ZAPONG
Advanced IT
Security and Data
PTrole-voas lao m lm Uae
Deliverit
Telecommunicati
with an all-in-one package
|I-educated and talented
technol
d to delive
benefi
requir
and imprc rity system,
Ppongafrica.comET Se CINCY felt steals dard
Reece Cac s
Etec
peevaer
eet)
ee iacas
eee eer Pat
We coca!
Rotel erat)
Pee cas
ZPone
OUR KEY SERVICE OFFERING
INFRASTRUCTURE AND oo ENDPOINT PROTECTION
fad CLOUD SECURITY Ce
w EA
We help businesses accomplish Here, we typically evaluate endpoints
more by eliminating the physical before permitting access to critical
Donds between Ir infasthlctare organizational seMvees. such as the
andits users You can now purchase operating system, browser and other
services from Pong Agencies that applications. This ensures that they are
allows you to save money and Uptto-date and mect defined enterprise
fEetietaur core business security standards before an endpoint
{such as a mobile device) is granted
A APPLICATION SECURITY
AF inisis the process of making apps
more secure by finding, fixing, and a
enhancing thelr security. Much of this iS
happens during the development phase,
but it includes tools and methods to
protect apps once they are deployed
SOPHOS KASPERSKY2 HE Microsoft
Malwarebytes Bitdefender
paloalto TREND,(ay
Service Components
Infrastructure planning and
design
Virtualization
Network security (AntiDOs,
IPS, IDS, Proxy, SSL, Wireless)
Vulnerability and Patch
Management
Backup management
Antivirus, Anti-SPAM
Logging and Monitoring (SIEM)
Mobile security
PR ay Na lea U1
AND CLOUD SECURITY
Service Outcome
High-level policies,
strategies, architectures
Cost-efficient infrastructure
Implemented secure and
fault-tolerant systems
Recommendations for
vulnerability mitigation
Implemented security
Improved system
manageability
Ph 21) (Cd
Business Value
Reducing operating and
capital expenditures
Reducing storage costs
Protecting business from
disruption
Protecting corporate
secrets
Reputation
ae,2) ENDPOINT SECURITY
Service Components
Governance
Application Control
License Management
Internet access security
(IPS, user activity control, Web filtering)
Device management
Data Leakage Prevention
Antivirus (antimalware)
Security Awareness
Service Outcome
High-level policies,
strategies, architectures
Recommendations for
vulnerability mitigation
Implemented security
systems
Security Awareness
Program
Compliance reports
User activity reports
Business Value
Reducing operational
costs
Reducing storage costs
Protecting business from
disruption
Protecting corporate
secrets
Prevention of penalties
ReputationZU hed Cd
3) APPLICATION
SECURITY
Service Components Service Outcome Business Value
Reducing costs
of application security -
decrease incidents
High-level policies,
Governance
strategies, architectures
Risk assessment Customized risks Ensuring application quality
treatment plans to support reputation and
competitive advantage
Analysis of business Application vulnerabilities Ensuring business
requirements identified and remediated continuity and application
prior to deployment sustainability
Code review Recommendations
(automated, manual) for application hardening
and vulnerability mitigation
Penetration testing
Contact us
Madonna House, Madonna House Annex, 2nd Floor - 206
Westlands Road, Westlands
P.O Box 60087 - 00200 Nairobi
+254 727877484
info@pongkenya.co ke ZPONG