12.04.2017 Views

Business IT - ΤΕΥΧΟΣ 37

Business IT solutions and services.

Business IT solutions and services.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Managed Security<br />

& Outsourcing Services<br />

Odyssey’s Managed Security & Outsourcing Services (MSOS)<br />

help organizations maintain their information security<br />

and network infrastructure in optimum operational state<br />

and ensure that no warning goes unnoticed. With new<br />

vulnerabilities, worms, trojans and viruses being discovered<br />

on a daily basis and exploits developed almost instantly, to<br />

remain effective, your information security infrastructure<br />

needs to be closely monitored and constantly updated.<br />

Through our state of the art MSOS Security Operations<br />

Center we manage and/ or monitor your information security<br />

state on a 24/7/365 basis, thus enabling you to focus on your<br />

core competencies.<br />

Network Infrastructure<br />

As organizations constantly seek ways of enhancing the<br />

efficiency and effectiveness of their network infrastructure,<br />

Odyssey’s secure and robust Network Infrastructure solution<br />

s e r v i c e s a r e c r a ft e d t o a s s i s t y o u i n e n h a n c i n g b o t h t h e<br />

performance, as well as the security of your organizational<br />

network irrespective of its geographic dispersion or complexity.<br />

In our continuous efforts to ensure the maximum return<br />

on investment that our clients get out of our Network<br />

Infrastructure solutions, we make the best efforts to remain<br />

at the forefront of developments and know-how in order to<br />

build steadfast network infrastructures that are state of the<br />

art, reliable, adaptable and scalable.<br />

Ithaca Labs<br />

The heart of our business; Ithaca Labs is Odyssey’s very<br />

own world class Information Security Research and Threat<br />

Intelligence Center. Combining know-how and expertise,<br />

our group of specialized information security engineers<br />

and researchers scout the global Information Security<br />

environment to deliver a rich Threat Intelligence resource<br />

pool that provides you with unique visibility into the existing<br />

and emerging threats and trends. At the same time it<br />

provides the pertinent information required to enable you to<br />

effectively respond to such threats in a timely manner and in<br />

extent maintain your information security infrastructure in<br />

an effective state.<br />

Odyssey’s range of solutions and services lay within a<br />

4-phase Information Security Continuum.<br />

The ultimate goal of our Information Security<br />

Continuum is to ensure that our customers maximize<br />

the effectiveness of their security investment, leaving<br />

no room for loose ends and weak links.<br />

Given that Information security management<br />

Information Security<br />

involves the development, deployment and ong<br />

o i n g m o ni to r i n g a n d re vi ew of a co mb i n a ti o n of<br />

Preventive, Detective and Response processes and<br />

controls this continuum approach is comprised of a<br />

cycle of iterative processes and activities where each<br />

Copyright ©2014 Odyssey Consultants LTD. All rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!