Berry B Group Co., Ltd. | เราคือผู้แทนจำหน่าย ถูกแต่งตั้งอย่างเป็นทางการในไทย

Catalog Download

TECHNOLOGY & Cyber SECURITYmore

เราให้คำปรึกษา Security Operation
Center (SOC) และ Managed Security Services ตามมาตรฐานโดยผู้เชี่ยวชาญ

Security Orchestration Automation and Response (SOAR)
Security Information and Event Management (SIEM)
Malware Information Sharing Platform (MISP)
Extended Detection and Response (EDR)
DATA SECURITY & DESTRUCTION
DATA CENTER
PDPA

 

ปรึกษา CLICK ME!

Berry B Group Co., Ltd. 
ให้คำปรึกษาทั้งหน่วยงานภาครัฐและเอกชน ตามนโยบาย สกมช. และ
พรบ. การรักษาความมั่นคงปลอดภัยไซเบอร์ พ.ศ. ๒๕๖๒ อย่างเป็นทางการโดยผู้เชี่ยวชาญ

ปรึกษา CLICK ME!

TECHNOLOGY & Cyber SECURITY

  • Cyber Security Consulting

  • Cyber Security Solutions

  • Penetration Testing Service

  • Training Cyberbit (Cyber ranges)

  • PDPA Consultant &Training

  • Services & Solutions

ปรึกษา CLICK ME!

More

Cyber Security Software

Cyber Security Software

Deep Instinct Click...

ENDPOINT SECURITY MANAGEMENT

Doing What No Other Solution Can The Deep Instinct Advantage. The only prevention controls worth deploying are those you can depend on day in and day out. While 100% prevention all the time is not possible, the end-to-end resilient prevention delivered by Deep Instinct outpaces the alternatives by far. We give you the best chance to maintain business continuity no matter what threats you encounter.
Resilient Prevention
– Prevent more unknown threats through learning and prediction
– 100% Raw Data based, non-linear model
– Ensure business continuity as new threat campaigns emerge
– Zero-time automated actions means no delays
– Deep Learning Brain fully trained by Deep Instinct.
Read more

ปรึกษา CLICK ME!

Aspen ( OSTI ) Click...

ORGANISATIONAL SPECIFIC THREAT INTELLIGENCE (OSTI)

    Cyber security monitoring based on deception strategies can effectively change the starting point of the legitimate network and services, providing zero false positives and additional time to prepare and perform adequate defenses.

ADVANTAGES OF OSTI

       OSTI allows you to understand your organisation’s specific risk profile and threat intelligence. The solution has effective results in uncovering the formerly hidden formulas of exploits against customer information systems and networks. Though not a new idea, cyber deception is still relatively new technology in their use in the cybersecurity space.
 
OSTI is also the best way to monitor what attackers are actively doing, in order to predict the potential impact to your systems.
 
OSTI has no false positives. “Any time a connection is sent to the trap, this is most likely a probe, scan, or even an attack. Any time a connection is initiated from the trap, this most likely means the trap was compromised.
 
”With this in mind, this could be the ultimate alarm system that warns of the attacks to allow development of a better defense. Since no legitimate users are found on it, all users that connect are “suspects”.
 
By cloning your custom-made service or solution with our OSTI, you will learn about its vulnerabilities without any risk for your system and your organisation, free of charge.

Read more

ปรึกษา CLICK ME!

RESEC Click...

RESEC

RESEC : Malware prevention that doesn’t rely on detection

     Zero-Trust Gateways Security, ensuring delivery of threat-free files in real time through a proprietary technology that has been proven world wide.

     RESEC is a software solution that completely prevents known and unknown (“zero- day”) file-based malware threats from all common attack vectors.

     ReSec delivers peace of mind for owners and managers, and empowers end-users to do what they need to do – open emails, download content from the web, and receive critical content from any source without fear that hidden malware will
infiltrate and compromise the organization’s valuable data and assets – all without the holdups and delays created by bottlenecks and false positives typical of existing solutions.
 
ReSec provides the 360-degree security you need
 
– total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method or entry point, including email, web traffic, thumb drives, FTP, digital vaults and others.

