company profile company profile 25...company profile 2 throughout the last decade, distinguished...

28
Tomorrow’s Solutions, Today. Company Profile

Upload: others

Post on 28-Jan-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

Tomorrow’s So lut ions , Today.

Company Prof i le

Page 2: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

2

Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime IT products, to provide innovative solutions of technology know-how, to respond to the vast demand of Egyptian market, covering: • End-To-End IT infrastructure • Information Security Assessment Service • Cloud Computing & As A Service consultancy • Building Automation Systems

MCS was able to earn market appreciation and became a trusted consultant in 100+ mega IT projects, for diversified business sectors such as: • Hospitality and Real estate compounds • Aviation • Oil and petroleum industry • Central Government • Transportation • Financial sector

Established with Information Security focus, progressively broadening IT coverage since 2006, MCS has been providing turn-key

solutions to tackle Information Security, Computing, Data Storage, and Networking. Coupled with premier Value Added Services

including hands-on implementation, authorized training, and more.

Human development has always been the highest return investment, thus, we offer licensed training solutions in cooperation with the leading technology vendors, including Palo Alto networks, Juniper, and ForcePoint, in addition to other major technology providers. Working in conjunction with a multitude of prestigious technology corporations, we provide up-to-date learning solutions that can help IT professionals gain a deep understanding of a range of emerging technologies.

Corporate FactsHeadquarter: Cairo, EgyptFounded: 2006 Number of Employees: 50+ Average Annual Growth for the last three years: 35 % Website: www.mcsholding.comAwards: Best Value added distributor McAfee (2014 & 2015)

ABOUT

Page 3: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

3

Our Vision

To become the leading regional IT Solutions Provider

that aims to enhance Distribution business model

to add values with perceived quality thresholds for

channels and enterprises

Our Mission

As a leader in security business, we commit to deliver

a competitive portfolio of security solutions & reliable

services to enterprises and Channels.

Our team of professionals creates innovative business

solutions that aim to fulfill customer’s needs, builds

long term partnership with suppliers; while applying

ethical business practices and maximizing return on

investment rate.

Our Philosophy

Is to provide strategic IT vision, leadership, quality,

and enterprise solutions to our professionals to meet

their goals, deliver results, and enhance the company’s

position in Egypt and the Middle East markets.

Our Values

• Showing integrity and respect.

• Passion to satisfy our customers, partners, and our

technology providers.

• To be coherent and integrated.

• Constructive self-criticism, self-improvement, and

personal excellence.

• Accountability to customers, shareholders, partners,

employees, and the community for commitments,

results, and quality.

• Openness and transparency are key ingredients to

build accountability and trust

Page 4: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

4

Next Generation Firewalls (NGFW)

The next-generation firewall classifies all traffic, including

encrypted traffic, based on application, application function, user

and content.

The next-generation firewalls are architected to safely enable

applications and prevent modern threats.

Flexible deployment options and native integration with the

next-generation firewall platform extend the policy enforcement

and cyberthreat prevention to everywhere your users and data

are located: in your network, on-premise or cloud.

Security information and event management (SIEM)

Security information and event management (SIEM) technology

supports threat detection and security incident response through

the real-time collection and historical analysis of security events

from a wide variety of event and contextual data sources. It

also supports compliance reporting and incident investigation

through analysis of historical data from these sources. The core

capabilities of SIEM technology are a broad scope of event

collection and the ability to correlate and analyze events across

disparate sources.

Next Generation Intrusion Prevention System (NGIPS)

Next generation intrusion prevention systems (NGIPS) build upon

the traditional IPS deep packet inspection technologies that

have become commonplace in enterprise security deployments,

adding features such as application awareness, user control

and integration with external threat intelligence sources. NGIPS

technology continues to distinguish itself by focusing on high-

speed throughput, low latency, and detection through signature-

less methods, including sandboxing, contextual awareness, and

other forms of traffic analysis.

OURSOLUTIONSCYBERSECURITY

Page 5: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

5

Data Protection

Data Protection Solutions are designed to detect

potential data breaches / data ex-filtration

transmissions and prevent them by monitoring,

detecting and blocking sensitive data while in-

use (endpoint actions), in-motion (network traffic),

and at-rest (data storage). In data leakage incidents,

sensitive data is disclosed to unauthorized personnel

either by malicious intent. Such sensitive data can

come in the form of private or company information,

financial or patient information, credit-card data, and

other information depending on the business and

the industry.

