MetroPolitan Security

hballoutad
Friday, 26 October 2018 09:00

MS specializes in providing security services for Oil and Gas companies, offering a variety of solutions to the Oil and Gas industry, enabling them to operate in high-risk areas. MS supports International Oil Companies with security advice and risk management solutions. Our expert team will provide you with:

• Risk assessments
• Operational plans, procedures and physical security infrastructure
• Emergency plans and response
• Medical services and Health & Safety management
• Demining expertise

Friday, 26 October 2018 08:59

Airport Security
Terrorism has been a problem for airlines and air travelers since the 1970s. Airports and airlines require a unique range of security measures, from protecting the restricted areas and the aircraft on the ground via a command and control center to advanced passenger profiling and CCTV monitoring of passengers and staff, conducting cabin security checks, ensuring cargo, airport and in-flight supplies are screened, right through to the protection of the flight deck and cabin crew stopovers. Whatever the requirements MS has the solution because your safety is our priority.

Port Security
MS covers all aspects of marine associated risk. We can provide you with a designed program for your specific maritime needs. Our maritime programs ensure effective communication strategies that provide a high level of security awareness throughout your facility. We have a cadre of operational leaders and training managers who are skilled in all aspects of maritime compliance such as:

1. Maritime Transportation Safety Act (MTSA)
2. International Ship and Port Security Code (ISPS)
3. Customs-Trade Partnership Against Terrorism (C-TPAT)
4. Safe Ports Act

Friday, 26 October 2018 08:52

Digital Forensics
MS is the global leader in forensic technology for mobile device examination, intelligent tool and CDR analysis, with offices in Europe and in the Lebanon, as well as a network of distributors across the globe. The company has been involved with mobile communications since 2017 and now has a dedicated department has singular focus on the forensic recovery of data from mobile devices and CDR analysis. Our tool software has been used by investigators to quickly and effectively retrieve information, such as pictures, SMS, call history, contact lists and intelligent kits and Call Data Record analyzer can import and analyze CDR/Tower CDR logs of any service provider and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR) of CDR Numbers. 

Our tool/software is used by Police, Law Enforcement, Military, Government Intelligence Agencies and Forensic Laboratories in many countries worldwide to investigate crime, gather intelligence, investigate fraud and fight corruption. Our sole focus is a quality forensic solution that creates secure and trusted results for end users. The core business today produces world class products which have the capability to recover deleted data from mobile devices; smart-phones, mobile phones, 3G modems, GPS and Tablet devices and CDR Analysis is Smart Mobile Data Analysis Solutions for Call Records. Easy to trace calls record & reduce time consumption and provide results in short time by using CDR Analysis Software. Analyze call records, and get various types
of desired reports in few minutes. CDR Analysis Software used for investigation/forensic departments like police department, Special Crime Investigation Departments etc... 

Radio Planning and Network Optimization
MS provide turnkey services for any kind of network (2G /3G HSDPA/ WiMAX/ 4G/ WIFI/ Broadcast/ PMR/MW networks). Our module is being used by a large number of operators worldwide for all types of networks. Our module is based on sophisticated optimization techniques (automatic frequency planning and optimization of TRX allocation vs. interference conditions) and specific advanced features such as the allocation of frequency hopping parameters, intermodulation product, multi layers analysis, inter system interference, neighbor list, user-definable constraints. The capabilities of this module allow to perform successful automatic frequency plan even in worst situation in very dense urban area. MS have a long experience of this kind of optimization
and recently in west Europe operator chose MS’s mobile network optimization solution in order to perform the of their 2G/3G network (991 DCS and 2334 GSM cells with at least 4 TRX/cells, 5664 3G cells 2 carriers), in Africa operators choose MS for the GSM-R radio planning (ETCS and Non-ETCS): 7000 km railways. The propagation models used by our tool allow to perform coverage with high level of accuracy with or without our automatic digital map tuning module. The calibration stage can be done to improve the final result (if drive test measurement files are available).

