Sentinel World Inc' - PowerPoint PPT Presentation

1 / 39
About This Presentation
Title:

Sentinel World Inc'

Description:

To service Global Security and secure Human and other Corporate assets against ... Vehicle/Home/Business Security. RFID. Business Continuity ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 40
Provided by: phy122
Category:
Tags: inc | sentinel | world

less

Transcript and Presenter's Notes

Title: Sentinel World Inc'


1
Sentinel World Inc.
The Best in Security Information Technology
Integration
2
Business
  • Integrator of Security Subject Matter Expertise
    and Information Technology

3
Vision
  • To service Global Security and secure Human and
    other Corporate assets against Chemical,
    Biological, Radiological, Nuclear and Explosive
    (CBRNE) and Cyber terrorist threats.

4
Mission
  • To service Global Security, a critical element of
    todays society, by providing easily accessible
    and affordable technologies for business
    continuity while securing market capitalization
    over 1B in 3 years.

5
Team Credentials
  • Subject Matter Experts have extensive real-world
    experience
  • the 9/11 terrorist attacks in New York City
  • the 2001 New Jersey anthrax attacks
  • the 2001 kidnapping/murder of WSJ reporter Daniel
    Pearl investigation
  • the 1999 Egypt Air Flight 990 crash
    investigation
  • the 1997 U.S. Embassy bombings in Africa
  • the 1996 Khobar Towers U.S. Army military base
    bombing
  • the 1996 TWA Flight 800 crash investigation
  • the 1993 Unabomber crime scene in New Jersey
  • the 1993 World Trade Center bombing
  • the Kosovo War Crimes Investigation
  • numerous classified investigations
  • extensive training in terrorism, terrorism
    profiling, forensics, explosive devices, bomb
    technician certification, bombing crime
    scene/post blast
  • crime scene management, crisis response
  • and much more.

6
Strategic Alliances
  • IDAHO Technologies
  • CHB Industries
  • RMI International
  • Software International Inc.
  • DefensTech International Inc.

7
Long Term Strategy
  • Sentinel World plans to substantially expand its
    operations world wide during the next 12-36
    months, so as to undertake increased security
    solutions and security development activities
    both in the physical domain and in information
    technology.
  • Sentinel World will focus on consulting services,
    utilizing in-house specialization, professional
    alliances, and the business outsourcing market at
    a competitive price. Sentinel World is focused on
    developing and marketing the best product at low
    cost with access to
  • A large worldwide market
  • Talented security manpower in Asia US
  • Talented IT manpower in Asia US
  • Marketing resources world wide

8
Target Markets-Security
  • Since the 9/11/ attacks, homeland security has
    been one of the most rapidly growing business
    segments.
  • The US federal government has spent more than
    130 billion on homeland defense. An additional
    50 billion is budgeted for FY 2006.
  • The private sector in the US has invested nearly
    23 billion and another 23 billion world wide,
    per year, to defend its interests.
  • Across the board, there is an increasing need to
    integrate emergency management, business
    continuity, and risk mitigation with technologies
    to prepare against the growing threat of
    terrorism.
  • A player that can seamlessly integrate homeland
    security and information technology security will
    have the potential to achieve significant sales
    volumes world wide.

9
Vertical Client Focus
  • Finance Banking
  • Federal, State Quasi Government Organizations
  • Telecom
  • Automotive
  • Insurance
  • Entertainment
  • Medical
  • Law Enforcement/Military

10
Products/Services
  • Corporate Public Biological Pathogen Detection
    Program-Biowatch Program, Bio Assessment Team
  • Bomb Detection Technology (X-ray, Chem Reagents,
    Wands),
  • Blast Mitigation and Life Vest Technologies
  • Security-Detection Monitoring Systems,
    Communications Systems, Access Control Systems,
    Biometric Identification Technology, Remote
    Command Crisis Command Systems, Computer
    Forensics, Laser Sonar Scanning/Imaging
    Systems, Asset Protection Systems, Wireless
    Communications
  • IT Security-Assessment, Vulnerability/Penetration
    Testing, Policy Design, Security Architecture
    Design, Implementation, Audits, Monitoring
  • Vehicle/Home/Business Security
  • RFID
  • Business Continuity
  • Emergency Management, Crisis Mitigation, Risk
    Mitigation, Business Continuity, Business
    Intelligence

11
Sentinel World Products
  • Sentinel Worlds expertise lies in its ability to
    identify current security needs and find the best
    cutting edge solutions, in the form of products
    and services, that best serve these needs.
  • Sentinel World continually seeks and analyzes the
    most progressive security technologies to
    determine their capabilities to protect the
    public and private sectors.
  • At present, Sentinel World is working with the
    following 5 products/services