BDS: Malware ProtectionModern malware is at the heart of many of today’s most sophisticated network attacks and is increasingly customized to avoid traditional security solutions. The integrated approach has been developed that addresses the full malware life cycle, which includes preventing infections, identifying zero-day malware (undiscovered malware), or targeted malware (malware targeting a specific industry or corporation), as well as pinpointing and disrupting active infections.The APT engine exposes zero-day and targeted malware through direct observation in a virtual environment within the system. The APT also makes extensive use of the App-ID technology by identifying file transfers within all applications, not just email attachments or browser-based file downloads.

Content SecurityMCS provides the leading email and web security solution to help reduce the threat of email and web-based malware. Our solutions are designed to monitor both inbound and outbound traffic and block emails or websites with malicious intent.

Breach Detection Systems (BDS)

Breach detection systems provide protection against zero day

attacks and designed to discover malware that is bypassing

traditional security technologies by examining various

indicators to determine whether files are malicious. BDS are

typically deployed at the network layer and provide deeper

insight into potentially malicious files and traffic than do

traditional application layer security products.

BDS: Advanced Endpoint Protection

Traditional antivirus (AV) is not the solution for endpoint

security – it’s the problem. AV can no longer stop today’s threats.

Advanced endpoint protection is the only solution offering

that replaces AV with “multi-method prevention”: a proprietary

combination of malware and exploit prevention methods that

pre-emptively block both known and unknown threats.

advanced endpoint protection, with its unique combination

of the most effective, purpose-built, malware and exploit

prevention methods, prevents known and unknown threats

before they compromise an endpoint.

Page 6: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

6

Data Center Networking solutions

Data center networking is the process of establishing and

interconnecting the entire physical and network-based devices

and equipment within a data center facility.

It enables a digital connection between data center

infrastructure nodes and equipment to ensure that they can

communicate and transfer data between each other and on an

external network or Internet.

Network Virtualization solutions

The goal of Network Virtualization as an overlay network is the

decoupling of the physical topology from the logical topology,

to allow connectivity between compute (virtual or physical)

and network services (virtual or physical) regardless of where

they may reside within the datacenter.

IP Storage and Big Data Networking solutions

The networking demands of big data analytics, flash-based and

scale out storage, and hyper-converged compute solutions

are driving a migration from legacy fiber channel to next

generation IP-based storage networks. These next generation

storage applications require an open, programmable, lossless

and highly available IP storage networking solution in order to

support their unique traffic patterns.

Cloud Enabled Enterprise

The attributes of Cloud Networking : Scalable, Low Latency,

Open APIs, Programmable Management, Self-Healing

Resiliency.

Software-defined networking (SDN)

Software-defined networking (SDN) is an umbrella term

encompassing several kinds of network technology aimed

at making the network as agile and flexible as the virtualized

server and storage infrastructure of the modern data center. The

goal of SDN is to allow network engineers and administrators to

respond quickly to changing business requirements.

Cloud Control

Contrail Cloud Platform releases are aligned with OpenStack

community releases to maintain API compatibility and strong

community support.

Automated resource provisioning for configuration and

operation of compute, storage, and networking resources

needed by cloud applications minimizes manual intervention

and improves operational.

NETWORKING& CLOUD CONTROL

Page 7: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

7

Hybrid Converged solutions

• Make use of already-invested server infrastructure to create

SDS (Software Defined Storage).

• Approximately 50% cheaper compared to SAN approach.

• Up to 9GB cash.

• Up to 100GB port speed.

• Ultra-high tolerance. Have storage controllers as many as

number of servers available.

• No vendor lock-in, use any server, any HDD.

• Its an architecture that tightly integrates compute,

storage, networking and virtualization resources and other

technologies from scratch in a commodity hardware box

supported by a single vendor.

Software Defined Storage (SDS)

The storage landscape is evolving from premium priced

proprietary hardware and software solutions to open industry

standard hardware and the benefits are significant: reduced

vendor lock-in, significantly open innovation with new

technologies like all NVMe solutions.

Maximum Efficiency - High capacity 1U-4U form factors.

Leading the industry with up 95% efficient Platinum level

power supplies.

Maximum Performance and expandability - All NVMe support

with hybrid expander and delivering up to 20 GB/s throughput

Mission Critical Reliability - Capable of fully redundant and

fault-tolerant operation with supplies, fans and redundant

serverboards with remote management.

Proven Compatibility - in addition to Lab validated hardware

configurations optimized for high duty cycles workloads.

High-performance computing (HPC) Solutions

Make use of parallel processing for running advanced

application programs efficiently, reliably and quickly. Systems

that function above a teraflop or 1012 floating-point operations

per second.

