Title: Sentinel World Inc'
1Sentinel World Inc.
The Best in Security Information Technology
Integration
2Business
- Integrator of Security Subject Matter Expertise
and Information Technology
3Vision
- To service Global Security and secure Human and
other Corporate assets against Chemical,
Biological, Radiological, Nuclear and Explosive
(CBRNE) and Cyber terrorist threats.
4Mission
- To service Global Security, a critical element of
todays society, by providing easily accessible
and affordable technologies for business
continuity while securing market capitalization
over 1B in 3 years.
5Team Credentials
- Subject Matter Experts have extensive real-world
experience -
- the 9/11 terrorist attacks in New York City
- the 2001 New Jersey anthrax attacks
- the 2001 kidnapping/murder of WSJ reporter Daniel
Pearl investigation - the 1999 Egypt Air Flight 990 crash
investigation - the 1997 U.S. Embassy bombings in Africa
- the 1996 Khobar Towers U.S. Army military base
bombing - the 1996 TWA Flight 800 crash investigation
- the 1993 Unabomber crime scene in New Jersey
- the 1993 World Trade Center bombing
- the Kosovo War Crimes Investigation
- numerous classified investigations
- extensive training in terrorism, terrorism
profiling, forensics, explosive devices, bomb
technician certification, bombing crime
scene/post blast - crime scene management, crisis response
- and much more.
6Strategic Alliances
- IDAHO Technologies
- CHB Industries
- RMI International
- Software International Inc.
- DefensTech International Inc.
7Long Term Strategy
- Sentinel World plans to substantially expand its
operations world wide during the next 12-36
months, so as to undertake increased security
solutions and security development activities
both in the physical domain and in information
technology. - Sentinel World will focus on consulting services,
utilizing in-house specialization, professional
alliances, and the business outsourcing market at
a competitive price. Sentinel World is focused on
developing and marketing the best product at low
cost with access to - A large worldwide market
- Talented security manpower in Asia US
- Talented IT manpower in Asia US
- Marketing resources world wide
8Target Markets-Security
- Since the 9/11/ attacks, homeland security has
been one of the most rapidly growing business
segments. - The US federal government has spent more than
130 billion on homeland defense. An additional
50 billion is budgeted for FY 2006. - The private sector in the US has invested nearly
23 billion and another 23 billion world wide,
per year, to defend its interests. - Across the board, there is an increasing need to
integrate emergency management, business
continuity, and risk mitigation with technologies
to prepare against the growing threat of
terrorism. - A player that can seamlessly integrate homeland
security and information technology security will
have the potential to achieve significant sales
volumes world wide.
9 Vertical Client Focus
- Finance Banking
- Federal, State Quasi Government Organizations
- Telecom
- Automotive
- Insurance
- Entertainment
- Medical
- Law Enforcement/Military
10Products/Services
- Corporate Public Biological Pathogen Detection
Program-Biowatch Program, Bio Assessment Team - Bomb Detection Technology (X-ray, Chem Reagents,
Wands), - Blast Mitigation and Life Vest Technologies
- Security-Detection Monitoring Systems,
Communications Systems, Access Control Systems,
Biometric Identification Technology, Remote
Command Crisis Command Systems, Computer
Forensics, Laser Sonar Scanning/Imaging
Systems, Asset Protection Systems, Wireless
Communications - IT Security-Assessment, Vulnerability/Penetration
Testing, Policy Design, Security Architecture
Design, Implementation, Audits, Monitoring - Vehicle/Home/Business Security
- RFID
- Business Continuity
- Emergency Management, Crisis Mitigation, Risk
Mitigation, Business Continuity, Business
Intelligence
11Sentinel World Products
- Sentinel Worlds expertise lies in its ability to
identify current security needs and find the best
cutting edge solutions, in the form of products
and services, that best serve these needs. - Sentinel World continually seeks and analyzes the
most progressive security technologies to
determine their capabilities to protect the
public and private sectors. - At present, Sentinel World is working with the
following 5 products/services
12I. BioDetection Program
13Biowatch Program Rapid Detection
Corporate Analysis and Response
