STL Profile
STL Profile
Sami Tech Ltd. is an IT Enabled Services Company, established 5th September 2018. We
focused on Information System (IS) Audit, Information System (IS) Security Gap
Assessment, IS Security Risks Assessment, Vulnerability Assessment & Penetration Test
(VAPT), Compliance Validation, Cybersecurity Framework Implementation, Cybersecurity
Manage Services, Business Transformation, Enterprise Governance IT (EGIT). We also
deliver IT strategy and consulting, Cybersecurity consulting and managed IT services.
Mission
Vision
To help companies to be more successful through the use of information, systems and
technology. Our Aim is to make our organization strong and more competitive in the global
business.
Core Values
Excellence - setting and achieving high standards of Professional ICT Solutions
Integrity – displaying and practice the highest ethical and professional standards
Respect - showing courtesy and understanding for all with whom we interact.
IS Risk Assessment
Organizations use automated information technology (IT) systems to process their
information for better support of their missions, risk management plays a critical role in
protecting an organization’s information assets, and therefore its mission, from IT-related
risk.
Digital Forensic
Our digital forensics services cover complete spectrum of possibilities to look for the
malicious actor from memory analysis, disk analysis to network forensics. We offer
extraction of necessary artifacts for further investigation, provide expert advice on what can
and what cannot be retrieved and provide evidence well intact which can be used in legal
proceedings if required.
Our industry leading certified experts helps our clients to develop Business Continuity
Plan (BCP)
In Penetration testing (PT) Sami Tech Ltd simulates the activities of a malicious attacker who
tries to exploit the vulnerabilities of the target system. In this step the identified set of
vulnerabilities in VA is used as input vector.
It is incredibly difficult and expensive to both find and then retain the right security
expertise to keep your business secure. The best way to overcome the struggle of staying
secure is to outsource your cyber security to an IT Partner with a knowledgeable and
experienced security team who are on hand to keep your business secure.
Regular software
Threat management. Access management.
patching.
We have experts who will work with our clients to ensure the IT Governance in their
organization.
Strategic
Alignment
Performance
Value Delivery
Management
IT Governance
Resource Risk
Management Management
Cybersecurity Framework Implementation
The Framework is voluntary guidance, based on existing guidelines, and practices for
organizations to better manage and reduce cybersecurity risk.
Using the framework could improve the critical infrastructure of an organization. The
Framework can be implemented in stages and hence can be tailored to meet any
organization’s needs. The Framework is intended to supplement, not replace, an
association’s cybersecurity program and risk administration forms. Our expert team help
our clients to implement any cybersecurity framework.
Identify
Business Environment Risk Management
Asset Management Risk Assessment
Governance Strategy
Protect
Awareness &
Access Control Data Security Maintenance Protective Tech
Training
Detect
Security Continuous
Annomalies & Events Detection Processes
Monitoring
Response
Response
Communications Analysis Mitigation Improvements
Planning
Recover
Audit Certify
Asses Implement
Education
• Select QSA
• Define Methodology
• Perform Data Discovery
Preparation
• Map Data Flaws
• Identify Current Scope
• Gather Documentation
• Risk Assessment
• Scan & Pen Test
Gap Analysis • Identify Technology Issue
• Identify Documentation
Issue
• Optimize Scope/
Segmentation
• Remediate People, Process,
Remediation Technology
• Awareness Training
• Obtain Clean Scan & Pen
Test
• Disseminate Policies
Assessment/ • Perform Recurring Task
Maintenance • Collect Evidence
• Plan, Do, Check, Act
SWIFT Security
The SWIFT Customer Security Controls Framework describes a set of mandatory and
advisory security controls for SWIFT customers.
27 Controls
8 Principles
3
Objectives
Consultancy Services
Business Process Re-engineering
Business process reengineering is the act of recreating a core business process with the goal
of improving product output, quality, or reducing costs.