C O M P U T I N G

Page 8: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

8

Full Fledge Server portfolio

• Full Range of Rack-mount, Workstation & Tower Chassis and

blades- mini-1U, 1U, 2U, 3U & 4U

• Uncompromising Quality Control

• Widest Variety of Application Optimized Solutions, from High

End Clusters

• Optimized thermal design: better cooling performance, less

power consumption

• Best Performance per-Watt, per-Square-Foot, and per-Dollar

• Special attention to Micro-Blade generation

It represents an entirely new type of computing platform. It is

a powerful and flexible extreme-density 6U/3U all-in-one total

system that features 28/14 hot-swappable Micro-Blade Servers

supporting 28/14 Newest Dual-Node Xeon UP systems with

Intel E3-1200 v5 family configurations with up to 2 SSDs/1 HDD

per Node. The 6U/3U Micro-Blade enclosure can incorporate

up to 2 Chassis Management Modules, and up to 2 Switch

Modules for efficient, high-bandwidth communications. It

can incorporate up to 8 redundant (N+1 or N+N) 1600/2000W

high-efficiency (95%/96%) power supplies with cooling fans.

This innovative new generation architecture includes micro-

server, networking, storage, and unified remote management

for Cloud Computing, Video Streaming, Content Delivery, Social

Networking, Desktop Virtualization and Remote Workstation

applications.

Big Data

Hadoop Solutions have been created to focus on getting a

powerful and balanced cluster up and running-as quickly as

possible, enabling rapid and efficient innovation. Working

closely with customers, Hadoop distribution companies, and

data engineering companies

Virtual Desktop & Gaming

Get responsive, scalable and secure VDI infrastructure while

simplifying operations, and reducing the costs of computing.

Identify your vulnerabilities before they doMCS RedTeam is your trusted information security partner, helping you to stay prepared to advanced emerging threats, safeguard your most valuable assets, and improve your overall security posture. Today on the work side, a dynamic workplace environment, highly mobile workforce, and rapidly changing workers’ expectations have blurred the concept of a network perimeter. This puts organizations at high risk by increasing the surface of attacks which makes them subject to the more advanced targeted attacks. Accordingly, this needs more advanced intelligent way that accurately identifies security strengths, weaknesses and common configuration faults.MCS RedTeam believe in “One size doesn’t fit all”, so we have developed our own methodology that puts all your security defenses and infrastructure in a controlled cyber-attack, which puts your defenses in a truly up-to-date real life attack scenarios to determine the extent of vulnerabilities within your Infrastructure.Therefore, we work closely with your team to understand your business, study the current infrastructure, and know future plans.

Page 9: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

9

MCS RedTeam services portfolio balances between information security, future planning and compliance in order to support IT corner stone role in modern organization

THREATINTELLIGENCE

BUILDTHREAT MODEL

DEVELOPTESTING CASES

ASSESSMENTEXECUTION

CALCULATE RISKS

REPORTING

STUDYCUSTOMER

INFRASTRUCTURE

INFOSEC

AVAILABILITY

CONFIDENTIALITY INTEGRITY

PLANNING COMPLIANCE

Why MCS RedTeamMCS Holding has more than ten years of trusted experience and strong commitments in Information Security field. In MCS, we have the right calibers, with the typically needed technology, in the exact time. Our calibers have a sharpen knowledge in most of information security field which is used in very sophisticated assessments within critical environments. MCS believes that knowledge transfer is an integral part with technology delivery in our philosophy. Based on this, we deeply think that by educating market, we will get a better safe world.

RedTeam Information Security Services• Penetration Testing• Vulnerability Assessment• Network Security Configuration Audit• Network Architecture Review• Social Engineering• Network Security Assessment

RedTeam Planning Services• Network & Security Capacity Planning

RedTeam Compliance Services• Security Controls Evaluation

Learn More about USContact us on e-mail [email protected].

Page 10: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

10

SwitchingImprove the economics of networking

with carrier-class, high-density switches

for branch, campus, and data center.

RoutingA comprehensive, scalable, and secure

portfolio of routers for enterprise and

service provider networks.

SecurityAn advanced suite of applications that

provides service agility, reduces OpEx, and

optimizes the network infrastructure.

Juniper delivers a high-performance network that is

an enabler to the business, accelerating growth and

innovation, while creating operational efficiencies and

overall savings. today’s demanding environments, where

the number of users and devices types are exploding

and multi-media applications, such as video, are placing

unprecedented demands on the network, there can be no

compromises. With Juniper, customers are not forced to

make sacrifices.