Criterion Strategies Quality Assurance
New York
London
Tokyo
Other high-risk offices
14II. Bomb Detection Program
- Objective To reduce the threat of explosive
devices in terms of traditional, improvised
explosive devices (IEDs), as well as potential
weapons of mass destruction (WMD ) - Step 1 Awareness at Government level as well as
Corporate level - police at local, provincial and federal levels to
have extensive dialog and communication about
potential threats - a relationship with the corporate sector to train
their personnel for signs and possible indicators
is critical to protecting the commercial
infrastructure. -
- Step 2 Risk Matrix
- A comprehensive risk assessment of government
targets needs to rank the priority of certain
locations. The process is based on placing values
on various variables. - Consider
- Asset Value Threat, Hazard, Vulnerability and
Risk Assessment - Site Layout
- Explosive Blast Effects
- Chemical, Biological and Nuclear Measures
- Step 3 Technologies and Needs Assessment
- Along with Step 2, various technologies will be
suggested that will help the overall outcome
including - X-ray detectors
- Chemical sensors
- Traditional explosive snifters
- 3-D Scanning Computer Aided Design (CAD)
Modeling
15(No Transcript)
16III. Sentinel World Brings Widest Range of
Detection Technologies
X-ray security screening
Trace detection
Infra-red chemical analysis
Bio agentdetection
Smart video
Millimetre wave
Product Inspection (X-ray)
17IV. Sentinel World-Blast Mitigation
18Sentinel World-Blast Mitigation
19Sentinel World-Blast Mitigation
20Sentinel World-Ballistic Protection
21Sentinel World-Ballistic Protection
22Sentinel World-Protective Vests
23V. Information Technology Security Capabilities-
Overview
- Security Assessments covers four areas of an
organization - Operational Security
- Network Security
- System Security
- Physical Security
- The Assessment process is carried out in the
following steps. - Data Collection
- Assessment against best practices
- Recommendations
- Services in IT Domain
- Forensics
- Data Centers
24Information Technology - Professional Services
- Security Risk Assessments
- Security Architecture
- Network Penetration
- Application Penetration
- Security Vulnerability
- Network Security Infrastructure
- Planning, Design,
- Implementation,
- Management
- Firewall
- IDS / IPS
- VPN
- Routing / Switching
- AAA
- Antivirus
- Wireless Security
- Risk / Vulnerability Management
- Quarterly Scans
- Configuration Audit
- Validation
- Firewall / IDS / VPN
- Compliance Readiness
- Sarbanes-Oxley
- HIPAA
- GLBA
- Event Logging, Monitor
- Reporting (LMR)
- Security Operations
- Security Monitoring
- Incident Response
Plan
Build Operate/Evaluate
25Professional Services Features and Benefits
- 24x7 Monitoring, Management Incident Response
- Tiered service offerings to augment internal IT
resources - Enhance Security Posture Lower Cost of Managing
Security Infrastructure - Real-Time Status of Security Devices
- Aggregate, Normalize, Correlate Security Event
Data - Rapid Detection Notification of Incidents
- Weekly Security Report Summaries
- Top 10 Threats, Security Violations, more
- In-depth Security Recommendations
- Change Management
- OS upgrades, patches, signature updates
configuration changes - Native Device Support for all leading Cisco
technologies - CSA (HIPS), Network IDS (NIDS), PIX, IOS
Firewall, AAA, VPN
26Typical Areas of Interest
Host based IPS
Enforce Internet Use Policy Content Filtering
Identify Anomalous Behavior
Host Protection
Perimeter Protection for branches against worms,
viruses, etc. via IOS Firewall
Core Servers
Perimeter Security at Headquarters
Availability Performance Monitoring
AV
AV HIPS
NMS
Router
Firewall
Web Servers Email Servers DNS Servers
MegaPath Internet
AV
Router
Core Switches
- Permit / Deny Access
- Incident Detection / Response
- Outbreak Control
- Security Policy Compliance
- Configuration Management
Network based IPS
AV to Identify Prevent Outbreaks
Identify and Contain Outbreaks
Content Filtering Server
Host based IPS
Host Protection
27Typical Security Monitoring Solutions
CSA desktop agents on all laptops
24x7 monitoring of firewall, IDS, CSAs on hosts
CSA Intrusion Prevention on critical hosts
DMZ
CSA on Internet-facing hosts in DMZ
CSA desktop agents
28Assessment Methodology
- Phase I Reconnaissance
- Public Domain Information, Search Engines,
Company Sites, Bulletin Boards - Phase II System Scan
