2006, the attackers want to pay the rent. They don't want to write a worm that destroys your
hardware. They want to assimilate your computers and use them to make money. — Mike Danseglio,
program manager in the Security Solutions group at Microsoft

History has taught us: never underestimate the amount of money, time, and effort someone will
expend to thwart a security system. It's always better to assume the worst. Assume your adversaries
are better than they are. Assume science and technology will soon be able to do things they cannot
yet. Give yourself a margin for error. Give yourself more security than you need today. When the
unexpected happens, you'll be glad you did. — Bruce Schneier

Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire; it
wafts across the electrified borders. — Ronald Reagan

I walked into this classroom full of law enforcement officers and said, "Do you guys recognize any of
these names?" I read off a list of the names. One federal officer explained, "Those are the names of
judges in the US District Court in Seattle." And I said, "Well, I have a password file here with 26
passwords cracked." Those federal officers about turned green. — Don Belling, Boeing, quoted in The
Art of Intrusion by Kevin Mitnick

You can't hold firewalls and intrusion detection systems accountable. You can only hold people
accountable. — Daryl White, DOI CIO

I personally like to think of the Internet as a parallel universe, a cyber-world as opposed to the real-
world. In cyber-world people do much the same thing as in the real-world, such as chat, work, or go
shopping. And, as in the real-world, there are dangers. In the real-world, we spend years as children
learning about the world and all its dangers before we can safely go out on our own. This is not the
case in cyber-world. People wander into cyber-world as cyber-toddlers or even cyber-infants. How
can these people be expected to look after themselves in this strange new world? ... I believe that
education must be the first step to computer security. Cyber-world is too complex and dangerous to
jump into without understanding the dangers. — Jimi Loo, in Comments & Feedback to Noam
Eppel's Article, "Security Absurdity: The Complete, Unquestionable, and Total Failure of Information
Security. A long-overdue wake up call for the security community."



Flashes
1.   Regulatory Compliance: we provide our client with the needed leverage to satisfy and
              comply with the global security industry standard and regulation such as PCI DSS, ISO
              27001/27002 etc.

         2. Security: we offer IT security appliances and software that ensure organization’s mission
            critical information infrastructure and assets like sensitive data are better protected against
            criminals and targeted attacks etc.

         3. Training: we empower executives with skills and capacity to efficiently and intelligently
            manage their enterprise resources as favourably as can be achieved.

         4. A Million Reason you must do business with Ethnos….

         5. Flash 4th Advert…..coming


     A million reasons to do business with ETHNOS
     We will help you improve profitability
     We will stop your losses
     We will help you secure your business
     We will help you achieve stability and sustain growth
     We will help you achieve and sustain regulatory standards compliance
     We will defend you while you take care of your business

     Challenges Simplified
     We understand your business challenges…
     You need to be on top of today’s information security threats & compliance changes while striving to
     achieve more with less.

     We help you protect your websites, applications, networks and data from security threats.

     Client List

S/N Client                                    Project Type
1   Zenith Bank Plc                           Payment card industry data security standards (PCIDSS)
                                              compliance validation service
2      Globacom Ltd                           Supply, implementation & support of enterprise Kaspersky
                                              antivirus
3      Nigerian Stock Exchange                Supply of enterprise Kaspersky antivirus
4      Africa Finance Corporation             Supply, implementation & support of enterprise Kaspersky
                                              antivirus and value added information security consulting service
5      Nigerian Ports Authority               Ant-piracy and IMO certification training
6      BLW Incorporation                      Supply and implementation of Cyberoam UTM
7      InfinityTV                             Supply of enterprise Kaspersky antivirus
8      Moneycom Bank                          Supply of enterprise Kaspersky antivirus
9      Paralex Bank                           Supply and implementation of enterprise Kaspersky antivirus
10     Innercity Mission                      Supply of enterprise Kaspersky antivirus
11     Interlinked Technologies Plc           Supply and implementation of enterprise Kaspersky antivirus
12     Caleb University                       Supply of enterprise Kaspersky antivirus
13     Redeemer’s University                  Supply and implementation of enterprise Kaspersky antivirus
14     Progenics Corp                         Supply of enterprise Kaspersky antivirus
15     Chrisland School                       Supply of enterprise Avira antivirus
16     Daltrade Ltd                           Supply of enterprise Avira antivirus
17     Septa Energy                           Supply of enterprise Avira antivirus
18     GNLD (International) Lagos             Supply, implementation & support of enterprise Kaspersky
                                              antivirus.
                                              Supply of GFI Backup and Mdaemon Email Server
19     GNLD (International) Cameroon          Supply, implementation & support of enterprise Kaspersky
                                              antivirus.
20     DTV Engineering                        Supply of GFI Webmonitor
21     ENL Consortium                         Supply of GFI Webmonitor
22




