al shuaiba consulting · al shuaiba consulting “the strength of the team is each individual...

Post on 17-Jun-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Al Shuaiba Consultingwww.alshuaibaconsulting.com

“The strength of the team iseach individual member. The

strength of each member is theteam.”

Phil Jackson

2

Michael Jordan

Talent wins games, butteamwork and intelligence win

championships.

3

4What we do5

Company Overview

6 Management

7 Our Team

8 Procurement

91314

Portfolio - Procurement

International Consulting

Portfolio - InternationalConsulting

19 Marketing Consulting

Content20

Web Developer21

Information Technology

22 Cyber Security

23 Pentesting

24 Social Engineering &Social Media Security

252627

Vulnerability Assessment

Code Review

SAP Security & GRC

28 SAP Security

29Artificial Intelligence30

GRC

31 Predictive Maintenance

32 Computer Vision

33 Intelligent Cyber Security

343537

Users Profiling

Regional Presence

Contacts

38 Conclusion

4Company Overview

The greatest barrier to success is the fearof failure.

Sven Goran Eriksson

Ductile, Versatile, capable to shape to the customer's needs, with a cross-market visionthat binds IT engineering, marketing, procurement and international consulting: this isAl Shuaiba’s DNA, born from the embrace of Middle Eastern culture, acute andpenetrating, with the Western vision, strategic and concrete. In this Melting Pot thewisdom of engineering, marketing and business science merge, creating a servicecompany ranging from International Development, Product's Procurement andPenetration testing.Al Shuaiba consulting, offers to the customer experience, professionalism andpunctuality. The team's heterogeneity allows to analyze the client needs from each andevery sides in order to increase the chances of success and implementation.

5What We Do

01 02 03ProcurementInternationalConsulting &Marketing

IT Consulting

We can source European andChinese products directly from themanufacturers.

We’re specialized in theinternational consulting for foreignpartners requiring to enter smoothlyin the market of Kuwait. as well weprovide the service for Kuwaiticompanies to source internationalpartners for agencies and jvagreement.

We provide consulting in severalareas like: web developing, Cybersecurity, SAP security and machinelearning.

6Management

Eng. Sulaiman Al-AbulSalamManaging Director

Engineer and Mba in internationalmarketing, expert in internationaltransaction for commodities. With hisEuropean vision represents the real jointbetween all the other members of theteam and the local customers.

7

Mr. Faisal MohammedBusiness Development Manager

Our Team

Ms. Cinzia PediconeMarketing Manager & Advisor

Mr. Alfredo GrecoInternational Business Manager

Mr. Vladimir PistacchioSales Expert

Eng. Christian BortoneCyber Security Manager

Mr. Gagan DarjiWeb Developer

Mr. Lucio PuglieseSAP Security Specialist

Mr. Matteo AlbertiArtificial Intelligence Specialist

8Procurement• Furniture for Home and Office

• Guard Rails

• HVAC & Cooling Towers

• Gas Valves

• Batteries

• Hospital equipment

• Interior and Fire doors

• LED Screens

• Lidar Security Technology

9

ELECTRICAL SUPPLIES

Client:ASA International Group

Portfolio - Procurement

10

HOSPITAL

Client:Missaglia S.p.A

Portfolio - Procurement

11

HVAC

Client:CARLIEUKLIMA srl

BATTERIES Army Furniture Supplies

Client:Metalway srl

Portfolio - Procurement

Client:Vipiemme S.p.A

12

ROAD SAFETY

Client:IMEVA

LED SCREENSLIDAR SECRUITY

Client:RPG

Portfolio - Procurement

13International Consulting• Oil&Gas

• Civil & Industrial Construction

• Road Construction

• Interior Design

• HVAC

• Electrical Works

14Portfolio - International Consulting

SH Group is a manufacturer and globalsupplier of tailor made handling systemsand deck equipment for the marine,offshore and wind industry. EpcContractor, Rigs Supply and Operation.

OIL & GAS

Client:SH Group

Short Brief:

15Portfolio - International Consulting

IG Operation and MaintenanceS.p.A. has wide capability gained in fortyyears of activity in the executionsof EPC contracts and O&Mcontracts inthe sectors of Oil & Gas.

OIL & GAS

Client:IG Operation and Maintenance

Short Brief:

16Portfolio - International Consulting

VS-trend is established in 2002 in Bihac,Bosnia and Herzegovina. Since 2002company has acquired an extensiveknowledge and experience in assemblyand production for cruise ship.

HVAC

Client:VS-TREND

Short Brief:

17Portfolio - International Consulting

The company develops its activity mainlyin the Infrastructure sector such asroads, railways, water plants andmethane pipe – lines.

CONSTRUCTION

Client:Favellato Claudio S.p.A

Short Brief:

18Portfolio - International Consulting

Turnkey power solutions, electricalinstallations of housing units, residentialcenters, shopping areas, malls andsupermarkets and industrial parks.

ELECTRICAL

Client:SC EL-MONT SRL

Short Brief:

19Marketing Consulting• Strategic Business Planning

• Strategic Marketing Development

• Research of new Business Partners

• Market Research

• Product Development/Implementation/Management

• Marketing Positioning

• Graphical arts and renderings

• Project Management for new products

• Social Media Marketing

20

Doors

Client:10 Rajeb

Hospital furnitures Kitchens

Client:Delta Cuisine

Portfolio – Marketing Consulting

Client:Mespa

21

IT Department

WEBDEVELOPMENT CYBER SECURITY SAP & GRC ARTIFICIAL

INTELLIGENCE

Information Technology

22

Web Development SEO Digital Marketing

We deal with designing app, websites,mobile sites and company sites, offeringcustomized and functional solutions.