Founded: 1996Headquarters: Sunnyvale, CaliforniaEmployees: 9,300+Offices: 88 locations in 43 countriesRevenue: USD $4.8 billion (2015)Website: www.juniper.net

TECHNOLOGY

Page 11: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

11

Palo Alto Networks is the global cybersecurity leader, known

for always challenging the security status quo. Our mission

is to protect our way of life in the digital age by preventing

successful cyberattacks. Our pioneering Security Operating

Platform safeguards your digital transformation with continuous

innovation that combines the latest breakthroughs in security,

automation, and analytics. By delivering you a true platform and

empowering a growing ecosystem of change-makers like us, we

provide you highly effective and innovative cybersecurity across

clouds, networks, and mobile devices.

Headquarters: Santa Clara, U.S.Website: www.Paloaltonetworks.comFounded in 2005; first customer shipment in 2007Experienced team of 4,500+ employeesQ4FY17: 1.8 Billion revenue, a 28% YoY increase growth that significantly outpaced the industry.+50,000 customers in 150+ countries Over 85 of the Fortune 100 and more than 63% of the Global 2000.Enterprise firewall market leader by Gartner for the sixth year in a row.

Preventing attacks at every stage of the attack lifecycle

Breach the perimeter1 Deliver the malware2 Lateral movement3 Exfiltrate data4

URL FilteringPrevent use of social engineeringBlock known malicious URLs and IP addresses

Next-Generation Firewall / GlobalProtect

Visibility into all traffic, including SSL Enable business-critical applications Block high-risk applicationsBlock commonly exploited file types

Threat PreventionBlock known exploits, malware and inbound command-and-control communications

WildFire

Send specific incoming files and email links from the internet to public or private cloud for inspection Detect unknown threatsAutomatically deliver protections globally

Next-Generation Firewall / GlobalProtect

Establish secure zones with strictly enforced access control

Provide ongoing monitoring and inspection of all traffic between zones

Threat Prevention

Block outbound command-and-control communications Block file and data pattern uploads DNS monitoring and sinkholing

Traps / WildFire

Block known and unknown vulnerability exploits Block known and unknown malwareProvide detailed forensics on attacks URL Filtering

Block outbound communication to known malicious URLs and IP addresses

WildFireDetecting unknown threats pervasively throughout the network

Page 12: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

12

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies

– cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks

and data while eliminating the inefficiencies involved in managing a collection of point security products.

Headquarters: Austin, TexasWebsite: www.forcepoint.com Founded: 1994Employees: 2,000Revenue: $361.5 millionGartner Market Leader (2015)

Modern business is all about safely connecting users to data

DATA

NETWORKS

Mobile

Office

OtherLocations

Partners &Supply Chain

Customers

Cloud Apps

Corp Servers

Websites

Email

EndpointMedia

IN THE CLOUD, ON THE ROAD, IN THE OFFICE

USERS

A unified, cloud-centric security platform for safe guarding users, data & networks

Page 13: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than five million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.

Headquarters: Santa Clara, U.S.Website: www.arista.comFounded: 2004 Revenue:837 million USD (2015)1200 + employees (70% of employees are engineers3500 + customers 7 of 8 of the largest cloud titans run on Arista Networks 8 of 10 of the largest Financial Services firms run on Arista Gartner Market Leader (2017)

Extensible Operating SystemArista Extensible Operating System (EOS) is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary software image across the Arista switching family. Architected for resiliency and programmability, EOS has a unique multi-process state sharing architecture that separates state information and packet forwarding from protocol processing and application logic.

• Interoperability / no vendor lock-ins.• Fewer tiers is better than more tiers.• Modern infrastructure should be run active/active.

• Scale-out designs enable infrastructure to start small and evolve over time.• Designs should be agile and allow for exibility in port speeds. • Large buffers are important. Consistent features and OS.

100 to 2,000 100 to 10,000 100 to 100,000+ 100 to 100,000+

Layer 2 / MLAG Layer 3 / ECMP Spline™

Servers Servers Middle of Row Servers Servers Servers

13

Page 14: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

14

As a global leader in security, Trend Micro develops innovative

security solutions that make the world safe for businesses and

consumers to exchange digital information. With 25+ years of

security expertise, Trend Micro was recognized as the market

leader in server security , cloud security , and small business

content security . Trend Micro solutions protect end users , secure

today’s evolving data center, and protect against sophisticated

targeted attacks. We deliver top-ranked client, server and cloud-

based protection that fits our customers’ and partners’ needs,

stops new threats faster, and protects data in physical, virtual

and cloud environments. No matter what the security need, or

how it may evolve over time, Trend Micro is the smart security

choice.