     Partner
     Our foreign partners include:



     Trustwave: Theleading global provider of information security and compliance management
     solutions to large and small businesses and public sector. Trustwave offers and supports SSL
     certificates, proprietary security appliance, managed security services and compliance management
     solutions to help your organizations simplify, accelerate and validate their compliance with industry
     standards and regulation such as PCI DSS, HIPAA, SAS-70, GLBA among others. .....link to website




     GFI Software: An award-winning IT solutions provider for small and medium-sized businesses
     (SMBs). With millions of installations around the world, GFI Software has worked hard to create
     products that deliver on all points. Not many vendors in the small to medium-sized IT market have
     managed to build such a respected track record or perform consistently with such a wide and diverse
     market footprint. ....link to website



     Netclarity: An emerging leader in next generation NAC with unique security products that focuses
     on small and medium scale enterprises. Netclarity is an inside out security vendor which develops
     network security product solution to detect and block MAC and IP Spoofers, capture untrusted
     assets and quarantine them in addition to moving assets agentlessly across VLANs. ....link to website



     Kaspersky: one of the fastest growing IT security companies worldwide. Today, Kaspersky is firmly
     positioned as one of the world’s top four leading vendors of endpoint security software. Kaspersky
     Lab continues to further improve its market position, demonstrating significant growth in all regions.
     Undoubtedly, the company’s most valuable asset is the relentless expertise it has gained in those
     years of combating viruses and other IT threats, enabling it to preempt trends in malware
     development. ....link to website




     Avira: The largest German security specialist with experience in the development and support of
     security solutions. In addition to programs specifically for use on single workstations, Avira primarily
offers professional solutions for cross-system protection of networks on various levels. Avira product
will provide your corporate infrastructure with world class anti-virus and anti-malware protection in
a single, integrated suite of applications that works seamlessly across all platforms. Every
workstation, laptop, file server, mail server, internet gateway or Smartphone can be protected, giving
you complete confidence that the network is secure, whether you are in the office, remotely or at
home. ....link to website




Cyberoam: A leading provider of Network Security Solutions to organizations across the globe.
Cyberoam offers identity-based network and endpoint security solution with special feature for
multiple internet link and bandwidth management. ....link to website




Security Innovations: An application security company that focuses on the most difficult problem in
IT security and the root cause of most data breaches – insecure software applications. For more than
a decade, the company has helped organizations like Microsoft, ING, GoDaddy.com, Progress Energy,
Nike and others build internal expertise, uncover critical vulnerabilities, and integrate security into
their software development lifecycle (SDLC). ....link to website



Edgewave: offers you a comprehensive Secure Content Management Portfolio that delivers a full
range of solutions designed to protect your organization from current and emerging threats, while
conserving your IT resources by delivering the lowest TCO on the market. EdgeWave solutions are
ideal for any industry or market including: Enterprise and Small to Mid-size Businesses. ....link to
website



RSA Security: An American computer and network Security Company among its products includes
the RSA BSAFE cryptography libraries and the SecurID authentication token. It also organizes the
annual RSA Conference, an information security conference a forum for cryptographers to gather and
share the latest knowledge and advancements in the area of Internet security. ....link to website


Westcon Security: Delivers world class information security solutions and service that transcends
simply buying products for projections purposes. Westcon recognizes the role security plays in the
daily operations of all organizations irrespective of their size and harnesses this knowledge to assist
with planning, strategy development watertight implementations and monitoring. ....link to website




Palo Alto: A next generation firewall company whose experienced team brings a proven track record
of building and delivering enterprise class networks infrastructure products to the market with their
identification technologies that allow enterprises to securely enable application usage using
business-relevant concepts, instead of following the traditional "all-or-nothing" approach offered by
traditional port-blocking firewalls used in many security infrastructures. ....link to website
Sophos: A foremost developer and vendor of security software and hardware solution, including anti-
virus, anti-spyware, anti-spam, network access control, encryption software and data loss prevention
for desktops, servers, email systems and other network gateways. ....link to website



GTB Technologies: The dominant provider of Data Loss Prevention (DLP/ILP) solutions globally.
With GTB your company is guaranteed of products that offer you unprecedented, real-time visibility
and accurate control of content thus allowing organizations of all sizes to easily and cost effectively
prevent leaks, discover data, and enforce policies and compliance, while protecting their brand and
reputation. ....link to website