Some examples of services provided by MS:
Optimizations via a set of ACP (Automatic cell planning) and Automatic Optimization tools allowing
operators to perform the following optimization:
- Antenna azimuth optimizing (in order to improve existing coverage according to specific target coverage)
- Antenna tilt optimizing (in order to improve existing coverage and/or reduce interference issues)
- Antenna model selection (in order to improve existing coverage and/or reduce interference issues)
- Antenna height optimizing (in order to improve existing coverage and/or reduce interference issues)
- Best equipment selection (Huawei, NSN, Ericsson...)
- New sites or sector adding with Before & After coverage plots
- Repeaters or new sites in order to resolve (outdoor/indoor) coverage or traffic issues

FRAUD MANAGEMENT
Fraud is a diverse and rapidly evolving challenge for mobile network operators today. MS Fraud Management (FM) is a reliable and scalable solution focused on a Software-as-a-Service (SaaS) Cloud model – providing networks with the peace of mind that their fraud solution will adapt to meet the changing environment. MS FM is quick to market and modular, without the heavy up-front infrastructure expense. MS FM includes the Gatekeeper Bypass Fraud Detection module (SIM-box Detection). MS FM additionally provides a host of standard fraud modules, including reports for International Revenue Share Fraud (IRSF), Premium Rate Services (PRS) Fraud, Subscription Fraud, Roaming Fraud, Dealer Fraud, Equipment Change Reports, High Usage Reports and more.

The MS Bypass Fraud Detection (Gatekeeper Solution) works to analyze traffic and data to detect multiple types of fraud. MS issues both Standard Reports (On-net, Off-net, Cells, Equipment, Refiling, Dealers, Summary & Details Reports, SIM Verification Report, Test Call report, etc.) as well as Other Reports (High Usage, Hot IMEI, Hot MSISDN Ranges, IMEI Change Report, etc.). We also produce other modules to manage fraud: interconnect, Dealer, PRS, Subscriber, Roaming, etc.

Bypass (SIM-box) Detection
MS’ Gatekeeper is a breakthrough software service for the detection of SIM-box GSM “bypass” termination devices. By utilizing a combination of traditional call record analysis with test call generation (TCG) and an innovative SIM verification module, the Gatekeeper solution can identify fraudulent bypass SIMs in a matter of hours – significant improvement over any competitive product on the market. The SIM-box Fraud Bypass Problem: SIM-boxes bypass international tolls by routing calls over the Internet
and through a local SIM, causing significant operator loss.

• Direct Gateway Revenue Loss: SIM-box calls bypass an operator’s international toll, typically causing $0.05 to $0.25 per subscriber of losses monthly.
• Indirect Network Costs: SIM-boxes also overload cell towers unnecessarily and provide low-quality routes for international terminations.

MS Experience with SIM-box Detection
MS has successfully deployed its Gatekeeper solution at multiple operators, encountering a variety of fraud strategies, where operators were losing millions of USD monthly. Rapid Initial Savings: MS projects typically save the GSM operator more than $1 million USD annually – savings that can be quickly demonstrated in the first month of the project. Ongoing Fraud Detection: Bypass Fraud will always return after shutdown, and MS Gatekeeper remains on watch to immediately shut down new fraud attempts within hours.

Gatekeeper SIM-box Detection Approach
More sophisticated SIM-box operators are now using SIM servers and multiple remote gateways to simulate movement, automate calls and SMSs between SIMs, fake IMEIs, and use very low profile calling patterns. CDR analysis alone is not enough to detect fraud!

MS 3-Steps Hybrid Approach
• CDR Pattern Analysis Engine – quickly catches 95% certainty of fraud
• SIM Verification – confirms to 99.9% by communicating with the SIM card U allows for the detection of low-profile SIM-box Fraud!
• Call Generation – enhances effectiveness of solution using test calls

 

Friday, 26 October 2018 08:48

1. Information and Communications Technology (ICT) Solution
Our highly qualified team can perform an analysis for any technological site and report a situation for the current structure, and finally advise or implement a better alternative or integrated solution. ETS provides ICT solutions for corporate and organizations for the Telecom, financial, healthcare, education, hospitality, and different other sectors:

Data: routing, switching, security, wireless, structured cabling
Voice: IP telephony, VoIP, unified communications, recording Integration
Video: conferencing, telepresence, IP TV, VOD/MOD, video walls
Computing: servers, storage, workstations, consoles, tablets, Ruggedized field products, right sized hardware, Virtualization, Cloud Services. 
Software: video analytics, command and control, network and infrastructure management

 

2. Cyber Security
As agencies and organizations become more reliant on modern technology, they also become more vulnerable to cyber-attacks such as Corporate Security Breaches, Fraud, Identity Theft, and others. Our cyber security solutions have been developed in response to the growing and persistent threats and malware used against critical infrastructures, industrial control systems, and smart cities using state-of-the-art Firewalls, Intrusion Prevention Systems, and Unified Threat Management.