Headquarters: Shibuya, Tokyo, JapanWebsite: www.trendmicro.com Founded: 1988Employees: 5,258 Revenue: US $1.0 billion

CENTRALIZED VISIBILITY & CONTROL

Unified Dashboard

User-Based Visibility

Forensics & Analytics

Policy Management

3rd Party SIEM, Provisioning, &

Operational Management

USERS SERVERS NETWORKS

SECURITY CAPABILITIES

Anti-Malware & Content Filtering

Application Control

Encryption & DLP

Integrity Monitoring

Behavior Monitoring & Sandboxing

Response & Containment

Intrusion Prevention

SHARED THREAT INTELLIGENCE

Local Threat Intelligence

Threat Activity Recording

3rd Party Threat Information

Extensible Operating System

Page 15: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

15

Tenable Network Security transforms security technology

for the business needs of tomorrow through comprehensive

solutions that provide continuous visibility and critical context,

enabling decisive actions to protect your organization. Tenable

eliminates blind spots, prioritizes threats, and reduces exposure

and loss. With more than one million users and more than 20,000

enterprise customers worldwide, organizations trust Tenable

for proven security innovation. Tenable’s customers range

from Fortune Global 500 companies, to the U.S. Department

of Defense, to mid-sized and small businesses in all sectors,

including finance, government, healthcare, higher education,

retail and energy. Transform security with Tenable, the creators

of Nessus and leaders in continuous monitoring.

Headquarters: Columbia, MD, USAWebsite: www.tenable.comFounded: 2002Employees: 650+MARKET REACH: 20k+ customers, 1M+ users worldwide

• Physical & Virtual Devices• Applications & Databases• Mobile Devices• Cloud Services

• Vulnerability Assessment• Configuration Audit• Malware Detection

• Log Collection• Activity Monitoring• Packet Inspection• Threat Intelligence

• Event Correlation• Anomaly Detection• Behaviour Analysis• Attack Path Analysis

• Dashboards and Reports• Notification and Alerting• Remediation Workflow• Patch Management

• Patch Validation• Configuration Changes• Attack Surface Reduction

Page 16: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

16

Nexthink is the innovator of Endpoint and User IT

Analytics for security, ITSM and transformation. Our

software uniquely provides enterprise-wide, real-time:

analytics covering all endpoints, users, applications

and network connections; and visualization of IT

infrastructure and service delivery. Nexthink helps IT

departments connect, communicate and collaborate

to achieve their major goals and to optimise

endpoint security, operations, support and workplace

transformation projects. Nexthink’s real-time analytics

and visualization extend help desk, server monitoring,

APM (application performance management) and

PCLM (PC lifecycle management) tools and provide

essential visibility for IT governance. Nexthink serves

the Global 5000 utilizing a leveraged partner model.

Nexthink is a private company headquartered in

Lausanne, Switzerland.

Headquarters: SwitzerlandWebsite: www.nexthink.comFounded: 2004Employees: 251 - 500Leadership: Pedro bados

Page 17: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

17

Headquarters: Santa Clara, California United StatesWeb Site www.mcafee.comFounded 1987 432 million Total Endpoints103,000+ Corporate Customers7,330 Employee

McAfee is one of the world’s leading independent

cybersecurity companies. Inspired by the power of

working together, McAfee creates business and consumer

solutions that make the world a safer place for the

benefit of all. Our holistic, automated open security

platform allows all your disparate products to co-exist,

communicate, and share threat intelligence with each

other anywhere in the digital landscape. Where machine

automation is converged with human intelligence so

you can streamline workflows more efficiently. Where all

your security products adapt to new threats skillfully and

work synergistically to increase protection, and speed

up detection and correction—across the entire threat

defense lifecycle.

Security Connected Platform

CONTENT SECURITY

• Web Gateway• Data Loss Prevention

SECURITY RISK MANAGEMENT

• Enterprise Security Manager (SIEM)

• E-Policy Orchestrator• Threat Intelligence Exchange• McAfee Active Response

NETWORK SECURITY

• Advanced Malware Defense• Network Security Platform (IPS)

ENDPOINT SECURITY

• Endpoint Security Suites• Data Center Security Suites• Device Control• Endpoint Encryption

Threat Intelligence

Security Management

Analytics

Security RiskManagement

Context andOrchestration

Threat Defense Platform

Page 18: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

18

Products

Give the next generation of workers a productivity boost by blending their business and personal worlds with just the right amount of company control.

A contemporary Network Access Control (NAC) solution built for the next generation of networks.

The best mobile VPN to enable secure access from any device to enterprise apps and services in the data center or cloud.

