Cloud services for business:
- Postage System Business Class
- Audio and Video Conferencing
- Corporate Chat
- Corporate Portal
- Corporate Social Networking
- Project Management
Cloud services for business:
Infrastructure as a Service
Platform as a Service
Disaster Recovery as a Service
Mobile Device Management
Microsoft Azure:
Virtual Machines
Virtual Networking
SQL Azure
Data Analytics
Web Apps
Azure Active Directory
Operations Insight
Other services
Office 365:
Exchange Online
Sharepoint Online
Skype for Business Online
Project Online
PowerBI
Other services
Amazon Web Services
Virtualization, the construction of private and hybrid cloud
access control
Manage of file resources
Virtualization of workplaces (RDS VDI)
Data Backup and Disaster Recovery
Systems of data storage
Configuration management systems
Controlsystems of automation of IT processes
Systems of active and proactive monitoring
Incident management system
MONITORING AND MANAGING CORPORATE IT INFRASTRUCTURE
Corporate IT infrastructure Monitoring and Management Solutions is a handy centralized (single-panel) management toolkit with a suite of automated administration tools to deploy software, protect data, monitor performance, and meet regulatory requirements across all devices of your organization.
If your organization has:
Plenty of servers
Quite often equipment fails
Business critical IT systems malfunction
Data loss or downtime due to IT outages
Large and unpredictable costs of purchasing IT hardware or software
Large number of users located across the country
Daily barrage of calls from users urgently requesting “repair PC or application”
Unmanaged, self-installing applications by users on desktop PCs
No certainty that all PCs in the company have updated antivirus and critical updates
MICROSOFT SYSTEM CENTER
Solution for monitoring and preventative management of the corporate IT environment (applications, client devices, servers, storage, virtual datacenters, network equipment), automation and standardization of IT management based on world standards can help to:
increase IT productivity and efficiency by reducing manual tasks, allowing you to focus on critical projects
maximize the return on investment in hardware and software
empower users by providing them with the right software at the right time
WORK OF THE GRAPHICALLY RICH INTENSIVE APPLICATIONS IN A VIRTUAL ENVIRONMENT FROM ANY DEVICE
The CAD solution in the cloud is:
CONVENIENCE: users will be able to work virtually anywhere without delays in downloading files
SPEED: IT departments can give employees instant access to powerful applications, increasing resource efficiency
SECURITY: data storage on a central server guarantees more reliable data protection compared to a model of work on personal systems
KEY BENEFITS OF THE SOLUTION
DDA graphic accelerators
OpenGL and OpenCL support
Working with many simultaneous connections
Support of graphical interfaces and multiple monitors
Access from any device
NVIDIA GRID Software
Azure NV/NVIDIA Tesla M60 GPUs
Azure IaaS
TIMELY DETECTION OF FINANCIAL FRAUD
The spread of modern technology has led to more sophisticated fraud methods. The longer the fraud is detected, the greater the loss incurred by the organization. Silvery offers the implementation of modern technologies to detect financial fraud and collect the necessary evidence.
With the “Intelligent Financial Fraud Detection” solution, you can:
SIGNIFICANTLY INCREASE THE SPEED AND ACCURACY OF THE RESULTS
the system processes and analyzes each record of available data, not sample data, and gives greater confidence in the findings of the investigation. Including, for e-commerce, real-time transaction analysis with fraud detection (behavioral analysis at checkout, geolocation, etc.)
ESTABLISH LINKS BETWEEN EVENTS
uses data from unstructured sources (for example, from social networking sites, e-mail), with official (structured) records and transactions
hidden connections are detected through network analysis and data correlation
trends and patterns of user behavior are compared
EFFECTIVELY USE MACHINE LEARNING
create your own business-specific model capable of detecting fraudulent transactions with high-accuracy
Microsoft Azure
Microsoft Azure Machine Learning
Microsoft Cognitive Services
MINIMIZING THE RISKS OF FRAUD OF INSURANCE INTERMEDIARIES AND BUILDING FORECASTS OF WORK OF THE INSURANCE COMPANY
It is an automated system of business intelligence based on the accumulated base of insurance contracts and payments for them during the insurance period, as well as the construction of forecasts of activity with the help of artificial intelligence (machine learning).