- Broad scans to identify potential areas of
exposure and services that may act as entry
points - Targeted scans and manual investigation
- Identify and validate Vulnerabilities
- Phase III Penetration
- Exploit known vulnerabilities and configuration
flaws - Enumeration Banner grabbing etc
- Vulnerability Scanning and Validation
- User Experience Manipulation
- Phase IV Assessment Recommendation
- Best Practice Matrix
- Threat Matrix
29Deliverables
- Comprehensive Assessment Report
- Assessment Findings
- Summary
- Detailed Report with vulnerability details,
impact/risk, possible resolution - Corrective Action Plan - CAPS
- Recommendations
- Prioritize based on level of risk to organization
30 Sample Vulnerability Assessment Report
Hosts scanned Hostname IP Address
31Services in Information Technology Domain
Technology Implementations and
InfrastructureFull lifecycle systems
implementations. Architecting data center,
network, hardware, software, operating system,
security, performance, data management,
infrastructure continuity Digital Forensics
and RecoveryDigital Forensics is the discovery,
analysis, and reconstruction of evidence
extracted from any element of computer systems,
computer networks, computer media, and computer
peripherals and is performed by experts to
factually present the truth or validity of the
evidence. Forensics focuses on real-time, on-line
evidence gathering, and traditional off-line
computer forensic technology. Capsicum has built
forensic labs, written operating methodologies,
trained personnel and deployed working
solutions. Security and Privacy Capsicum Groups
expert services range from military and
intelligence community level, real-time,
computing systems intrusion security monitoring
and investigation, through, computer evidence
recovery, analysis, and document production.
32What We Do
Legal Compliance
Social Compliance
eDiscovery
Ethics
Training For Self-Sufficiency
RegulatoryManagement
eForensics
BusinessProcessManagement
Data Management
Cyber Investigations Security
Project Management
Recovery
Recycle
Technology Support
Risk Management
Infrastructure
People, Process and Technology Are Key To Project
Success
33About Data Center Components
- Computers
- Computers in the DC may vary in characteristics,
and a DC might include blade servers or standard
rack-mounted servers with varying levels of
compute capacity. For example, they might have
different amounts of memory, different
performance and capacity disks, different number,
type, and speed of processors, and so on. - Network equipment
- Network equipment that is loaded in the rack
might consist of Internet Protocol (IP)-based
load balancers, layer-2 network switches, and
firewalls. Dedicated network connections to other
datacenter - Storage
- For DCs with storage area network (SAN)
capability, the racks might be populated with one
or more SAN storage arrays. For file-based
storage, the DC would create file stores out of
the base computer resources. Tape backup and
offsite storage systems. - Other
- Diagnostics and management software
- Redundant hardware components (paths, control
functions, cache, power supplies, cables,
internal UPS) - Onsite small parts supply
- Because of the diversity of application usages
that customers will have for a DC, it is
impossible to define a single, general-purpose
configuration that fits all needs.
34Typical Data Center Network Architecture
35Business Continuance
36Typical Data Center
37Professional Certifications
- CISSP (Certified Information Systems Security
Professional) - CISA (Certified Information Systems Auditor)
- CISM (Certified Information Systems Manager)
- CCNP (Cisco Certified Network Professional)
- CCDP (Cisco Certified Design Professional)
- CCNA (Cisco Certified Network Associate)
- CCSA (Check Point Certified Security
Administrator) - CCIE (Cisco Certified Internetworking Engineer)
- CCSE (Check Point Certified Security Expert)
- MCDBA (Microsoft Certified Database
Administrator) - MCP (Microsoft Certified Professional)
- MCSE (Microsoft Certified System Engineer)
People
38Portfolio-Security Projects
- Academy Awards-Security Management
- Superfunds Womens World Awards
- Wynn Resorts-Security Training
- ICC Cricket World Cup West Indies 2007-Security
Training - Deutsche Bank/Goldman Sachs/Lehman
Brothers/AIG-Security Programs and Biowatch
Program - Dept of Homeland Security-National Exercise
Program - US Fusion Centers Program-Development
39Our Clients Partners
40More clients..