The only Bangladeshi LSP of Microsoft

Office 365:

Your people need to be connected and collaborative when in and out of the office. For example, your operations director is in a customer meeting and receives an urgent, confidential email on her phone. She learns that she’s running out of a key ingredient needed for your most popular product. Later, back at her desk, she uses Microsoft® Outlook® 2010 connected to Microsoft Exchange Online to arrange a meeting with the supplier about pricing. She views the supplier representative’s calendar and sees that he is unavailable for the rest of the week. However, his presence indicator shows he’s available now, so she starts a voice chat with him using Microsoft Lync™ Online. He is at home, but he can log into your Microsoft SharePoint® Online site and update the pricing spreadsheet from within the browser by using the Microsoft Excel® Web App. With these solutions, your business moves forward, from virtually anywhere and virtually any device.

In another scenario, you’re working on a document that you must finish in a few hours. Opening the SharePoint Online document library, you notice that that the document is checked out by your editor, who is traveling. The presence indicator provided by Lync Online shows that your editor is online, so you use Microsoft Lync to send an instant message to the editor and then escalate the discussion to a conference. Working together on the same document, you add the final details and close the document. Checking the team calendar in Outlook 2010, you schedule a review meeting the next day and send the meeting request to the team and a link to the finished document via Exchange Online.

The Microsoft Office 365 services offering can help you achieve these results and help meet your needs for robust security, continual reliability, and user productivity. Office 365 brings together online versions of trusted communication and collaboration solutions, including Exchange Online, SharePoint Online, and Lync Online as well as Microsoft Office Professional Plus and Microsoft Office Web Apps.

An appropriate device, Internet connection, and supported browser are required. Some mobile functionality requires Office Mobile 2010 which is not included in Office 2010 applications, suites, or Web Apps. There are some differences between the features of the Office Web Apps, Office Mobile 2010 and the Office 2010 applications.


Windows Azure Pack brings Windows Azure technologies to the datacenter, addressing a number of key requirements for service providers and enterprises who want to embrace the service provider model for delivering IT services.

Windows Azure delivers an open and flexible cloud platform that enables you to quickly build, deploy, and manage applications across a global network of Microsoft-managed datacenters.

Windows Azure and Windows Azure Pack tie into the Microsoft vision for the Cloud OS, a hybrid cloud solution that helps enterprises transform their current infrastructure to deliver agility and cost effectiveness. With the Cloud OS, companies can quickly and flexibly build and manage modern applications across platforms, locations, and devices, unlock insights from volumes of existing and new data, and support user productivity wherever they are and on whatever device they choose.

Active Directory:

Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only in charge of centralized domain management. Starting with Windows Server 2008, however, Active Directory became an umbrella title for a broad range of directory-based identity-related services.

A server running Active Directory Domain Services (AD DS) is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user.

Active Directory uses Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS.

Share Point:

SharePoint is a web application platform in the Microsoft Office server suite. Launched in 2001, Share Point combines various functions which are traditionally separate applications: intranet, extranet, content management, document management, personal cloud, enterprise social networking, enterprise search, business intelligence, workflow management, web content management, and an enterprise application store. SharePoint servers have traditionally been deployed for internal use in mid-size businesses and large departments alongside Microsoft Exchange, Skype for Business, and Office Web Apps.

While Office 365 provides SharePoint as a service, installing SharePoint on premises typically requires multiple virtual machines, at least two separate physical servers, and is a somewhat significant installation and configuration effort. The software is based on an n-tier service oriented architecture.  Enterprise application software (for example, email servers, ERP, business intelligence and CRM products) often either requires or integrates with elements of SharePoint. As an application platform, SharePoint provides central management, governance, and security controls. The SharePoint platform manages Internet Information Services (IIS) via form-based management tooling.