12
I. BioDetection Program
13
Biowatch Program Rapid Detection
Corporate Analysis and Response
Criterion Strategies Quality Assurance
New York
London
Tokyo
Other high-risk offices
14
II. Bomb Detection Program
  • Objective To reduce the threat of explosive
    devices in terms of traditional, improvised
    explosive devices (IEDs), as well as potential
    weapons of mass destruction (WMD )
  • Step 1 Awareness at Government level as well as
    Corporate level
  • police at local, provincial and federal levels to
    have extensive dialog and communication about
    potential threats
  • a relationship with the corporate sector to train
    their personnel for signs and possible indicators
    is critical to protecting the commercial
    infrastructure.
  • Step 2 Risk Matrix
  • A comprehensive risk assessment of government
    targets needs to rank the priority of certain
    locations. The process is based on placing values
    on various variables.
  • Consider
  • Asset Value Threat, Hazard, Vulnerability and
    Risk Assessment
  • Site Layout
  • Explosive Blast Effects
  • Chemical, Biological and Nuclear Measures
  • Step 3 Technologies and Needs Assessment
  • Along with Step 2, various technologies will be
    suggested that will help the overall outcome
    including
  • X-ray detectors
  • Chemical sensors
  • Traditional explosive snifters
  • 3-D Scanning Computer Aided Design (CAD)
    Modeling

15
(No Transcript)
16
III. Sentinel World Brings Widest Range of
Detection Technologies
X-ray security screening
Trace detection
Infra-red chemical analysis
Bio agentdetection
Smart video
Millimetre wave
Product Inspection (X-ray)
17
IV. Sentinel World-Blast Mitigation
18
Sentinel World-Blast Mitigation
19
Sentinel World-Blast Mitigation
20
Sentinel World-Ballistic Protection
21
Sentinel World-Ballistic Protection
22
Sentinel World-Protective Vests
23
V. Information Technology Security Capabilities-
Overview
  • Security Assessments covers four areas of an
    organization
  • Operational Security
  • Network Security
  • System Security
  • Physical Security
  • The Assessment process is carried out in the
    following steps.
  • Data Collection
  • Assessment against best practices
  • Recommendations
  • Services in IT Domain
  • Forensics
  • Data Centers


24
Information Technology - Professional Services
  • Security Risk Assessments
  • Security Architecture
  • Network Penetration
  • Application Penetration
  • Security Vulnerability
  • Network Security Infrastructure
  • Planning, Design,
  • Implementation,
  • Management
  • Firewall
  • IDS / IPS
  • VPN
  • Routing / Switching
  • AAA
  • Antivirus
  • Wireless Security
  • Risk / Vulnerability Management
  • Quarterly Scans
  • Configuration Audit
  • Validation
  • Firewall / IDS / VPN
  • Compliance Readiness
  • Sarbanes-Oxley
  • HIPAA
  • GLBA
  • Event Logging, Monitor
  • Reporting (LMR)
  • Security Operations
  • Security Monitoring
  • Incident Response

Plan
Build Operate/Evaluate
25
Professional Services Features and Benefits
  • 24x7 Monitoring, Management Incident Response
  • Tiered service offerings to augment internal IT
    resources
  • Enhance Security Posture Lower Cost of Managing
    Security Infrastructure
  • Real-Time Status of Security Devices
  • Aggregate, Normalize, Correlate Security Event
    Data
  • Rapid Detection Notification of Incidents
  • Weekly Security Report Summaries
  • Top 10 Threats, Security Violations, more
  • In-depth Security Recommendations
  • Change Management
  • OS upgrades, patches, signature updates
    configuration changes
  • Native Device Support for all leading Cisco
    technologies
  • CSA (HIPS), Network IDS (NIDS), PIX, IOS
    Firewall, AAA, VPN

26
Typical Areas of Interest
Host based IPS
Enforce Internet Use Policy Content Filtering
Identify Anomalous Behavior
Host Protection
Perimeter Protection for branches against worms,
viruses, etc. via IOS Firewall
Core Servers
Perimeter Security at Headquarters
Availability Performance Monitoring
AV
AV HIPS
NMS
Router
Firewall
Web Servers Email Servers DNS Servers
MegaPath Internet
AV
Router
Core Switches
  • Permit / Deny Access
  • Incident Detection / Response
  • Outbreak Control
  • Security Policy Compliance
  • Configuration Management