Read more

ปรึกษา CLICK ME!

Cyber Qilin Click...

Cyber Qilin

MANAGED SECURITY OPERATION CENTRE (MSOC)
       Managed SOC Service designed to be vendor agnostic and flexible to work with any Information Security solutions and are able to adopt client already-invested security infrastructure into our proven security solution and management process in order to deliver true value to our client. We address the full threat landscape from technology security, people, processes, security operations, security strategy and governance.

Cyber Qilin core offering

  • 24/7/365 Monitoring from our offices in Israel
  • Incident Response team – 24/7/365 SLA
  • In-house Tier 1-4 security analysts capabilities
  • Ongoing threat intelligence feeds
  • Incident handling runbooks/flight guides
  • SIEM Optimization from our unique offensive perspective
  • Individual system review of all log sources feeding into the SIEM

Read more

ปรึกษา CLICK ME!

Cobwebs | OSINT Click...

COBWEBS | ระบบสืบค้นข้อมูลเว็บและข้อมูลสื่อสังคมออนไลน์

Web Intelligence for a Safer World
     Cobwebs Technologies is a global leader in AI-Powered Open-Source Intelligence (OSINT). Our mission is to protect global communities and organizations from crime, threats, and cyber-attacks, by providing seamless access to publicly available data.
      Empowering Safety and Security
Protecting Communities. Analyzing Threats. Safeguarding Organizations. Harnessing AI for a Safer World
Streamlined with artificial intelligence tools, our Web Intelligence (WEBINT) platform enables to analyze the web’s big data using the latest machine learning algorithms, finding hidden leads and automatically connecting the dots.
Read more

ปรึกษา CLICK ME!

More

Cyber Security TRAINING : Cyberbit

EDUCATION - CYBER RANGE : CYBERBIT

Cyberbit provides the world-leading cyber range, delivering hyper-realistic cyberattack simulations that maximize the skills of information security teams and students.

Cyber Security TRAINING : Cyberbit

Cyberbit Overview Click...

The Cyberbit Skill Development Platform

The only hyper-realistic cyber security skill development platform, Cyberbit empowers you
to build an elite cyber defense team by immersing it in a virtual arena that delivers the closest experience to a real-world cyberattack – BEFORE the attack.
Read more

ปรึกษา CLICK ME!

Cyber Range Click...

Cyber Range 

      Train with live cyberattacks on a cyber range.
Be prepared for the real ones. Hyper-Realistic Cyber Range Attack Simulation Cyberbit includes the world’s most advanced cyber range, available on-demand. Immerse your team in hyper-realistic, simulated attacks on the included cyber range to take their experience, skillset, and teamwork to the next level. Cyberbit’s live-fire cyber range simulations are the closest your team will get to a real-world incident. By training in cyber range exercises your team will excel, both technically and mentally, when the real attack takes place.
Read more

ปรึกษา CLICK ME!

Cyber Labs Click...

Cyber Labs

      Drive Skill and Knowledge Development to Build a Strong Cyber Foundation.

    The Complete Cyber Skills Development Cycle
Building your cybersecurity team’s skills starts with foundational building blocks: theory, tools, attacker tactics, soft skills and more. Each of our cyber labs delivers a specific building block to build individual skills in shorter training sessions.
 
    Following individual completion of Cyber Labs your team be prepared with a robust foundation, allowing them to proceed to live-fire cyber range exercises where they will practice and apply these skills as a team, in real-world, simulated incidents. 
Read more
Cyber Crisis Simulator Click...

Cyber Crisis Simulator

     Prepare for a cyber crisis like never before by bringing together your executive and Cyber Defense teams, to dynamic, collaborative exercises. 

The Only 360 Cyber Crisis Simulator
       When responding to a cyber crisis, the C-Suite no longer works in a silo. Executive management continuously collaborates with incident response and SOC teams to make well-informed decisions. But tabletop exercises and conventional crisis simulation platforms do not prepare for this new reality. Cyberbit is the only platform that delivers dynamically evolving, hyper-realistic crisis simulations that bring together executive teams and IR teams. This is the only approach that provides you with the confidence that your organization is fully prepared to respond to a cyber crisis, as one, perfectly functioning team.
Read more

ปรึกษา CLICK ME!

