AMANTECH USETEK LLC

Phone: +971504909405

Email:sales@amantek.net

ABOUT AMANTEK USETECH

AMANTECH USETEK LLC’s history started back in 2007, upon the launch of USETECH as a leading implementer of IT security and Defense-in-Depth Solutions in challenging regions in MEA.  Our team possess diversified experience in multiple IT security disciplines with senior staff averaging 15 to 20 years of international experience in different fields of IT security including, Security Assessment, Design & implementation of counter measures, IT Security Audit, Consultation & professional services, Training, and PKI implementation.

USETECH worked on projects assigned by the USAID, COMESA, IGAD, regional organization and the ITU regional office.

USETECH is a customer-oriented company, with focus on securing customer’s data end-to-end. Our solutions are tailored to each client, we do not use the uniform approach in tackling IT Security issues.

Providing Security Support With a Passion.

USETECH provides a wide range of Infrastructural IT Security Solutions including:

  • Security Assessment
  • Design & implementation of counter measures
  • Audit
  • Consultation & professional services
  • Training

USETECH Co. Ltd. can support and train your team with a wide range of 

infrastructural solutions, including network & IT security solutions and applications. 

Whether your company is a service provider, enterprise, financial institution, 

government agency, research, or educational institution we can certainly assist

 you design and implement your infrastructure.

We can help:                                                                             

  • Implement the best Network & IT security solutions, including full network deployment and Security PoliciesPKISSL protection of Intranets and ExtranetsWireless LANUTM FirewallsVPN, and E-mail Security
  • Provide the most advanced and proven Technologies and Practices to secure your Intellectual Assets at optimal cost
  • Extensive expertise in Data Security Management, concepts and principles
  • Review for conformance with common security models and review of auditing and monitoring capabilities
  • Analysis of vulnerability to malicious attacks
  • Assist with Counter MeasuresDisaster Recovery planning, analysis of asset valuation, Physical Security, and establishing policies and roles

COUNTERMEASURES, PROTECTION, & PKI SERVICES:

We offer:

  1. PERIMETER SECURITY AND UTM FIREWALLS
  2. WEB APPLICATION FIREWALLS (WAF)
  3. EMAIL & MESSAGING SECURITY (MAIL FILTERS)
  4. DATABASE SECUIRTY SERVICS
  5. PKI FULL RANGE OF SERVICES FOR:
    1. NATIONAL ID SERVICES.
    2. BANKS & OTHER ORGANIZATIONS (SSL & EMAIL ENCRYPTION).
    3. OTHERS CRITICAL INFRASTRUCTURES.
  • Our specially trained engineers will perform thInstallationconfiguration, and support of strong validated technologies and products including Unified Threat Management Firewalls (UTM), Web Applications Firewalls (WAF), Database Compliance & Monitoring security appliances, Vulnerability ScannersDNS Security, physical and virtual appliances.
  • Our appliances contain a wide range of protection in a single device. Services include FirewallVPNIPSAnti-VirusAnti-SpamWeb-Filtering (URL and content), Traffic-ShapingAnti-spywareApplication-Control, and Database passive monitors for compliance
  • Our counter measure systems are obtained from vendors with Six ICSA labs, FIPS-2Common Criteria, and EAL4+ certifications

We are also the distributor for GATEPROTECT UTM products suite www.gateprotect.com for the region of Northeast Africa. GateProtect is a globally acting provider of UTM based IT security solutions in the area of network security for more than ten years

What Services Do We Provide

Delivery, Installation, Migration, Configuration, Support and Audit for Fortinet UTM, WAF and Email Security Appliances

Security Design/Implementation

Our specially trained engineers will help you design strong IT Security  policies, choose the right platform for you and perform  thInstallation, configuration, and support of strong validated  technologies and products including Unified Threat Management  Firewalls (UTM), Web Applications Firewalls (WAF), Database  Compliance & Monitoring security appliances, Vulnerability Scanners,  DNS Security, physical and virtual appliances.

Proven Technologies

Provide the most advanced, proven technologies and practices to build (Servers, Storage solutions, Routers, Switches and other IT network infrastructural equipment) and secure your intellectual assets at optimal cost..

ISACA BMIS

Brainstorming via ISACA’s BMIS we work through the Organization, Technology, Processes, People, to facilitate successful implementation of the Organizational Objectives. We then assist you in selecting the most appropriate technology solutions to fit the current needs.