Based on licensing and pricing, Oracle Corporation groups its Oracle Database-related product portfolio into the "Oracle Database Product Family", which consists of the following:

  • Oracle Database Editions, variations of the software designed for different scenarios.
  • Database Options, extra cost offers providing additional database functionality.
  • Oracle Data Models, database schemas, offering pre-built data models with database analytics and business intelligence capabilities for specific industries.
  • Management packs, integrated set of Oracle Enterprise Manager tools for maintaining various aspects of Oracle Database.
  • Some of Oracle engineered systems, either specifically built for Oracle Database deployment or supporting such capability.
  • Other related products intended for use with Oracle Database.


Oracle Applications comprise the applications software or business software of the Oracle Corporation. The term refers to the non-database and non-middleware parts of Oracle's software portfolio.

Oracle sells many functional modules which use the Oracle RDBMS as a back-end, notably Oracle Financials, Oracle HRMS, Oracle SCM, Oracle Projects,[1] Oracle CRM, Oracle Procurement, Oracle initially launched its application suite with financials software in the late 1980s. The offering as of 2009 extends to supply-chain management, human-resource management, warehouse-management, customer-relationship management, call-center services, product-lifecycle management, and many other areas. Both in-house expansion and the acquisition of other companies have vastly expanded Oracle's application software business.

Oracle released Oracle E-Business Suite (EBS/ e-BS) Release 12 (R12) — a bundling of several Oracle Applications applications — in February 2007. The release date coincided with new releases of other Oracle-owned products: JD Edwards Enterprise One, Siebel Systems and PeopleSoft.

Cloud Solution

Cloud computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.

Advocates claim that cloud computing allows companies to avoid upfront infrastructure costs, and focus on projects that differentiate their businesses instead of on infrastructure. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business demand. Cloud providers typically use a "pay as you go" model. This will lead to unexpectedly high charges if administrators do not adapt to the cloud pricing model.


Oracle Exadata provides the highest-performing and most-available infrastructure for running Oracle Database, whether it’s in the Oracle Cloud, on premises, or a combination of both. Oracle Exadata architecture features a scale-out design with industry-standard servers and intelligent storage, including state-of-the-art flash technology and a high-speed InfiniBand internal fabric. This architecture provides 100 percent Oracle Database portability from on premises to Oracle Public Cloud and back.

Kaspersky Endpoint Security

Our integrated next-generation endpoint security platform, powered by our global intelligence network (the Kaspersky Security Network) provides unprecedented levels of security. This powerful multi-layered protection against known, unknown and advanced threats is designed and built by the industry’s leading security experts who have discovered and continue to discover more complicated threats in the industry than anyone else.

The new generation of cyber threats is much more sophisticated than what came before. Lack of awareness about current advanced threats without effective solutions to mitigate them exposes businesses to cyber attacks - cyber attacks that affect not only financial resources, but continuity of critical business processes and confidential data as well. Enterprises know that these zero-day attacks, often based on exploits, are extremely harmful to their business, no matter what industry they operate in.

Kaspersky Virtualization Security

Kaspersky Security for Virtualization provides a single solution to secure both virtual servers and VDI. Because it supports all the most commonly used platforms – including VMware vSphere, Citrix XenServer, Microsoft Hyper-V and KVM – Kaspersky Security for Virtualization is ideal for heterogeneous environments. The solution offers two different approaches to specialized virtualization security – both of which can be run simultaneously on different parts of your infrastructure.

The vast majority of cyber attacks that affect physical machines can also attack virtual machines. Moreover, the risks within virtual environments can be even higher. Although virtualization can improve IT agility and efficiency, it also adds extra layers of technology. Maintaining visibility of each layer of technology – and how they interact – can be difficult. Many virtual environments naturally contain a greater number of ‘attack surfaces’ – and that gives cyber criminals more opportunities to attack the business.