Syncplicity: An authority in backup and synchronization service which allows users to store and
sync files online between computers. Currently it supports Microsoft Windows and is in beta for
Mac OSX. It provides your business with easy to use cloud based file management service for
companies that combines centralized management for IT and intuitive native support for MACs, PCs
and cloud applications for end uses. ....link to website




Altn-Technologies: Develops affordable and secure messaging and collaboration solutions designed
for, and trusted by, small-to-medium businesses in over 90 countries and 25 languages worldwide.
The company's flagship solutions, the MDaemon® Messaging Server and the SecurityGateway for
Exchange/SMTP Servers, include the latest email security technologies, and require minimal support
and administration to operate and maintain. ....link to website




Secpoint: Reputed to be the best IT Security Appliance Vendor that makes UTM Appliances, Pen
Testing appliances, WIFI Security Auditing. Its preliminary focus is to offer top-notch, valuable and
innovative IT Security solutions to business enterprises with maximum ease. ....link to website




Lumension:



Decision Group:


City of London Police Academy:


Ethno Intro:
At Ethnos we offer you state-of-the-art solution in information systems security. Our services focus
on products, service and training. We are committed to supporting organizations as they face
growing and rapidly evolving set of security threats including, cybercrime, workforce mobility and
data breach. Our vision—to help you succeed—is not only grounded in our history, it is also the
conviction that propels the company forward.

We are focused on this mission to deliver intelligent technology for the most efficient and effective
security across all sectors; and strive to be a world class company in real-time adaptive information
systems security, giving organizations maximum knowledge and capacity to protect themselves
against currently growing and sophisticated targeted attacks.

With our growing list of globally leading technical partners, we are deeply committed to over 15
active partners around the world including some of the most influential Info Security experts. Our
products and solutions reflect our commitment to delivering a comprehensive and robust platform of
secure mission critical business environment.

Contacts Us
Office:
15, Kusenla Road, IkateElegushi, Lekki Victoria Island, Lagos Nigeria
Phone: +234 1 8447001
Email: mail@ethnosit.net
www.ethnosit.net

Sales Phone Lines:
07045506641
07045506643
07045506644
07045506645
07045506646

Contact form
Kindly pop in your details and our advisors will be in touch to provide your needs
        First Name
        Last Name
        Company Name
        Business address with postcode
        Tel
        Cell/direct Phone
        Email
        Your enquiry ( A Box)

Más contenido relacionado

La actualidad más candente

Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017Merry D'souza
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010Ulf Mattsson
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Tony Richardson CISSP
 

La actualidad más candente (19)

Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Pdf7
Pdf7Pdf7
Pdf7
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
 

Similar a Ethnosit.net

Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdforage technologies
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Top Reasons to Work with the Cyber Security Experts
Top Reasons to Work with the Cyber Security ExpertsTop Reasons to Work with the Cyber Security Experts
Top Reasons to Work with the Cyber Security ExpertsDual layer IT Solutions LTD
 

Similar a Ethnosit.net (20)

Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Top Reasons to Work with the Cyber Security Experts
Top Reasons to Work with the Cyber Security ExpertsTop Reasons to Work with the Cyber Security Experts
Top Reasons to Work with the Cyber Security Experts
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Ethnosit.net

