Cloud technology

https://silvery.ua/wp-content/themes/salient/css/fonts/svg/basic_elaboration_cloud_upload.svg

Cloud services for business:

  • Postage System Business Class
  • Audio and Video Conferencing
  • Corporate Chat
  • Corporate Portal
  • Corporate Social Networking
  • Project Management
https://silvery.ua/wp-content/themes/salient/css/fonts/svg/basic_elaboration_cloud_upload.svg

Infrastructure as a Service

https://silvery.ua/wp-content/themes/salient/css/fonts/svg/basic_elaboration_cloud_upload.svg

Platform as a Service

https://silvery.ua/wp-content/themes/salient/css/fonts/svg/basic_elaboration_cloud_upload.svg

Disaster Recovery as a Service

https://silvery.ua/wp-content/themes/salient/css/fonts/svg/basic_elaboration_cloud_upload.svg

Mobile Device Management

Products

Microsoft Azure:
Virtual Machines
Virtual Networking
SQL Azure
Data Analytics
Web Apps
Azure Active Directory
Operations Insight
Other services

Office 365:
Exchange Online
Sharepoint Online
Skype for Business Online
Project Online
PowerBI
Other services

Amazon Web Services

Basic IT infrastructure

Virtualization, the construction of private and hybrid cloud
access control
Manage of file resources
Virtualization of workplaces (RDS VDI)
Data Backup and Disaster Recovery
Systems of data storage
Configuration management systems
Controlsystems of automation of IT processes
Systems of active and proactive monitoring
Incident management system

Products
  • Microsoft Hyper-V
  • VMware
  • System Center 2012
  • Active Directory
  • Identity Manager
  • File Services
  • Remote Desktop Services

Productivity

MONITORING AND MANAGING CORPORATE IT INFRASTRUCTURE

Corporate IT infrastructure Monitoring and Management Solutions is a handy centralized (single-panel) management toolkit with a suite of automated administration tools to deploy software, protect data, monitor performance, and meet regulatory requirements across all devices of your organization.
If your organization has:

Plenty of servers
Quite often equipment fails
Business critical IT systems malfunction
Data loss or downtime due to IT outages
Large and unpredictable costs of purchasing IT hardware or software
Large number of users located across the country
Daily barrage of calls from users urgently requesting “repair PC or application”
Unmanaged, self-installing applications by users on desktop PCs
 No certainty that all PCs in the company have updated antivirus and critical updates

MICROSOFT SYSTEM CENTER

Solution for monitoring and preventative management of the corporate IT environment (applications, client devices, servers, storage, virtual datacenters, network equipment), automation and standardization of IT management based on world standards can help to:

 increase IT productivity and efficiency by reducing manual tasks, allowing you to focus on critical projects
 maximize the return on investment in hardware and software
empower users by providing them with the right software at the right time

Technologies
  • Microsoft System Center Configuration Manager
  • Microsoft System Center Operations Manager

WORK OF THE GRAPHICALLY RICH INTENSIVE APPLICATIONS IN A VIRTUAL ENVIRONMENT FROM ANY DEVICE

The CAD solution in the cloud is:
CONVENIENCE:  users will be able to work virtually anywhere without delays in downloading files

SPEED:  IT departments can give employees instant access to powerful applications, increasing resource efficiency

SECURITY:  data storage on a central server guarantees more reliable data protection compared to a model of work on personal systems

KEY BENEFITS  OF THE SOLUTION

DDA graphic accelerators
OpenGL and OpenCL support
Working with many simultaneous connections
Support of graphical interfaces and multiple monitors
Access from any device

Technologies

NVIDIA GRID Software
Azure NV/NVIDIA Tesla M60 GPUs
Azure IaaS

Business analytics

TIMELY DETECTION OF FINANCIAL FRAUD

The spread of modern technology has led to more sophisticated fraud methods. The longer the fraud is detected, the greater the loss incurred by the organization. Silvery offers the implementation of modern technologies to detect financial fraud and collect the necessary evidence.
With the “Intelligent Financial Fraud Detection” solution, you can:

SIGNIFICANTLY INCREASE THE SPEED AND ACCURACY OF THE RESULTS

the system processes and analyzes each record of available data, not sample data, and gives greater confidence in the findings of the investigation. Including, for e-commerce, real-time transaction analysis with fraud detection (behavioral analysis at checkout, geolocation, etc.)

ESTABLISH LINKS BETWEEN EVENTS

uses data from unstructured sources (for example, from social networking sites, e-mail), with official (structured) records and transactions
hidden connections are detected through network analysis and data correlation
trends and patterns of user behavior are compared

EFFECTIVELY USE MACHINE LEARNING

 create your own business-specific model capable of detecting fraudulent transactions with high-accuracy

Technologies

Microsoft Azure
Microsoft Azure Machine Learning
Microsoft Cognitive Services

MINIMIZING THE RISKS OF FRAUD OF INSURANCE INTERMEDIARIES AND BUILDING FORECASTS OF WORK OF THE INSURANCE COMPANY

It is an automated system of business intelligence based on the accumulated base of insurance contracts and payments for them during the insurance period, as well as the construction of forecasts of activity with the help of artificial intelligence (machine learning).