More

DATA CENTER & CYBER Security Service

บริการออกแบบ และ ย้าย DATACENTER

DATA CENTER & CYBER Security Service

DATA CENTER & RELOCATION SERVICE Click...

DATA CENTER & RELOCATION SERVICE

– DATA CENTER RELOCATION SERVICES
– SITE PREPARATION PLANNING
– BACKUP AND RECOVERY TESTING PLANNING
– RELOCATION POC PLANNING
– HARDWARE TEMPORARY / SPARE SYSTEM
– RELOCATION TEAM
– SITE PREPARATION
– TRANSPORTATION
– WARRANTY ,INSURANCE
Read more

ปรึกษา CLICK ME!

PHYSICAL AND INFORMATION SECURITY Click...

PHYSICAL AND INFORMATION SECURITY

     Providing design security systems for your physical security by using Building Access Control, Video Surveillanace / CCTV, Intrusion Detection Systems / Motion Detection, Crime Prevention. We offer a great design with Network Access Control (NAC), Firewall, WiFi Security, Enterprise Document Management System (EDMS) for your digital information security. Read more

ปรึกษา CLICK ME!

NETWORK CONSULTANCY SERVICES Click...

NETWORK CONSULTANCY SERVICES

  Network consultancy and design services by using the outstanding brand devices such as Cisco, Juniper, HP Procurve, and Extreme Networks, delivering high performance and flexibility that enable your network to highly speed and security. Our customers can be benefit from the flexibility in scaling systems provide which is most suitable for their business needs. Read more

ปรึกษา CLICK ME!

ENTERPRISE SERVER & STORAGE Click...

ENTERPRISE SERVER & STORAGE

SERVER PLATFORM: HP Servers, DELL Servers, IBM Server, Nutanix, Windows, Red Hat Linux
 
STORAGE PLATFORM:  HP StoreAll Storage, StoreOnce VSA, HP StoreVirtual VSA, 3PAR, HP StoreEver Tape EMC VNX, DELL Equal Logic, IBM Storwize V3700, IBM System Storage DS5000, IBM Storwize V7000

Read more

ปรึกษา CLICK ME!

CLOUD & VIRTUALIZATION SOLUTIONS Click...

VISUALIZATION SOLUTIONS

– SERVER CONSOLIDATION 
: VMware vSphere, Microsoft Hyper-V, Citrix
 
– CLOUD SOLUTIONS 
: VMware vCloud Suite , Microsoft Cloud Solution
 
– END USER COMPUTING [ EUC ]
: VMware Horizon Suite , CITRIX XenApp/XenDesktop , Microsoft VDI Solution

Read more

ปรึกษา CLICK ME!

BACKUP DATA AND DR-SITE Click...

BACKUP DATA AND DR-SITE

– Provide a backup and replication services for against data loss from disk failure, infected files, and damaged data and hacking.
 
– Provide world-class technologies such as Veeam Backup and Replication, VMware Backup Solutions, TRILEAD, Symantec, Data Domain, Unitrends, NAKIVO for customer and serve with tailored- made characteristics to fit customer’s needs
 
– Disaster Recovery Site Service is alternative/temporary office for your staff in the case that you can not access your head office. We provide up to 40 sq.m. per room equipped with Aircon, Network connectivity with 10 GbE uplink to your replicas via secured private VLAN.
 
– BACKUP&DISASTER RECOVER SOLUTIONS

BACKUP SOLUTIONS :Symantec Backkup Exec, Symantec Netbackup, Veeam Backup, Arcserve Backup
 
DISASTER RECOVER : VMware SRM, Storage Replication [ HP, EMC], Double Take

Read more

ปรึกษา CLICK ME!

PROFESSIONAL SERVICE Click...

