Raddish Corporate Profile
Raddish Corporate Profile
PROFILE
2 | RADDISH TECHNOLOGY
ABOUT US
MOVING BUSINESSES AHEAD
WITH TECHNOLOGY
OUR MARKET
We stay on top of critical trends in consumer behaviour and keep track of our market share to take advantage
of opportunities. Below is a chart representing our latest market share data:
B Government-Linked
Companies (GLCs) D Government
COMPANY PROFILE | 3
PROVIDING NEXT-GENERATION
ICT SOLUTIONS SINCE 2014
Raddish Technology Sdn Bhd is a trusted ICT solutions
provider specialising in IT consultancies, network
and storage solutions, IT security solutions, system
solutions, and IT professional services across various
industries. With over a decade of industry experience,
we are also committed to delivering value-added
services. Today, we proudly offer our extensive
expertise and in-depth knowledge to help customers
address specific IT challenges.
OUR JOURNEY
VISION
We aim to be a leader in the ICT solution market
to help enterprises drive successful digital
transformation.
MISSION
To address the latest business trends, needs and
challenges and provide value-added services by
introducing the best-of-class innovative technology,
driving business agility, and maximising return on
investments.
GOALS &
OBJECTIVES
At Raddish Technology, our every word and deed
is guided by a clearly defined set of goals and
objectives. We set our standards high to ensure
that our services and solutions are nothing short of
exemplary.
QUALITY OF SERVICES
We work hard to deliver high-quality services to our
valued customers consistently.
COMPETENCY
We commit to upgrading ourselves to stay relevant
and competitive in our field.
INDUSTRY LEADER
We strive to lead the local market through quality
services and brilliant innovation.
BEST-OF-BREED SOLUTIONS
We constantly adapt and innovate to provide bigger
and better IT solutions.
CUSTOMER SATISFACTION
We seek to understand our customers’ expectations
and adjust our services to fit their needs.
6 | RADDISH TECHNOLOGY
OUR SOLUTIONS
We offer a wide range of solution components...
ENTERPRISE
CYBER SECURITY NETWORKING
SOLUTION
01 ENDPOINT SOLUTION
Our endpoint protection solutions provides: From ensuring compatibility to fixing vulnerabilities,
secure your network with automated patch
• Machine-learning classification to detect zero- deployment for Windows, Mac, Linux and Third
day threats in near real-time Party Applications.
• Advanced anti-malware and anti-virus protection
• Proactive web security to ensure safe browsing
• Integrated firewall to block hostile network Benefits:
attacks
• Actionable threat forensics to quickly isolate • Prevent security breaches with the latest
infections patches for endpoints
• Insider threat protection to safeguard against • Help organisations improve employee
unintentional and malicious actions productivity and operational efficiencies
• Centralised endpoint management platform • Reduce risk, complexity, and costs
• Endpoint, email and disk encryption to prevent • Measure IT hygiene with real-time patch
data exfiltration success rates across the organisation
DESKTOP MANAGEMENT
“
A modern and scalable take on desktop
management, our solutions help manage servers,
laptops, desktops, smartphones and tablets from a
central location.
Enterprise-grade protection and application-aware Full coverage WAF to deliver tailored asset
visibilities against new evasive threats. protection and prevent novel threats. They include:
“ Future-Proof
Security Across
Your Ecosystem
“
COMPANY PROFILE | 9
Protects against new, known and undisclosed Protect your inbox and critical data against email
vulnerabilities in your network. phishing.
• Eliminate the known and unknown exploits and
malware delivery via email transport
• Block any phishing and Social Engineering
Key Features Attacks
• Addresses email-borne threats such as:
• Stops known malware depots, drive-by
downloads, phishing and fraudulent mail • Spam
sites • Phishing
• Gain visibility into all network traffic and • Spear-phishing and whale phishing
activity • Malicious attachments and URLs
• Includes multiple fault-tolerant features, • Ransomware
supporting continuous uptime and high • Known threats
availability • Suspected threats
• Threat intelligence • Unknown/zero-day threats
• Centralised management with integrated • Impersonation attempts
security policy, response, and visibility • Business Email Compromise (BEC)
10 | RADDISH TECHNOLOGY
We offer Local Area Network (LAN) analysis, With our Network Monitoring System software,
consulting, design, implementation, diagnostics, you can reduce the risk of business downtime and
management, administration, and training. We help proactively manage any issues. Admins will also be
you find the right switched technologies across all notified of any errors and our certified technicians
types of networks: for efficient troubleshooting.
