Вы находитесь на странице: 1из 6

ovit

Innovating Security

Ovit is strictly a security oriented company. Our mandate is to protect customers by oering a holistic
security view. Ovit is unique in that it operates both in the physical and cyber security domain.
By unifying those seemingly dierent worlds, we oer a completely new product in terms of perspective.
Furthermore we expand the existing know how by oering more sophisticated services, knowledge and expertise.
Our mandate can provide signicant value to this unique Industry that nowadays is segmented and often
operates under low standards.
Once a company decides to cooperate with Ovit, a series of procedures will be implemented to its facilities
and infastractures, with scope to minimize the risk exposure and enhance the quality of life, with minimum business
disruption. Ovits accredited sta, will examine what would constitute a model secure facility or IT infastructure for
you and apply the appropriate measures and tactics in order to realize it. The model will identify your core functions,
your critical assets, the threats and vulnerabilities that may be exploited, and it will state the appropriate measures
to mitigate them.
We follow specic and ISO 27001 certied, risk assessment guidelines & management methodologies for
protecting buildings and infrastructures. The responsible personnel who will execute these procedures consists of
experienced, former military ocers that have executed similar projects for numerous military and commercial
facilities; the Hellenic National Defense General Stu and the European Space Agency, being among them.

physical Security Services

cyber Security Services

Guarding Services

Risk Assessments

Security Consulting

Cyber Security
Technology Solutions

Ethical Hacking
Corporate Security Training
Information Security Management
Systems (ISO 27001,Common Criteria)
Physical Security Risk Assessment
Security Awareness Training
Intrusion Scenarios
& Security Evaluation

Threat and vulnerability


Management

06
04

Physical Security
Technologies Implementation

Close Protection Services

Managed Security Services

Continuity and Resilience

ovit

PHYSICAL Security Services

2
We oer a broad range of services that enable organizations in reaching their business objectives, throught a unique security approach.

threat analysis - risk assessment


At MilShield, we prove our expertise. Before undertaking any project, we execute procedures such as:

Vulnerability Assessment
Facility Characterization
Security System Eectiveness Assessments

Threat Analysis
Threat Impact & Consequence Analysis
Risk Estimations & Risk Reduction Strategies

security planning - security policy creation


After we shall draft and provide a series of plans & procedures, tailored to facilitys risk exposure & clients specic needs,
according to risk assessments & threat analysis ndings.

Security Master Plan Drafting


Job Descriptions
Emergency Responce Plans-Procedures

security policy enforcement / implementation - evaluation


With the completion of planning the stage of implementation starts. Our core procedures, in order to improve security
personnel competitiveness and wellbeing include:

OPQ tests from licensed SHL assessors


Rotational assignments
Perks
Job Description & Continuous training

Background personnel checks


Performance Appraisals
Teambuilding activities
Physical condition tests

monitor & security management - intrusion & detection


After planning and implementation a series of technologies are implemented in order to monitor and improve the
level of security with Next Gen Patrol Management & Live Reporting System, ISO 9001 & ISO 27001 certied. We
implement cutting edge technology in order to monitor, control and, if necessary, remediate security on-the-job. Our
solutions provide the ability to interact with the security personnel even from a smartphone, through a 24/7 web
based, interactive channel. They include:

Live-time, Video & Audio le transferring


Patrol, timetable and route, conguration via checkpoints mounting on designated spots, or geolocation.
Alerts, if a patrol checkpoint is checked out of the designated timetable, or if the checkpoint is missed.
GPS triangulation and patrol route mapping, displayed live on Google Maps. Signal accuracy can be
reduced to less than 7-9 meters, if WiFi connection exists.
Panic Button.
Live Reporting, instantly available for viewing, upon completion & uploading.
Easy access to reports history, even for a year back.
Live employee shift monitoring, for current and upcoming shifts.

IT
OV
With the mandate that protecting assets is not not only another human resource management service but the cornerstone for
the proper functioning of any organization, OVIT species security through a set of procedures & functions
that corresponds to the basic need for security.
Cert No 11433

ovit

Cyber Security Services


2

Security Risk Assessments


OVIT Security Risk assessment services focus on assessing and quantifying the exposure to events that compromise the assets, operations and
objectives of your company. Security Risk Assessment is a process for dening and analyzing the dangers posed by potential natural and human-caused
adverse events. A successful Security Risk Assessment approach can prevent breaches, reduce the impact of realized breaches and eectively gauge and
communicate monetary impact to related risks. OVIT consultants can help your organization identify risks maximizing support of business functions, minimizing operational disruptions in the most cost-eective manner.
ovit approach :