Kaspersky Mobility Security

Kaspersky Lab solutions help to keep Android, iOS and Windows Phone devices secure and managed*. Multi-layer protection – including our cloud-assisted technology and Kaspersky Security Network – defend smartphones & tablets against the latest cyber threats, e.g. Trojans, phishing attacks and much more. Kaspersky Mobile Security solution also helps you apply security policies & settings across almost all devices, e.g. Android, iOS, Blackberry, Windows Phone devices. Furthermore, if a mobile device is lost or stolen, anti-theft functions help you prevent access to corporate data. Remotely operated features let you block access to data & apps on the device, wipe data and find the device’s location.

Hackers are unleashing an increasing volume of threats specifically targeting mobile devices. In 2014, the number of attacks against Android devices was 4 times greater than in 2013. While the majority of attacks focused on Android devices, there’s now a growing volume of cyber threats targeting iPhones & iPads. Because iOS devices are so popular, cybercriminals are devoting more effort to compromising their security. Even connecting an iPhone to a Mac – to charge its battery – can result in malicious threats passing from Mac to iPhone.

Kaspersky Anti Targeted Attack

Our multi-layered approach helps businesses to implement an adaptive security strategy

Kaspersky Lab is a pioneer in helping businesses to adapt their security strategies – to defend against advanced threats and targeted attacks.

With a unique combination of technologies and services – all underpinned by world-leading security intelligence – we help organizations to mitigate the risks, detect targeted attacks at an earlier stage, deal with live attacks and improve protection against future attacks.

Targeted attacks – including Advanced Persistent Threats (APTs) – are some of the most dangerous risks for enterprises. However, while the threats – and techniques that cyber criminals use – are constantly evolving, too many businesses are relying on yesterday’s security technologies… to protect against today’s threats.

At the same time, the cost of launching a targeted attack has reduced – and many attackers are finding that even inexpensive tool sets can be highly effective. As a result, the volume of attacks has increased… and all businesses are vulnerable.

Kaspersky DDoS Protection

To defend your business against DDoS attacks, you need a solution that detects attacks as rapidly as possible. Kaspersky DDoS Protection fights attacks on two fronts: via DDoS intelligence and Kaspersky’s special defense infrastructure. Our security intelligence team uses sophisticated methods to monitor the DDoS threat landscape to stay ahead of the criminals – so we can achieve earlier detection of DDoS attacks. In addition, we use a combination of on-site & off-site technologies to protect your business.

In recent years, the cost of launching a DDoS attack has reduced – so the volume of attacks has rapidly increased. At the same time, attacks have become more sophisticated – and that has made them difficult to guard against and harder for businesses to recover from. Simple prevention techniques – that were effective a few years ago – are no longer adequate to protect against today’s complex DDoS attacks. Because the threats have become more devious, your protection has to be more rigorous.

Kaspersky Security Intelligence Services

Every day, enterprises are subjected to an array of cyber attacks. Sophisticated threats are constantly emerging and cyber criminals are developing innovative techniques to outwit long-established security technologies. Traditional security solutions such as anti-virus, firewall and intrusion prevention systems are no longer enough for comprehensive protection. New protection techniques are needed to fill this security gap. That’s why we’ve developed a range of services based on Kaspersky Lab’s unique intelligence and expertise.

Cyber security education is a critical requirement for enterprises faced with increasing volumes of constantly evolving threats. Security employees need to be skilled in the advanced security techniques that form a key component of effective enterprise threat management and mitigation strategies.

How can you establish and improve the skills of your in-house cyber security experts? How to minimize the risks of incident consequences? Kaspersky Lab offers a broad curriculum of training programs ranging from fundamentals to expert level of knowledge in digital forensics and malware analysis.

Kaspersky Security for Data Centers

Business continuity is critical, so repelling cyber attacks is vital to your Data Center. Securing two key technologies– storage systems and virtualized infrastructure - can significantly reduce the risk of a cyber-incident resulting in damaging and expensive downtime.

Whether you’re operating your own in-house data center or you’re delivering Infrastructure-as-a-Service (IaaS), it’s essential that you prevent security breaches and protect all the sensitive information you store and process. There will be many attack surfaces that can be exploited by a vast array of attack vectors. As you evolve your data center infrastructure to respond to new business demands, it’s likely to become even more complex. Unfortunately, this may result in more opportunities for cyber criminals to attack your business.