PROFESSIONAL SERVICE

Consulting and MA Infrastructure
– Visualization: VMware vSphere , Microsoft Hyper-V
– Backup Solution: Symantec Backup Exec, Netbackup, Veeam
– Testing DR Plan & Consulting: DR Planning ,Documentation for DR,Testing, Restore data.

TOTAL NETWORK & SECURITY SOLUTIONS
– Local Area Network (LAN)
: Switching, Wireless, IP Phone from Cisco, HP Networking, Juniper, Cabling & UPS
 
– Wide Area Network (WAN)
:Router from Cisco HP Networking
:WAN Optimization product form Riverbed, Cisco , Blue Coat MACH5
 
-Network Security
Security Solutions
:Firewall, IDS, IPS Product Fortinet, Juniper, Cisco ASA, Palo Alto, Check Point
:Other Security Solution : Antivirus Solution, Log Management

Read more

ปรึกษา CLICK ME!

MICROSOFT SOLUTIONS Click...

MICROSOFT SOLUTIONS

Enterprise Microsoft Solutions
 
COMMUNICATIONS
: Microsoft Exchange
 
IDENTITY
: Microsoft AD
 
HIGH AVAILABILITY
: Microsoft Cluster SQL,Exchange

Read more

ปรึกษา CLICK ME!

MAINTENANCE SERVICES Click...

MAINTENANCE SERVICES

-MAINTENANCE SERVER
:Blade System HP, IBM, Dell
:Rack and tower HP, IBM, Dell
 
-MAINTENANCE STORAGE
:HP Storage, IBM System Storage, EMC, NetApp
 
-MAINTENANCE NETWORK DEVICE
:Cisco ,HP Networking ,Juniper,Allied Telesis
 
[SERVICE HIGHLIGHTS]
– Preventive Maintenance 4 time / year
– Solving problem of hardware
– Corrective Maintenance unlimited
–  Spare part
– Quarterly report
– Remote problem diagnosis and support Services uses electronic remote support tools  to isolate your problem and facilitate resolution.
– Onsite hardware support – For critical issues that cannot be resolved remotely, an engineer is sent to your site to return your covered hardware to operational condition, repairing or replacing components or entire units as necessary. Your coverage includes all required parts and materials.
– 6-hour repair-time commitment :We commits to correcting hardware malfunctions in less than 6 hours from your initial call to the Response Center; available up to 50 miles (80km) from a primary  office (8-hour commitment for systems located within 51-100 miles (81-160km) of a primary office).
– Round-the-clock coverage – Service is available 24x7x365

Read more

ปรึกษา CLICK ME!

More

DATA SECURITY & DESTRUCTION AND DATA DISTROY REPORT SYSTEM

Berry B Group Co., Ltd.
เราคือผู้แทนจำหน่าย ถูกแต่งตั้งอย่างเป็นทางการในไทย
ซอฟต์แวร์และฮาร์ดแวร์ใน การลบทำลายข้อมูลอย่างปลอดภัยบนอุปกรณ์สื่อบันทึกข้อมูล
เพื่อไม่ให้ข้อมูล สำคัญรั่วไหลออกจากองค์กร และมีออกรายงานการลบข้อมูลอัตโนมัติ
เพื่อให้สอดคล้องกับ PDPA และ ISO27001

ออกแบบระบบห้องทำลายข้อมูลดิจิทัลและบริการทำลายข้อมูลฐาวร

บริการทำลายข้อมูลดิจิตอลแบบถาวร ตามมาตราฐานสากลโดยผู้เชี่ยวชาญ ป้องกันไม่ให้ข้อมูลส่วนบุคคลรั่วไหล

บริการทำลายข้อมูลถาวรโดยมี Report สากลรองรับ

DATA SECURITY & DESTRUCTION (ทำลายข้อมูลถาวร)

Solutions & Service Click...

Storage & Loose Drives

  • Drive Erasure
  • Mobile Erasure Removable
  • Media Erasure
  • Virtual Machine Erasure
  • File Erasure (Window and Data Center)
  • LUN Erasure 
  • DISK Wiping
  • Magnetic Drive (Degausser)
    Organizations must have confidence in their ability to manage loose drive arrays and other large-scale storage systems, especially when erasure must be conducted securely, permanently, and at a high volume on the entire array, and to comply with a data retention policy.
 