Cyber security technology solutions


OVIT technology solutions portfolio oers a holistic approach on cyber security:
Our solutions include:

Endpoint Protection
Network Security
Mobile Security and Management
Security Information and Event Management

Compliance Enforcement and Monitoring


Network Compliance and Risk Control
Data Classication

ethical hacking
The primary objective of the oered services is to identify the risk level of your organization so that an appropriate
set of responses to those threats can be developed. OVIT approach provides the following advantages:
OVIT approach provides the following advantages:

Gain a better understanding of potential security vulnerabilities that may be visible from the Internet and other Extranets.
Evaluate existing security controls.
Detect potential threats and exploitable vulnerabilities.
Evaluate the security associated with web applications and/or Infrastructure Systems.
Prevent nancial loss through fraud (hackers, extortionists and disgruntled employees).
Protecting the corporate image by avoiding loss of consumer condence and business reputation.

Information Security Management Systems (ISO 27001, Common Criteria)


An Information Security Management System is both a comprehensive plan and operational services, based on a risk management
process, to protect critical applications and IT Infrastructure, ensure systems availability and data integrity, comply with external
regulations and protect individual privacy.
A successful information security management system supports business and aligns with the agencys mission, goals and
objectives. OVIT consultants can help your organization create, establish and maintain a solid ISMS maximizing support of business
functions, minimizing operational disruptions and implementing corporate strategy in the most cost-eective manner.

ovit

Cyber Security Services


2

Security Awareness Training


Security Awareness Training Services are designed to educate employees on the security policy of your organization and help foster
an understanding of how the policy protects the business, the employee and the customers. OVIT consultants can help your organization
design, create and implement a security training program tied to existing security directives and policies.
OVIT approach to Security Awareness Training includes the following processes :

Plan, assess and design. Awareness programmes must be designed with the organization mission in mind. It is important that
they support the business needs of the organization and be relevant to the organizations culture and IT architecture.
Execute and manage. This process includes any activity necessary to implement an information security awareness programme.
Evaluate and adjust. Formal evaluation and feedback mechanisms are critical components of the security awareness programme.
Once the baseline requirements have been solidied, a feedback strategy will be designed and implemented.

Threat and vulnerability Management


Keeping the infrastructure security posture up-to-date, scanning the infrastructure for identication of new issues or vulnerabilities
that could potentially lead to a security compromise, taking corrective measures in case of a likely compromise, eectively managing
infrastructure that inherently is risk prone and delivering a fast response in case of compromise are essential characteristics of the
Threat & Vulnerability function.
OVIT Best Practices represent contemporary understanding in this eld that includes evolving practices around Threat &
Vulnerability management, emerging technical solutions and layered approaches towardsThreat & Vulnerability managementthat
entails strategic, tactical and operational perspective.

Managed Security Services


OVIT M.S.Services puts select resource-intensive security operations under management of experienced OVIT specialists,
enhancing their existing security program, infrastructure and personnel while relieving the information security and compliance burden
Services oerings include:
Security Monitoring Servicesreal-time security monitoring and network analysis
Security Device Managementchanges to security device congurations, recommended by remote professionals, as new threats
emerge
OVIT Vulnerability Assessment Servicesremote vulnerability management and scanning to identify network vulnerabilities,
prioritize remediation eorts and maintain worldwide regulatory compliance
OVIT Managed Security Services oers a higher level of protection for mission critical information assets. Your organization improves
continuity, scalability and eciency of its security operations by leveraging world-class analytics and expertise.

Continuity and Resilience


OVIT Continuity and Resilience services focus on ensuring that critical business functions will remain operational after a security
incident through a robust Business Continuity Management System. A successful Business Continuity approach includes three key
elements :
Resilience: critical business functions and the supporting infrastructure are designed and engineered in such a way that they
are materially unaected by most disruptions.
Recovery: arrangements are made to recover or restore critical and less critical business functions.
Contingency: the organization establishes a generalized capability and readiness to cope eectively with whatever major incidents
and disasters occur, including those that were not, and perhaps could not, have been foreseen.
OVIT consultants can help your organization build an eective Business Continuity Management System aiming at maximum support
of business functions and minimizing operational disruptions in the most cost-eective manner.

Cert No 11433

ovit

Innovating Security

210 983 5124


211 800 8299
info@ovitsec.com
www.ovitsec.com

Cert No 11433

75 Ilia Iliou Av.


Neos Kosmos, 117 44
Athens, Greece

Вам также может понравиться