Headquarters: California, USAWebsite: www.pulsesecure.netFounded: 2014Employees: 201 - 500

Pulse Secure, LLC is a leading provider of secure access

and mobile security solutions to both enterprises and

service providers. Enterprises from every vertical and of all

sizes utilize the company’s virtual private network (VPN),

network access control (NAC) and mobile security products

to enable worker mobility securely and seamlessly in their

organizations. Pulse Secure’s mission is to deliver secure

access solutions for people, devices, things, and services.

Page 19: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

19

Supermicro is a global leader in high performance, high efficiency server technology and innovation. they develop and provide end-to-end green computing solutions to the data center, cloud computing, enterprise IT, big data, high performance computing, or HPC, and embedded markets. The solutions offered by Supermicro range from complete server, storage, blade and workstations to full racks, networking devices, server management software and technology support and services.

Total Solution Lifecycle

Design: Total hardware, software and services solution

Integrate: Simplify and accelerate the design cycle, purchase and deployment (acquisition costs) with proven integrations, configurations and performance characterization

Maintain: Provide the management technology and services required to optimize the ongoing operational costs of the solution.

Headquarters: San Jose, California, United StatesWebsite: www.supermicro.comFounded: 1993Employees: 2,247Revenue: USD 1.99 billion (FY2015)

Converged Infrastructure Solutions

Virtualization:Grow your virtualized environment into a hyper-converged infrastructure with VMware vSphere & Virtual SAN to deliver a smart, cost efficient, resilient all-in-one solution.

Cloud:Accelerate your OpenStack deployment by choosing one of our pre-validated SuperMicro OpenStack solutions.

Software Defined Storage: The storage landscape is evolving from premium priced proprietary hardware and software solutions to software defined storage based on open industry standard hardware and the benefits are significant.

Converged Application Solutions

Big Data:Supermicro’s Solutions have been created to focus on getting a powerful and balanced cluster up and running-as quickly as possible, enabling rapid and efficient innovation.

Virtual Desktop & Gaming:Supermicro has developed a line of fully configured SuperServer® solutions to address the rapidly growing Virtual Desktop Infrastructure and featuring NVIDIA Tesla GRID K1 and K2 GPUs supporting hardware virtualization.

Page 20: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

20

For more than three decades, Ivanti has built their reputation on helping IT professionals fix their security issues and optimize user experience. Ivanti sought-after systems are some of the best in the industry. From patch and asset management to IT service delivery and security, Ivanti software is everything you need to take your IT operations to the next level. They also ensure that supply chains and warehouse teams have the most up-to-date technology in order to perform their essential functions.

Headquarters: New Brighton, Minnesota, United StatesWebsite: www.Ivanti.comFounded: 1993Employees: 51 - 200

The Patch Management Process

Page 21: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

21

Niagara Networks is a Network Visibility industry leader, with

emphasis in 1/10/40/100 Gigabit systems including Network

TAPs, Bypass Switches, and Network Packet Brokers that integrate

with monitoring systems, inline networking appliances, IPS, UTM,

Load Balancing, WAN acceleration, and other mission-critical

IT and security appliances. Formerly part of Interface Masters,

a leading Silicon Valley network solutions company, Niagara

Networks recently spun off from Interface Masters to focus on

its core competencies, and developed an independent company

identity.

Niagara Networks offers the highest port-density systems, the

most complete Network Visibility Systems, and the highest quality

and feature-rich Bypass Solutions in the market. Niagara’s unique

and modular designs, innovative Next-Generation Network

Visibility technology, including the 100 Gigabit-capable Network

Packet Broker, and the ability to tailor systems to exact customer

specifications, allow it to lead the industry with high quality,

innovative products and exceptional service.

Headquarter: United StatesFounded: 2016Website: www. niagaranetworks.comEmployees: 50 - 200

Network Bypass Technology Network TAP TechnologyNiagara Networks’

Network Operating Software

Niagara’s Bypass technology relies on Heartbeat frames to detect tool failures. Heartbeat frames are generated on the appliance ports and the tools are expected to bridge these frames. When heartbeat frames don’t appear where they’re expected, the Bypass function is activated and traffic is shunted around the failed appliance. Once the tool is restored to normal operation and heartbeats begin to flow again, the Bypass function is terminated and traffic is again directed through the tool.