The tasks of the SEO specialistconsultant are to analyze thecompetition and the target audience,determine the most suitable andperforming keywords to be found bypotential customers and act directly inthe code and contents of the website inorder to optimize it and make it valuablefor the positioning on search engines.

Our Digital marketing service allows youto implement a complete DigitalMarketing Strategy, now essential forcreating a successful website.

Web Development

23Cyber Security

Services

Web Application Pentesting

Vulnerability Assessment

Social Engineering Analysis

Code Review

Network Pentesting

Reporting

Social Media Security

Security Tutoring

24Cyber Security

Pentesting

The penetration testing service is intended to be an effectivesolution to respond to the need to protect the company bytesting the level of security of the infrastructure and trying toviolate it, just as a hacker would do. The attacks that will becarried out not only affect the technological aspect, but alsoextent in the branch of hacking that focuses not on technologybut on what is often the real weak link in the system: thehuman factor. This translates into the use of unconventionalattack techniques such as Social Engineering. The outputproduced by the Pen testing service is expressed in a reportthat describes in detail all the vulnerabilities that have beenidentified and how it has been possible to exploit them.

25

Social Engineering &Social Media Security

The simplest method to break into an organization is regularlyto trick the people. This method to gain sensible information iscall social engineering. This technique has been the door forhuge attacks in the last few years. The collapse for someorganization. Social Engineering can be use even on socialmedia like Facebook or Twitter. Social Media is often the faceof your company, if social media accounts are compromisedthis can cause huge damage to your business and reputation.It's very important today test the effectiveness of your staff'ssecurity awareness.

Cyber Secruity

26Cyber Security

Vulnerability Assessment

The Vulnerability assessment service offers an advancedanalysis of the infrastructure, with the aim of providing a clearand detailed view of the vulnerabilities on the systems andservices, calculating the impact level, evaluating the riskrelated to the business and suggesting corrective actions.

27

Code Review

The Code Review process aims to identify vulnerabilitieswithin the source code. It represents one of the mostimportant phases for the development of secure applications,allowing to identify any security issues before the softwaregoes into production significantly reducing costs. The processbasically consists of two phases, in the initial one the wholeapplication is examined by one or more static analysis tools. Inthe next phase, the code is analyzed manually, focusing on themost delicate parts of the application, in order to identify allthe various vulnerabilities that are not immediatelyidentifiable.

Cyber Security

28SAP Security & GRC

Services

SAP SECURITY GRC CONSULTING

29SAP Security & GRC

SAP Security

• Management of SAP security requests (User Management,Roles Management), execution of Preventive SOD analyzes (inorder to limit the introduction of risks during the ordinarymanagement of authorizations).

• Customizing transaction and authority check

• Access control, process control and identity management.

• Maintenance of the SAP GRC system.

30

Governance, RiskManagement andComplianceGRC counseling service helps to create an integrated cycle ofGovernance, Risk and Compliance (GRC) initiatives.

IT Governance – Creating governance frameworks to achievethe ability to monitor and manage your organization.

Risk – Identify, mitigate, and monitor enterprise risk, witch canhave a negative impact on an organization.

IT Compliance – Manual and Automated validation services todetermine policy violation with predefined standards.

SAP Security & GRC

31Artificial Intelligence

Applications

PREDICTIVEMAINTENANCE

COMPUTERVISION

INTELLIGENTCYBER SECURITY USERS PROFILING

32Artificial Intelligence

Predictive Maintenance

Machine Learning can monitorate and predict in real time allIoT devices, predict failures, schedule efficient maintenanceand improve productivity.

• Real-Time monitoring of all your platform without thehuman intervention.

• Predict system failures.

• Schedule efficient maintenance and reduce costs.

• Interactive Dashboard as support of Engineers and Managers.

33

Computer Vision

With advance neural networks is possible to develop solutionsfor:• Security and Face Detection.• Tracking Users and Objects.• Self-Driving Drones for predictive maintenance.

With Deep Learning applications and Computer VisionsAlgorithms is possible to support Security Systems with Real-Time face Detection and People Tracking.

SAP Security & GRC

34Artificial Intelligence

Intelligent Cyber Security

Cyber Security and Deep Learning Solutions for customizedmalware analysis, treat analysis and Real-Time monitoringarchiving the human- level detection.

• Deep speed up real time system monitoring of all devicedevices and take action immediately.

• State of the art solution for hackers attack detection.

35

Users Profiling

Combining Computer vision algorithms and Data Analytics ispossible to extract value from important data maximizing thevalue of IoT solutions and profiling clients.

• Profiling your client, predict new tendencies.

• Optimize your store, magazine and furnitures.

•Offer always best solutions and Product Recommandation.

Artificial Intelligence

36

Kuwait CityHeadquarter

Regional Presence

37

Wien

Messina

MadridBucharestMilan

Per Year

Regional Presence

38

Coming together is a beginning;keeping together is progress;working together is success.

Edward Everett Hale

Conclusion

39

Contacts

ADRESS

3A Abdulaziz Hamad Al Saqer St,Mirqab - Kuwait City - Kuwait

PHONE

Mobile: +965 909 56 330

EMAIL

info@alshuaibaconsulting.com

SOCIAL

www.alshuaibaconsulting.com

Al Shuaiba Consultingwww.alshuaibaconsulting.com

“The strength of the team iseach individual member. The

strength of each member is theteam.”

Phil Jackson

top related