STATISTICS OF INSURANCE AGENTS’ CRIMES

most often, when trying to cheat, agents are found to start their business
the greatest damage is brought by undetected fraudsters who have been working in insurance for many years, due to the large number of small fraudsters over time

the most “popular” among fraudsters are types of insurance such as CASCO, compulsory liability insurance of vehicle owners, health and travel insurance
the greater the impact of economic instability in the country on citizens, the higher the likelihood that they will try to solve their financial problems at the expense of insurance companies

SOLUTION ALLOWS TO

identify fraudulent agents and evaluate losses from their activities

 determine for the additional remuneration the agents for the break-even of the insurance contracts involved

 inform management in real time about key financial indicators (insurance premiums, payments, etc.)

visualize data on the most effective agents, representative offices, sales channels of insurance products

forecast insurance activities: income and expenses, changes in insurance volumes depending on various factors (eg in legislation, etc.)

Technologies

1С, SAP, Excel, Word і ін.
Azure Cortana Intelligence Suite
Windows, Android, iOS

Security

SYSTEM SECURITY ASSESSMENT

Penetration testing is a sanctioned simulation of an attack on computer systems, which allows to investigate the actual state of information security of an organization, its ability to withstand intrusion with minimal losses and to identify relevant vulnerabilities.

STANDARD SERVICE PACKAGE

Overall information systems vulnerability assessment (executive summary)
Detailed information on current infrastructure vulnerabilities, indicating criticality (technical report)

EXTENDED PACKAGE (STANDARD + SECURITY RISK ASSESSMENT)
Valuation in specific values of cost / consequences and risk forecasting
Evaluation of existing threats, procedures and policies regarding data management, privacy and security
Feasibility study – to focus on protecting your most valuable assets
Development of business risk model
Develop a risk management plan that includes recommendations for risk acceptance, monitoring or mitigation
Development of a Roadmap that contains: detailed recommendations (description of specific steps, operations, their sequence) to increase security and evaluate the resources (financial, human and other) needed to perform them

METHODOLOGY

generally recognized methodological recommendations: OSSTMM, PTES, NIST SP 800 Series, PCI DSS Penetration Testing Guidance, OWASP Testing and others.
own developments and the latest results of monitoring and market research of cyber threats (threat intelligence)

PARAMETERS AFFECTING THE COST OF PENETRATION TESTING

for technical channels: number of hosts, servers, web systems, web interfaces
for social channels: number of people you want to test

the need to stay on site or  perform work remotely
how many / what languages should be the report

the need for professional liability insurance and the amount of insurance payment
urgency of testing

PROTECTION OF INFORMATION AGAINST CYBER THREATS

COMPOSITION OF THE SOLUTION

Detecting unusual behavior (suspicious actions) of users / devices: anomalous login attempts, password sharing, hidden presence, and more.
Detecting malware and security issues

Alerting about real threats that significantly affect security
Two-factor user authentication (password + SMS / call)

MAIN THREATS

The average time for intruders to remain undetected is more than 140 days

More than 60% of all network intrusions are caused by stolen credentials

THE SOLUTION ALLOWS TO

identify cyber threats that are constantly improving – from detecting known malware attacks to identifying abnormal behavior using machine learning and behavioral analysis, as well as quickly take the necessary steps to enhance security and eliminate the threat

ensure access to information resources only to authorized users, even if his password is known

Technologies

Microsoft Advanced Threat Analytics
Azure Multi-factor Authentication

Video surveillance, analytics, access control systems

Silvery offers the world’s most powerful Avigilon-based integrated security system:

High definition video surveillance systems

Self-training video analytics

Convenient access control in the context of IT technologies

Among the proposed solutions:

High resolution cameras (1MP to 7K for any subject)

Recording servers (professional high-performance remote monitoring workstations)

Analog video encoders (the most economical way to digitize)

Innovative technologies:

Adaptive IR illumination – when changing focal length, focuses IR beam to the shooting area

High Definition Stream Management Technology – provides intelligent data bandwidth reduction with maximum image detail

Avigilon Access Control Manager  – manages video data, visitors and alarm panels, as well as biometric authentication and wireless locking.

Encrypted drives

Silvery offers reliable DataLocker encrypted drives:

SafeConsole Centralized Management Server – allows to manage media, perform inventory, audit, remotely remove encryption keys, control IP access for all media connected to the server. Available in both cloud and standalone versions.

AES-256 Dual Hardware Encryption Family of encrypted disks

 Family of encrypted flash drives with full encryption of up to 256 GB

Encrypted CD \ DVD with built-in recording utility

Encrypted virtual disks that allow data to be transferred to the selected storage in encrypted form

Face recognition technology

Silvery offers face recognition technology for retail:

Fraud Prevention

Employee relocation control – identification and monitoring of staff, including on-the-job time, zoning, accurate hours

VIP Clients – Contactless loyalty program

Analysis of  passability

Promotions

Targeted advertising

Customer Satisfaction Assessment