  • 1. WHO WE ARE ETNOS IT SOLUTIONS-------- we help you to succeed In this age of vast business processes and complex networking system there is an ever increasing need for unique IT security products and solutions to tackle the multifaceted threats emerging in the technology space. At Ethnos we offer you state-of-the-art solution in information systems security. Our services focus on products, service and training. We are committed to supporting organizations as they face growing and rapidly evolving set of security threats including, cybercrime, workforce mobility and data breach. Our vision—to help you succeed—is not only grounded in our history, it is also the conviction that propels the company forward. We are focused on this mission to deliver intelligent technology for the most efficient and effective security across all sectors; and strive to be a world class company in real-time adaptive information systems security, giving organizations maximum knowledge and capacity to protect themselves against currently growing and sophisticated targeted attacks. With our growing list of globally leading technical partners, we are deeply committed to over 15 active partners around the world including some of the most influential Info Security experts. Our products and solutions reflect our commitment to delivering a comprehensive and robust platform of secure mission critical business environment. Our business is divided into three strategic areas. Security: we offer IT security appliances and support that ensure organization’s critical information assets like sensitive data and IT infrastructure are better protected against attacks.. Services: we provide our client with the needed leverage to satisfy and comply with the global security industry standard and regulation such as PCI DSS, ISO 27001/27002 etc Training: we empower executives to efficiently and intelligently manage their enterprise resources as favorably as can be achieved Contacts ethnos| 15, Kusenla Road, Ikate Elegushi, Lekki Victoria Island Lagos. +234 (0)1 8447001| mail@ethnosit.net| www.ethnosit.net Security|Compliance|Training
  • 2. Compliance Ethnos is an innovative security company in Nigeria certified by Trustwave to offer the payment card industry data security standard validation service. Ethnos is at the forefront of delivering on-demand compliance tools and data security solutions for the payments industry. Our tool offers you the highest compliance achievement rates in the industry, and will help you wade through the complexity of the Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that all companies that process, store or transmitcredit card information maintain a secure environment compliance process. We provide our client with the needed leverage to satisfy and comply with the global security industry standard and regulation-PCI DSS, ISO 27001/27002 etc. trustwave present accounts for over 50 percent of the global card market and had accredited Ethos as vendors and strategic patners Security Over the past decades, the cyber environment has evolved rapidly to dominate almost every aspect of human interaction. Businesses now depend on cyberspace more then ever to manage their banking transactions, investments, work and personal communication, shopping, travel, utilities, news, and even social networking. With this growing dependence inevitably comes an increased vulnerability. Ethnos is a value added distributor of leading cyber security solutions that offers your business top of the range protection for your network infrastructure, data center and security solutions with a global network of strategic technical partners. Our expertise provides exceptional technical support to accelerate the business of our clients. Our aim is to offer you information systems security appliances and support that ensures your organization’s critical information assets like sensitive data and IT infrastructure are better protected against attacks. Our security solutions: Anti-virus Encryption Firewall Endpoint security solution Newt Access control Vulnerability Scanning Penetration testing appliances Tokenization Messaging solution Unified threat management File Integrity Monitoring Incident Response Policy & Procedures Security Assessment Secure Email Security Research Secure Socket Layer Certificate Security Information and Event Management (SIEM Web and application filtering Security Education Authentication Intrusion Prevent System / Intrusion Detection System Web application firewall Data security and activity monitoring Data Loss Prevention solution Two factor authentication: Fraud detection solution: Patch management
  • 3. Training: With us you can experience first hand the future of information security education on a wide variety of categories such as Cyber security application training PCI DSS and other compliance validation training Financial crime investigation and lots more We partner with world class security organization to empower executives to efficiently and intelligently manage their enterprise resources as favorably as can be achieved We are presently working with London City Police and Career Academy in providing you with ample opportunity to be a part of an educative forum that will sky rocket your knowledge base and help you deal with the cyber revolution and threats plaguing the 21st Century IT Security Quotes Phishing is a major problem because there really is no patch for human stupidity — Mike Danseglio, program manager in the Security Solutions group at Microsoft, In 2006, the attackers want to pay the rent. They don't want to write a worm that destroys your hardware. They want to assimilate your computers and use them to make money. — Mike Danseglio, program manager in the Security Solutions group at Microsoft History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did. — Bruce Schneier Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire; it wafts across the electrified borders. — Ronald Reagan I walked into this classroom full of law enforcement officers and said, "Do you guys recognize any of these names?" I read off a list of the names. One federal officer explained, "Those are the names of judges in the US District Court in Seattle." And I said, "Well, I have a password