“
Boost Agility
Optimise traffic over multiple connections for a
better user experience anywhere.
Implementing
Streamline Infrastructure
Securely support application growth, network
agility, and simplified branch and endpoint
Networks That “
implementations
Work for Your
Optimal Performance
Experience high-performance, reliable access to Business
cloud services, private data centres and SaaS-
based enterprise applications
COMPANY PROFILE | 11
• Protocol acceleration
• Deduplication
• Compression
• Reduced latency and caching
• Site analysis
• Cable management design
• Data and voice cable installations
• Vendor-specific cable configurations
12 | RADDISH TECHNOLOGY
“
04 CYBER SECURITY
Features and Benefits Take action before potential security risks become
a threatening cyber attack on your organisation.
• Safelisting and Traffic Monitoring: Prevent Security Information and Event Management offers
targeted attacks towards the organisation, real-time monitoring of activities, collection of data
specific to industry, country, etc. and correlating events with the collected data to
• Rapid Detection: Break the 7-stage cyber- identify patterns of suspicious activity.
attack kill chain
• Automated Mitigation: Reduce threat • Log Management: Consolidate logs from
response time to seconds with automatic multiple sensors regardless of brands for
delivery of coordinated protection across security analytics purposes
network, endpoint, and cloud • Event Correlation & Analysis: Provide insights
into logs correlation to accelerate incidents
response
06 READYCARE
04
Managed Security Services (RTSOC)
Managed Security Services (RTSOC)
RTSOC - The Cyber Defence Centre
Managed Network Operations Services (RTNOC)
01
Professional Services
Raddish Technology enables end-to-end IT
hybrid SOC.
05
• IT Service Management Services
• Data Centre Services Managed Network Operations
• End-User Technologies Services Services (RTNOC)
RTNOC – The Next-Generation Network Command
02
Centre
Technical Support And Maintenance
The command centre is where administrators
Services
supervise, monitor and maintain a
We provide premium technical support and
telecommunications network. We provide
maintenance for every customer upon service
remediation and monitoring services to reduce
completion to protect your critical assets while
overhead costs and allow the IT department to
optimising operational efficiency.
focus on other critical aspects of the business.
• Fulfilling your customer support needs 24x7x4
Core Services
(24 hours a day, 7 days a week, 4 hours
• Network Infrastructure Installation
response window) or 8x5x4 (8 hours a day, 5
• Remove System Backups
business days, 4 hours response time)
• Remote Operations Management
• Keeping you updated with the latest product
• 24x7x365 Network Helpdesk Support
features and upgrades
• Issue Documentation and Reporting
14 | RADDISH TECHNOLOGY
OUR TEAM
Finance &
Operation Director
Sales Management
Team
Technology
Director
COMPANY PROFILE | 15
Procurement
Executive
Business
Development Manager
Inside Sales
Coordinator
Project Managers
Technical Pre-Sales
Engineers
Network
Subject Matter Experts
Architecture SME
Cloud SME
16 | RADDISH TECHNOLOGY
OUR CUSTOMERS
BERNAS
Padiberas Nasional Berhad
COMPANY PROFILE | 17
OUR PARTNERS
01 Strategic Partners
AUTHORISED PARTNERS
ENDPOINT SECURITY
CLOUD/MFA SOLUTIONS
BACKUP SOLUTIONS
CERTIFICATIONS
TECHNICAL CCNA CCDA PCNSE
Cisco Certified Cisco Certified Palo Alto Networks Certified
CERTIFICATION: Network Associate Design Associate Network Security Engineer
FRAMEWORK ITIL
Information Technology
CERTIFICATION: Infrastructure Library V.3
20 | RADDISH TECHNOLOGY