Network TAPs are a critical element of any Network Visibility infrastructure. Just like a telephone wiretap, Network TAPs provide a means to observe network traffic for security, network performance monitoring, and diagnostic purposes.There are many flavors of Network TAPs, just as there are many types of network media. TAPs must be specifically designed to match the media, speed and mode of the network links into which they will be deployed. Niagara’s Network Packet Brokers support all types of media, including Copper Ethernet (100-baseT & 1000-baseT), as well as 10, 40, and 100Gb fiber-optic cable.

Niagara Networks’ Network Operating Software provides the intelligence required for improving performance, monitoring and security of networks. As the enabler of multiple applications, the NOSE can groom, trim, optimize and manipulate any packet that is sent from the production network to Niagara Networks’ distributed architecture.

Page 22: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

22

Every day at FireEye, we see firsthand the impact of

cyber attacks on real people—not just the financial cost

to governments, corporations and individuals, but the

human cost in time, peace of mind, and a sense of control

over one’s environment. This is what inspires us to fulfill

our mission to relentlessly protect our customers from

the impact and consequences of these attacks.

FireEye is the only cyber security company that does this

by combining the automation of world-class technology

with the power of unparalleled frontline human

expertise, including industry-recognized services and

nation-state grade threat intelligence. We put it all at

your fingertips in a unified security operations platform

called Helix that integrates and analyzes data from your

security assets in order to give you real answers about

the threats that matter. Best of all, with FireEye’s Expertise

On Demand, our experts can function as an extension

of your security team— on a click, by phone, or in your

corner when you need them most.

Headquarters: 601 McCarthy Blvd. Milpitas, CAWebsite: www.fireeye.comFounded: 2004Employees: 3,500+

InnovativeTechnology

FrontlineHumanExpertise

Page 23: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

23

The FireEye ECOSYSTEM

Managed Defense

FireEye Helix Security Operations Platform

FireEye andThird-Party Apps

FireEyeMarket

FireEye Expertise

Threat IntelligenceMandiant Services

ExpertiseOn Demand

FireEyeEmail

Security

FireEyeNetwork Security

and Forensics

FireEyeEndpointSecurity

Third-Party

Solutions

Alerts / CaseManagement

ComplianceReporting

ContextualIntelligence

Next GenerationSIEM

Orchestration& Automation

FireEye HelixA security operations platform that allows organizations to take control of any incident from alert to fix. FireEye Helix integrates disparate security tools and augments them with SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security in

FireEye Network Security and ForensicsAn advanced threat protection and breach detection solution with visibility into the world’s most sophisticated attacks that protects networks, assets and users with confidence from known and unknown threats.

FireEye Endpoint SecurityA comprehensive endpoint solution that protects users with multiple combined engines to block malware and exploits, detecting advanced attacks and providing response tools and techniques developed by the world’s leading frontline responders.

FireEye Email SecurityAn email protection solution that stops email-borne threats with first-hand knowledge of attacks and attackers before they can cause any harm. The solution blocks not only malware and suspicious URLs, but also phishing and impersonation techniques

FireEye Expertise On Demand A prepaid, annual subscription that provides flexible, pay-per-use access to FireEye’s industry-recognized security expertise, ensuring you and have the capabilities you need, when you need them most.

FireEye Threat Intelligence A portfolio of Intelligence services that goes far beyond increasing a security product’s blocking capabilities by adding the forward-looking, highly contextual information organizations need to build proactive defenses, prioritize alerts, allocate resources and improve incident response.

FireEye Managed Defense A managed detection and response (MDR) service that combines industry-recognized cyber security expertise, FireEye technology and unparalleled knowledge of attackers to identify threats early in the attacker lifecycle to minimize the potential impact of a breach.

FireEye Mandiant A world-renowned incident response and assessment, enhancement and transformation consulting services to protect vital organizational assets. Mandiant reduces business risk with a deep understanding of attacker behavior, unmatched threat intelligence, and purpose-built technology.

Page 24: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

24

Certification MCS has cemented partnerships with world`s leading network and security product vendors and technology suppliers. We offer the widest range of courses, certifications and product training programs across Egypt as well as the Middle East region. Our award winning combination of instructors and state-of-the-art Lab facility at Cairo/Egypt has established as one of the most sought after technical training centers in the country.

Palo Alto Networks Palo Alto Networks partners with MCS for Training and Education. Authorized Palo Alto Networks training from MCS provides the next-generation firewall knowledge you need to secure your network and safely enable applications. In our courses that feature lecture and hands-on labs, you will learn to install, configure, manage and troubleshoot Palo Alto Networks firewalls, gaining the skills and expertise needed to protect your organization from the most advanced cybersecurity attacks. Our convenient delivery formats, including in classrooms, live online in virtual classrooms, and in private groups at your location.