file here with 26 passwords cracked." Those federal officers about turned green. — Don Belling, Boeing, quoted in The Art of Intrusion by Kevin Mitnick You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable. — Daryl White, DOI CIO I personally like to think of the Internet as a parallel universe, a cyber-world as opposed to the real- world. In cyber-world people do much the same thing as in the real-world, such as chat, work, or go shopping. And, as in the real-world, there are dangers. In the real-world, we spend years as children learning about the world and all its dangers before we can safely go out on our own. This is not the case in cyber-world. People wander into cyber-world as cyber-toddlers or even cyber-infants. How can these people be expected to look after themselves in this strange new world? ... I believe that education must be the first step to computer security. Cyber-world is too complex and dangerous to jump into without understanding the dangers. — Jimi Loo, in Comments & Feedback to Noam Eppel's Article, "Security Absurdity: The Complete, Unquestionable, and Total Failure of Information Security. A long-overdue wake up call for the security community." Flashes
  • 4. 1. Regulatory Compliance: we provide our client with the needed leverage to satisfy and comply with the global security industry standard and regulation such as PCI DSS, ISO 27001/27002 etc. 2. Security: we offer IT security appliances and software that ensure organization’s mission critical information infrastructure and assets like sensitive data are better protected against criminals and targeted attacks etc. 3. Training: we empower executives with skills and capacity to efficiently and intelligently manage their enterprise resources as favourably as can be achieved. 4. A Million Reason you must do business with Ethnos…. 5. Flash 4th Advert…..coming A million reasons to do business with ETHNOS We will help you improve profitability We will stop your losses We will help you secure your business We will help you achieve stability and sustain growth We will help you achieve and sustain regulatory standards compliance We will defend you while you take care of your business Challenges Simplified We understand your business challenges… You need to be on top of today’s information security threats & compliance changes while striving to achieve more with less. We help you protect your websites, applications, networks and data from security threats. Client List S/N Client Project Type 1 Zenith Bank Plc Payment card industry data security standards (PCIDSS) compliance validation service 2 Globacom Ltd Supply, implementation & support of enterprise Kaspersky antivirus 3 Nigerian Stock Exchange Supply of enterprise Kaspersky antivirus 4 Africa Finance Corporation Supply, implementation & support of enterprise Kaspersky antivirus and value added information security consulting service 5 Nigerian Ports Authority Ant-piracy and IMO certification training 6 BLW Incorporation Supply and implementation of Cyberoam UTM 7 InfinityTV Supply of enterprise Kaspersky antivirus 8 Moneycom Bank Supply of enterprise Kaspersky antivirus 9 Paralex Bank Supply and implementation of enterprise Kaspersky antivirus 10 Innercity Mission Supply of enterprise Kaspersky antivirus 11 Interlinked Technologies Plc Supply and implementation of enterprise Kaspersky antivirus 12 Caleb University Supply of enterprise Kaspersky antivirus 13 Redeemer’s University Supply and implementation of enterprise Kaspersky antivirus 14 Progenics Corp Supply of enterprise Kaspersky antivirus 15 Chrisland School Supply of enterprise Avira antivirus 16 Daltrade Ltd Supply of enterprise Avira antivirus 17 Septa Energy Supply of enterprise Avira antivirus
  • 5. 18 GNLD (International) Lagos Supply, implementation & support of enterprise Kaspersky antivirus. Supply of GFI Backup and Mdaemon Email Server 19 GNLD (International) Cameroon Supply, implementation & support of enterprise Kaspersky antivirus. 20 DTV Engineering Supply of GFI Webmonitor 21 ENL Consortium Supply of GFI Webmonitor 22 Partner Our foreign partners include: Trustwave: Theleading global provider of information security and compliance management solutions to large and small businesses and public sector. Trustwave offers and supports SSL certificates, proprietary security appliance, managed security services and compliance management solutions to help your organizations simplify, accelerate and validate their compliance with industry standards and regulation such as PCI DSS, HIPAA, SAS-70, GLBA among others. .....link to website GFI Software: An award-winning IT solutions provider for small and medium-sized businesses (SMBs). With millions of installations around the world, GFI Software has worked hard to create products that deliver on all points. Not many vendors in the small to medium-sized IT market have managed to build such a respected track record or perform consistently with such a wide and diverse market footprint. ....link to website Netclarity: An emerging leader in next generation NAC with unique security products that focuses on small and medium scale enterprises. Netclarity is an inside out security vendor which develops network security product solution to detect and block MAC and IP Spoofers, capture untrusted assets and quarantine them in addition to moving assets agentlessly across VLANs. ....link to website Kaspersky: one of the fastest growing IT security companies worldwide. Today, Kaspersky is firmly positioned as one of the world’s top four leading vendors of endpoint security software. Kaspersky Lab continues to further improve its market position, demonstrating significant growth in all regions. Undoubtedly, the company’s most valuable asset is the relentless expertise it has gained in those years of combating viruses and other IT threats, enabling it to preempt trends in malware development. ....link to website Avira: The largest German security specialist with experience in the development and support of security solutions. In addition to programs specifically for use on single workstations, Avira primarily