STATISTICS OF INSURANCE AGENTS’ CRIMES
most often, when trying to cheat, agents are found to start their business
the greatest damage is brought by undetected fraudsters who have been working in insurance for many years, due to the large number of small fraudsters over time
the most “popular” among fraudsters are types of insurance such as CASCO, compulsory liability insurance of vehicle owners, health and travel insurance
the greater the impact of economic instability in the country on citizens, the higher the likelihood that they will try to solve their financial problems at the expense of insurance companies
SOLUTION ALLOWS TO
identify fraudulent agents and evaluate losses from their activities
determine for the additional remuneration the agents for the break-even of the insurance contracts involved
inform management in real time about key financial indicators (insurance premiums, payments, etc.)
visualize data on the most effective agents, representative offices, sales channels of insurance products
forecast insurance activities: income and expenses, changes in insurance volumes depending on various factors (eg in legislation, etc.)
1С, SAP, Excel, Word і ін.
Azure Cortana Intelligence Suite
Windows, Android, iOS
SYSTEM SECURITY ASSESSMENT
Penetration testing is a sanctioned simulation of an attack on computer systems, which allows to investigate the actual state of information security of an organization, its ability to withstand intrusion with minimal losses and to identify relevant vulnerabilities.
STANDARD SERVICE PACKAGE
Overall information systems vulnerability assessment (executive summary)
Detailed information on current infrastructure vulnerabilities, indicating criticality (technical report)
EXTENDED PACKAGE (STANDARD + SECURITY RISK ASSESSMENT)
Valuation in specific values of cost / consequences and risk forecasting
Evaluation of existing threats, procedures and policies regarding data management, privacy and security
Feasibility study – to focus on protecting your most valuable assets
Development of business risk model
Develop a risk management plan that includes recommendations for risk acceptance, monitoring or mitigation
Development of a Roadmap that contains: detailed recommendations (description of specific steps, operations, their sequence) to increase security and evaluate the resources (financial, human and other) needed to perform them
METHODOLOGY
generally recognized methodological recommendations: OSSTMM, PTES, NIST SP 800 Series, PCI DSS Penetration Testing Guidance, OWASP Testing and others.
own developments and the latest results of monitoring and market research of cyber threats (threat intelligence)
PARAMETERS AFFECTING THE COST OF PENETRATION TESTING
for technical channels: number of hosts, servers, web systems, web interfaces
for social channels: number of people you want to test
the need to stay on site or perform work remotely
how many / what languages should be the report
the need for professional liability insurance and the amount of insurance payment
urgency of testing
PROTECTION OF INFORMATION AGAINST CYBER THREATS
COMPOSITION OF THE SOLUTION
Detecting unusual behavior (suspicious actions) of users / devices: anomalous login attempts, password sharing, hidden presence, and more.
Detecting malware and security issues
Alerting about real threats that significantly affect security
Two-factor user authentication (password + SMS / call)
MAIN THREATS
The average time for intruders to remain undetected is more than 140 days
More than 60% of all network intrusions are caused by stolen credentials
THE SOLUTION ALLOWS TO
identify cyber threats that are constantly improving – from detecting known malware attacks to identifying abnormal behavior using machine learning and behavioral analysis, as well as quickly take the necessary steps to enhance security and eliminate the threat
ensure access to information resources only to authorized users, even if his password is known
Microsoft Advanced Threat Analytics
Azure Multi-factor Authentication
High definition video surveillance systems
Self-training video analytics
Convenient access control in the context of IT technologies
High resolution cameras (1MP to 7K for any subject)
Recording servers (professional high-performance remote monitoring workstations)
Analog video encoders (the most economical way to digitize)
Innovative technologies:
Adaptive IR illumination – when changing focal length, focuses IR beam to the shooting area
High Definition Stream Management Technology – provides intelligent data bandwidth reduction with maximum image detail
Avigilon Access Control Manager – manages video data, visitors and alarm panels, as well as biometric authentication and wireless locking.
SafeConsole Centralized Management Server – allows to manage media, perform inventory, audit, remotely remove encryption keys, control IP access for all media connected to the server. Available in both cloud and standalone versions.
AES-256 Dual Hardware Encryption Family of encrypted disks
Family of encrypted flash drives with full encryption of up to 256 GB
Encrypted CD \ DVD with built-in recording utility
Encrypted virtual disks that allow data to be transferred to the selected storage in encrypted form
Fraud Prevention
Employee relocation control – identification and monitoring of staff, including on-the-job time, zoning, accurate hours
VIP Clients – Contactless loyalty program
Analysis of passability
Promotions
Targeted advertising
Customer Satisfaction Assessment