Kaspersky Fraud Prevention

Banking & payments are increasingly going digital. Your customers are seeking freedom from branches and demanding the convenience of online & mobile banking. This trend benefits your bank by offering a higher margin channel through which you can provide anytime, anywhere access to more high-margin and high-retention services. At the same time, cyber criminals are continuously launching new ways to attack. So your bank needs rigorous fraud prevention – but not at the expense of a smooth banking experience for your customers.

It’s a sad fact of life. Your customers can be unpredictable and unreliable – especially when it comes to ensuring their computers and mobile phones are secure. However, their mistakes are still likely to be your problem. Every time one of your customers is attacked by an online fraudster, it’s your business that’s likely to suffer the most. It’s not just a case of you having to cover your customer’s financial loss, you could also see your business reputation damaged – even though you’ve done everything you thought possible to protect your own internal IT systems.

Kaspersky Industrial Cyber Security

When we developed our industrial cyber security solution, we put process availability above everything else. Kaspersky Industrial Cyber Security is specifically designed to protect complex industrial environments that contain a diverse range of proprietary systems. It’s a highly flexible security solution that can be tailored to each installation’s unique needs. After completion of a full audit of your systems infrastructure, professional services personnel will design the optimum configuration of our security technologies and services.

Our solution delivers a logical, incremental path to comprehensive industrial cyber security, from people through to processes and technologies:

Because many threats can transfer between business IT systems and industrial systems, it’s important to protect all of your infrastructure. To secure your business IT systems – such as planning & logistics and operations management systems – we have a range of business security solutions. As well as delivering award-winning security for desktops, laptops & file servers – plus control tools, data encryption & mobile security – we protect mail servers, collaboration servers, virtual environments and the traffic flowing through web gateways.


Next Generation Firewall

The modern network includes a combination of local servers, remote devices and cloud-hosted applications. If you use cloud- based platforms such as Office 365, Sales force, Amazon Web Services (AWS) and Microsoft Azure, you need to ensure that all of your critical applications and devices are available when needed and secured. Barracuda Next Gen Firewalls are purpose-built for the modern, distributed network in which network performance and availability is as important as security. Unlike traditional port-based firewalls, our firewalls are application-aware, enabling you to regulate application usage and intelligently prioritize network traffic.

We offer three series of firewalls, each delivering advanced next-generation performance and protection, yet for distinctly different environments:

  • The X-Series is designed for small to mid-market organizations that need to quickly and easily deploy a Next Generation firewall.
  • The F-Series gives network administrators the tools and controls needed to simplify the complex job of ensuring network performance across multiple locations; therefore, it’s ideal for managed service providers and distributed enterprises.
  • The S-Series focuses on providing simple, secure and scalable remote connectivity for Internet of Things including remote devices, kiosks, ATM machines and micro-offices.

Web Security Gateway

The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile and desktop devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance.

Web Security Service

As a cloud-based service, Barracuda Web Security Service provides a convenient option to deploy Barracuda's powerful web security technology for organizations looking to leverage the scalability and flexibility of the cloud. Ideal for safeguarding users on and off the network, the solution unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine.

Email Security Gateway

The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable. The Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMwarev Cloud Air). For hosted email security,

Web Application Firewall

With hundreds of lines of code to check-and vulnerabilities often subtle and hard to find-a serious data breach is often the first sign that a web application has problems. Having secured thousands of production applications against more than 11 billion attacks since 2008, the Barracuda Web Application Firewall is the ideal solution for organizations looking to protect web applications from data breaches and defacement. With the Barracuda Web Application Firewall, administrators do not need to wait for clean code or even know how an application works to secure their applications. Organizations can ensure robust security with a Barracuda Web Application Firewall hardware or virtual appliance, deployed either on-premises or in the cloud.

professional_solutions_02 professional_solutions_03 professional_solutions_04professional_solutions_05