  • 6. offers professional solutions for cross-system protection of networks on various levels. Avira product will provide your corporate infrastructure with world class anti-virus and anti-malware protection in a single, integrated suite of applications that works seamlessly across all platforms. Every workstation, laptop, file server, mail server, internet gateway or Smartphone can be protected, giving you complete confidence that the network is secure, whether you are in the office, remotely or at home. ....link to website Cyberoam: A leading provider of Network Security Solutions to organizations across the globe. Cyberoam offers identity-based network and endpoint security solution with special feature for multiple internet link and bandwidth management. ....link to website Security Innovations: An application security company that focuses on the most difficult problem in IT security and the root cause of most data breaches – insecure software applications. For more than a decade, the company has helped organizations like Microsoft, ING, GoDaddy.com, Progress Energy, Nike and others build internal expertise, uncover critical vulnerabilities, and integrate security into their software development lifecycle (SDLC). ....link to website Edgewave: offers you a comprehensive Secure Content Management Portfolio that delivers a full range of solutions designed to protect your organization from current and emerging threats, while conserving your IT resources by delivering the lowest TCO on the market. EdgeWave solutions are ideal for any industry or market including: Enterprise and Small to Mid-size Businesses. ....link to website RSA Security: An American computer and network Security Company among its products includes the RSA BSAFE cryptography libraries and the SecurID authentication token. It also organizes the annual RSA Conference, an information security conference a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security. ....link to website Westcon Security: Delivers world class information security solutions and service that transcends simply buying products for projections purposes. Westcon recognizes the role security plays in the daily operations of all organizations irrespective of their size and harnesses this knowledge to assist with planning, strategy development watertight implementations and monitoring. ....link to website Palo Alto: A next generation firewall company whose experienced team brings a proven track record of building and delivering enterprise class networks infrastructure products to the market with their identification technologies that allow enterprises to securely enable application usage using business-relevant concepts, instead of following the traditional "all-or-nothing" approach offered by traditional port-blocking firewalls used in many security infrastructures. ....link to website
  • 7. Sophos: A foremost developer and vendor of security software and hardware solution, including anti- virus, anti-spyware, anti-spam, network access control, encryption software and data loss prevention for desktops, servers, email systems and other network gateways. ....link to website GTB Technologies: The dominant provider of Data Loss Prevention (DLP/ILP) solutions globally. With GTB your company is guaranteed of products that offer you unprecedented, real-time visibility and accurate control of content thus allowing organizations of all sizes to easily and cost effectively prevent leaks, discover data, and enforce policies and compliance, while protecting their brand and reputation. ....link to website Syncplicity: An authority in backup and synchronization service which allows users to store and sync files online between computers. Currently it supports Microsoft Windows and is in beta for Mac OSX. It provides your business with easy to use cloud based file management service for companies that combines centralized management for IT and intuitive native support for MACs, PCs and cloud applications for end uses. ....link to website Altn-Technologies: Develops affordable and secure messaging and collaboration solutions designed for, and trusted by, small-to-medium businesses in over 90 countries and 25 languages worldwide. The company's flagship solutions, the MDaemon® Messaging Server and the SecurityGateway for Exchange/SMTP Servers, include the latest email security technologies, and require minimal support and administration to operate and maintain. ....link to website Secpoint: Reputed to be the best IT Security Appliance Vendor that makes UTM Appliances, Pen Testing appliances, WIFI Security Auditing. Its preliminary focus is to offer top-notch, valuable and innovative IT Security solutions to business enterprises with maximum ease. ....link to website Lumension: Decision Group: City of London Police Academy: Ethno Intro: At Ethnos we offer you state-of-the-art solution in information systems security. Our services focus on products, service and training. We are committed to supporting organizations as they face growing and rapidly evolving set of security threats including, cybercrime, workforce mobility and
  • 8. data breach. Our vision—to help you succeed—is not only grounded in our history, it is also the conviction that propels the company forward. We are focused on this mission to deliver intelligent technology for the most efficient and effective security across all sectors; and strive to be a world class company in real-time adaptive information systems security, giving organizations maximum knowledge and capacity to protect themselves against currently growing and sophisticated targeted attacks. With our growing list of globally leading technical partners, we are deeply committed to over 15 active partners around the world including some of the most influential Info Security experts. Our products and solutions reflect our commitment to delivering a comprehensive and robust platform of secure mission critical business environment. Contacts Us Office: 15, Kusenla Road, IkateElegushi, Lekki Victoria Island, Lagos Nigeria Phone: +234 1 8447001 Email: mail@ethnosit.net www.ethnosit.net Sales Phone Lines: 07045506641 07045506643 07045506644 07045506645 07045506646 Contact form Kindly pop in your details and our advisors will be in touch to provide your needs First Name Last Name Company Name Business address with postcode Tel Cell/direct Phone Email Your enquiry ( A Box)