Typically, it involves the analysis of company workflows, finding processes that are sub-par
or inefficient, and figuring out ways to get rid of them or change them.
Identify
Processes
Review,
Test &
Update,
Implemen
Analyze
t to-be
as-is
Design to-
be
Business Transformation
Business Transformation is the process of fundamentally changing the systems, processes,
people and technology across a whole business or business unit, to achieve measurable
improvements in efficiency, effectiveness and stakeholder satisfaction. As such, a business
transformation project is likely to include any number of change management projects,
each focused on an individual process, system, technology, team or department.
Systems
Technology Processes
People
Cloud Consultancy
The Cloud Consultancy provide a comprehensive, boutique IT service to Small and Medium
sized businesses (SMB’s), sole traders and start-ups, provisioning and supporting their core IT
business services.
We help our customers understand the different capabilities of the Cloud solutions available
and look to match these to their technical and business requirements.
Our experienced Cloud Consultants can help you determine the efficacy of and implement
these popular cloud solutions:
➢ Digital Transformation
➢ Converged & Hyper Converged Infrastructure
➢ Software Defined Data Centers (SDDC)
➢ Virtualization
➢ IaaS and SaaS Solutions
➢ ...and many other cloud solutions.
Data analytics (DA) is the process of examining data sets in order to draw conclusions about
the information they contain, with the aid of specialized systems and software. Data
analytics technologies and techniques are widely used in commercial industries to enable
organizations to make more-informed business decisions.
Data
Data
Define the Data Data Field Level Analysis &
Consolidat
Objective Gathering Cleaning Analysis Business
ion
Insights
• Missing • Merging
Value Data From
Treatment Different
• Handling Source
Outliers • Defining
• Data Type Unique Key
Analysis • Defining
Relationshi
p in data
Post Implementation Review
Post-implementation review is a process to evaluate whether the objectives of the
ERP/Software were met. We can also use it to see how effective the software was managed.
This helps to avoid making similar mistakes with future projects and learning how to run the
project better.
Gap Stakehold
Analysis ers Benefits Report
Network
Our consultants have decades of network design, implementation and operation experience
working with industry leading technology vendors. Our services coverage includes LAN,
WAN, Security, Remote Access, Video/Voice, and structured cabling.
Virtualization
Sami Tech Ltd. implements integrated virtualization strategies that align virtual infrastructure
to IT policies in order to optimize the environment, increase efficiencies, reduce risk and
costs, and deliver the highest return on investment.
Data Center
Design:
Our multi-disciplinary team offers a full portfolio of design services, from professional
consulting, through design, to engineering services. It considers the core elements of
space, power and cooling. The design includes the network infrastructure (LAN and WAN),
IP telephony, power and cooling requirements, and patch rooms with network, access and
core switches.
Build:
Our project specialists ensure that construction projects are carefully planned, managed
and executed from start to finish. Professional project management and turnkey project
implementation methodologies ensure timeous projects with as minimal disruption as
possible, whether it is building a new data center, upgrading equipment, or modernizing a
power system.
Construct:
Construction takes a phased approach. Data center construction includes the walling,
raised flooring, cabling and electrical reticulation. The final phase involves integrated
system testing for the highest availability, optimal performance and ideal environmental
conditions.
Surveillance System
Access Control
Enables integrated security, physical access
control and attendance solutions, involving
touch and touchless devices as well as CCTV
intelligent access logs. The integration of the CCTV system with the
interior and perimeter security and access
control systems delivers a holistic security
solution. These systems enable on-site or
remote monitoring, any time of the day or
Face Recognition night. Analytics, powered by artificial
Facial recognition technology offers intelligence, provide valuable information for
unparalleled security, reduces health risks, identifying trends and reducing false alarms.
and improves the convenience and.
efficiency of access control and attendance
Berger Paints Basic Bank Ltd. Prime Bank Ltd Habib Bank Ltd NRB Bank Ltd
BD Ltd.
Implementation Services
Other Services