3. Data Centers
The safe and reliable storage of data is fundamental requirement in the successful running of any organization. Databases, client records, and confidentiality depend upon systems that are secure and fast. METS provides highly secure data center design and infrastructure solutions according to international standards. They are climate controlled, and monitored and secured by world-class technologies.

4. Research and Development
The aim of research and development (R&D) is to improve the current technologies offered by an organization or to develop innovations that strengthen the organization’s position in the marketplace. The sector includes many companies that are dedicated research and development businesses that focus on particular fields or areas of work. For example, Metropolitan Security works in Security field, so the innovation scope should be around Defense Techs, and Security Techs. You will also find R&D divisions within many forward-looking, innovative engineering and technology organizations.

- Analyze and understand the positioning of the product, service or process.
- Translate functional needs into specifications.
- Design and develop the product, service or process.
- Set up the test and validation phases.
- Correct and improve the product, service or process.
- Support the production start-up and product launch.
- Gather business intelligence (patent, technology and competitive intelligence) to identify new scientific trends and conduct strategic planning.
- Participate in benchmarking and test competitive products to gain relevant information that can be applied to product specifications.
- Gather any legal documents, including laws, regulations and patents that are necessary for determining the project’s feasibility.

 

Friday, 26 October 2018 08:42

The safety and security industry includes equipment, solutions, and services used for public security, personal protection, residential security, industrial safety, corporate and infrastructure protection (e.g. access control, ID, and perimeter security), as well as various solutions and systems designed for law enforcement and defense agencies’ use.

Friday, 26 October 2018 08:39

At MS we recognize that there is risk in-built in everything we do. We believe risks can be eliminated through reliable application of sound management strategies, and that a ZERO loss workplace is achievable. We provide companies in oil & gas industry, factories, buildings and others with safety management and consulting services to promote and maintain an ethical workplace atmosphere that equally values health, safety, and environmental responsibility.

Our Health, Safety, and Environmental (HSE) consultants and specialists are equipped and available to address your company’s relevant challenges and concerns. The SMS team of safety specialists recognize that each company is unique. We review your company’s needs and customize the best HSE management solution to meet them.

In addition to worker safety and medical attention, job site security is a top priority. By protecting your employees and property, your day-to-day operations are made safer. We offer a full spectrum of security and monitoring solutions, including manned and video security, virtual guards, GPS-based fleet tracking and monitoring, and personnel monitoring. Whether offshore, on a construction site or at a refinery, MS provides peace of mind with wide-ranging security options.

Friday, 26 October 2018 08:36

Fire detection, alarm and firefighting solutions are also a main service under ETS Scope of work. MS offers a wide range of fire system solutions tailored to meet the demands of your business. Our monitoring, testing, inspection and maintenance services allow fire systems to operate at peak performance We will aid you in choosing the suitable fire protection system for your needs for simplicity, reliability, andease of maintenance.

Each of our proposed fire protection system is able to be customized and designed as per the required specifications to meet appropriate codes, time, and budgetary guidelines. Besides fire extinguishers, we provide automatic fire alarm system which is designed to detect the presence of fire by monitoring environmental changes associated with combustion.

Conventional or Analog addressable, our fire alarm systems are used to notify people to evacuate in the event of a fire or other emergency, to request such civil defense as fire brigades’ emergency services, and to send digital signals to associate systems interface to control the spread of fire and smoke.

Friday, 20 April 2018 07:15

hikme saggesse magazine april 2018

Wednesday, 14 February 2018 22:30

hadara association Feb2018

Friday, 12 January 2018 00:23

LDE FEB 2018

 

 

Page 1 of 8