International Certification Security Academy As the era of NG security is known for their vast threat and dynamic attacks vectors. The Middle East market became in need for calibers with exceptional knowhow to be able to perfectly utilize NG security capabilities in securing organizations against modern advanced threats.

Driven by this need, MCS has announced “ICSA” as a pioneer in InfoSec knowledge sharing.At ICSA, MCS introduces tailored InfoSec courses to improve caliber skills and increase their awareness of new threats and technologies. Those customized courses cover wide scope of skills, starting from essential skills to specialized technical ones, such as Risk and Compliance, APT Protection, Securing Virtual Environments, Datacenter and Perimeter Protection.

Juniper We offer a wide range of training and certification courses to deliver Juniper training for routers, JUNOS, policy, VPNs, MPLS, ScreenOS, SSL, IDP, firewalls, and more. Our consultants and instructors are the best at what they do, which is why we have worked with so many large and small businesses and organizations in the Egypt to deliver their training and consulting needs.

ForcepointForcepoint has two comprehensive training programs: one for clients who use Forcepoint products, and another for their global partners who resell Forcepoint products. Our programs help maximize the investment or expertise in Forcepoint solutions in order to deliver Forcepoint services most efficiently, Validate your mastery and proficiency in Forcepoint technologies Promote enthusiastic adoption of the products by your users (as a customer) and Stand out from your competition and increase your sales (as a partner).

EDUCATION

Page 25: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

25

MCS Support Portal https://support.mcsholding.com

In 2013, MCS has launched its first non-vendor online support

portal to enable its customers to add their technical issues

online. MCS Support Center is a private portal hosted in our

datacenter that requires an invitation to access it. There are

currently 2 levels of users; master user and regular user. The

master user can view and interact with all cases opened by his

organization while the regular user can only see and interact

with his own cases. Products listed in the Support Center are

ones purchased through MCS and has valid vendor support.

Email Support [email protected]

MCS provides email support on nights, weekends and holidays

when our office is closed. Our customers can directly send their

issues and hence, our team will immediately take their actions

to solve it.

Customer Premises SupportThe time gap between problem incidence and finding a

support specialist to solve that issue has been declined due to

the increase use of technology. When the customer request on-

site support, MCS technical team is ready to move immediately

to repair the issue.

Call SupportWhen customers use call support, an agent of MCS technical

team will work on their issues immediately.

Inside Egypt: 0800-SUPPORT

INITIATIVESMCS support was built with RASE(Reliable , Available , Secure and Efficient) model in Mind

Support and Automation

Page 26: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

26

OverviewIn 2006, Solace Penetrated the Egyptian Market adding great value to home automation business in MENA region. Our competitive

edge can be summarized in one word which is “Integration” where you can control all your home aspects at a single touch of a

button. Since Solace home control launched, Our Research and Development Team has been working enthusiastically to deliver the

latest features and technologies to the market, aiming to transfer your dream home into reality.

At the beginning of 2015, Solace announced the delivery of its technology to the business sector by creating integrated Smart

Conference Rooms. As SOLACE has a vision for making meetings better, and a passion for delivering the solutions that make it

happen. SOLACE believes that meeting room technology needs to work out much more than its basic task of delivering content to

displays or projector screens. Our main concept is to let SOLACE take control of the technology, so you can focus on your meeting.

Partners

www.solaceautomation.com

Page 27: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

27

Residential AutomationSolace Home Control gives you control over every aspect of

your home, linking them all together for your convenience

through your TV, Computer, Touch Panels or even your cell

phone.

Solace wants you and your family to experience the freedom

and peace of mind you deserve to enjoy:

The luxury to adjust the light settings and room temperature in

each room to your desired taste.

The comfort of knowing that your home has the highest

security whether you are at home or away.

The freedom to watch whatever you want, whenever you want,

and wherever you want.

Commercial AutomationSimplify and streamline the technology in your boardrooms,

conference rooms or throughout the facility.

Integrated solutions from SOLACE® simplify installation and

practical usage, as well as maintenance and scalability.

SOLACE® has evolved far beyond the touch panel and control

system, becoming the definitive source for centrally and

globally controlling, managing and presenting information.

Page 28: Company Profile COMPANY PROFILE 25...Company Profile 2 Throughout the last decade, distinguished teams has been built, and MCS has successfully acquired distribution rights for prime

28

Tomorrow’s Solutions, Today.www.mcsholding.com

Mideast Communication Systems26A Ibn Malka St, off Mostafa Kamel Axis - behind Mobil Gas StationFirst Settlement , New Cairo

Mideast Communication Systems-MCS

MCSholding