Network based IPS
AV to Identify Prevent Outbreaks
Identify and Contain Outbreaks
Content Filtering Server
Host based IPS
Host Protection
27
Typical Security Monitoring Solutions
CSA desktop agents on all laptops
24x7 monitoring of firewall, IDS, CSAs on hosts
CSA Intrusion Prevention on critical hosts
DMZ
CSA on Internet-facing hosts in DMZ
CSA desktop agents
28
Assessment Methodology
  • Phase I Reconnaissance
  • Public Domain Information, Search Engines,
    Company Sites, Bulletin Boards
  • Phase II System Scan
  • Broad scans to identify potential areas of
    exposure and services that may act as entry
    points
  • Targeted scans and manual investigation
  • Identify and validate Vulnerabilities
  • Phase III Penetration
  • Exploit known vulnerabilities and configuration
    flaws
  • Enumeration Banner grabbing etc
  • Vulnerability Scanning and Validation
  • User Experience Manipulation
  • Phase IV Assessment Recommendation
  • Best Practice Matrix
  • Threat Matrix

29
Deliverables
  • Comprehensive Assessment Report
  • Assessment Findings
  • Summary
  • Detailed Report with vulnerability details,
    impact/risk, possible resolution
  • Corrective Action Plan - CAPS
  • Recommendations
  • Prioritize based on level of risk to organization

30

Sample Vulnerability Assessment Report
Hosts scanned Hostname IP Address
31
Services in Information Technology Domain
Technology Implementations and
InfrastructureFull lifecycle systems
implementations. Architecting data center,
network, hardware, software, operating system,
security, performance, data management,
infrastructure continuity   Digital Forensics
and RecoveryDigital Forensics is the discovery,
analysis, and reconstruction of evidence
extracted from any element of computer systems,
computer networks, computer media, and computer
peripherals and is performed by experts to
factually present the truth or validity of the
evidence. Forensics focuses on real-time, on-line
evidence gathering, and traditional off-line
computer forensic technology. Capsicum has built
forensic labs, written operating methodologies,
trained personnel and deployed working
solutions. Security and Privacy Capsicum Groups
expert services range from military and
intelligence community level, real-time,
computing systems intrusion security monitoring
and investigation, through, computer evidence
recovery, analysis, and document production.
32
What We Do
Legal Compliance
Social Compliance
eDiscovery
Ethics
Training For Self-Sufficiency
RegulatoryManagement
eForensics
BusinessProcessManagement
Data Management
Cyber Investigations Security
Project Management
Recovery
Recycle
Technology Support
Risk Management
Infrastructure
People, Process and Technology Are Key To Project
Success
33
About Data Center Components
  • Computers
  • Computers in the DC may vary in characteristics,
    and a DC might include blade servers or standard
    rack-mounted servers with varying levels of
    compute capacity. For example, they might have
    different amounts of memory, different
    performance and capacity disks, different number,
    type, and speed of processors, and so on.
  • Network equipment
  • Network equipment that is loaded in the rack
    might consist of Internet Protocol (IP)-based
    load balancers, layer-2 network switches, and
    firewalls. Dedicated network connections to other
    datacenter
  • Storage
  • For DCs with storage area network (SAN)
    capability, the racks might be populated with one
    or more SAN storage arrays. For file-based
    storage, the DC would create file stores out of
    the base computer resources. Tape backup and
    offsite storage systems.
  • Other
  • Diagnostics and management software
  • Redundant hardware components (paths, control
    functions, cache, power supplies, cables,
    internal UPS)
  • Onsite small parts supply
  • Because of the diversity of application usages
    that customers will have for a DC, it is
    impossible to define a single, general-purpose
    configuration that fits all needs.

34
Typical Data Center Network Architecture
35
Business Continuance
36
Typical Data Center
37
Professional Certifications
  • CISSP (Certified Information Systems Security
    Professional)
  • CISA (Certified Information Systems Auditor)
  • CISM (Certified Information Systems Manager)
  • CCNP (Cisco Certified Network Professional)
  • CCDP (Cisco Certified Design Professional)
  • CCNA (Cisco Certified Network Associate)
  • CCSA (Check Point Certified Security
    Administrator)
  • CCIE (Cisco Certified Internetworking Engineer)
  • CCSE (Check Point Certified Security Expert)
  • MCDBA (Microsoft Certified Database
    Administrator)
  • MCP (Microsoft Certified Professional)
  • MCSE (Microsoft Certified System Engineer)

People
38
Portfolio-Security Projects
  • Academy Awards-Security Management
  • Superfunds Womens World Awards
  • Wynn Resorts-Security Training
  • ICC Cricket World Cup West Indies 2007-Security
    Training
  • Deutsche Bank/Goldman Sachs/Lehman
    Brothers/AIG-Security Programs and Biowatch
    Program
  • Dept of Homeland Security-National Exercise
    Program
  • US Fusion Centers Program-Development

39
Our Clients Partners
40
More clients..
Write a Comment
User Comments (0)
About PowerShow.com