Data Erasure Throughout The Data Lifecycle
Erase ROT (Redundant, Obsolete or Trivial) data on laptops, PCs, LUNs or VMs
– Erase temporary data – project files, sensitive client information, etc. in files, partitions or on-demand, or schedule file removal to run automatically through Group Policy / Task Scheduler
Erase data to meet retention policies – E.g. financial or other sensitive processing data (e.g. credit card information) that needs to be removed on a specific, ongoing basis from your systems; or remove data at the end of a specified time frame as required by legislation (e.g. HIPAA)

Read more

ปรึกษา CLICK ME!

Storage & Loose Drives Click...

Storage & Loose Drives

    Organizations must have confidence in their ability to manage loose drive arrays and other large-scale storage systems, especially when erasure must be conducted securely, permanently, and at a high volume on the entire array, and to comply with a data retention policy.
 
Data Erasure Throughout The Data Lifecycle

 

Erase ROT (Redundant, Obsolete or Trivial) data on laptops, PCs, LUNs or VMs
– Erase temporary data – project files, sensitive client information, etc. in files, partitions or on-demand, or schedule file removal to run automatically through Group Policy / Task Scheduler
Erase data to meet retention policies – E.g. financial or other sensitive processing data (e.g. credit card information) that needs to be removed on a specific, ongoing basis from your systems; or remove data at the end of a specified time frame as required by legislation (e.g. HIPAA)

Read more

ปรึกษา CLICK ME!

Enterprise Mobile Management Click...

Mobile Diagnostics & Erasure

     Powerful device diagnostics are critical to minimizing disruption and keeping your mobile-equipped workforce productive. And, when devices must be serviced or are at end-of-life, automation, diagnostics, accurate valuations, and certified data sanitization become essential capabilities to have in-house.
 
   Mobile Diagnostics & Erasure (BMDE) is purpose-built to process high volumes of mobile devices before they are discarded or enter the second-hand market.
 
    With BMDE, you get the fastest, most effective, and fully verified iOS & Android erasure on the market, as well as a full suite of easily configurable diagnostic tests to fit your organization’s needs.

Read more

ปรึกษา CLICK ME!

Laptop & Desktop Erasure for Enterprise Click...

Laptop and Desktop Erasure for Enterprise

    Organizations need assistance in ensuring effective data sanitization of their individual IT assets such as laptops and desktops (both Mac and PC), prior to redeployment, tech refresh, or re-sale/recycling. A chain of custody is essential for a compliant audit and reporting process.
 
    Enterprise Public and private sector enterprises must guard against data vulnerabilities, comply with numerous data protection regulations, efficiently use resources, and incorporate eco-friendly practices—all within a complex portfolio of IT assets.
 
     Our certified data erasure software performs at scale, eradicating data within active networks and across IT assets, from fleets of devices to multi-location data centers or cloud storage.
 
End-Of-Life Erasure Options
     Erase internal assets at end-of-life (EOL) for reuse, resale, recycling, or donation.
 
     Use customizable deployment options to suit your security settings, goals, and requirements across departments, locations, or regions. Drive Eraser using MSI preinstall, as well as through endpoint management systems such as Microsoft Endpoint Manager, ServiceNow and more.

Read more

ปรึกษา CLICK ME!

Data Retention Policies Click...

Data Retention Policies

      Your sensitive data has reached the end of its lifecycle – whether it’s been superseded or declared redundant, old or trivial (ROT), it needs to be removed from your storage mediums without compromising the integrity of either the data or the medium.

Read more

ปรึกษา CLICK ME!

Data Center Click...

Data Center

Server/RMA Drive Decommissioning
        Drive Eraser ensures easy and secure erasure on every drive, with customizable and auditable reports to achieve compliance. Hundreds of drives can be erased simultaneously and managed remotely from the Management Console, freeing up precious data center resources.

     Whether you’re planning an asset redeployment, technical refresh or a migration to the cloud, it’s vital to properly incorporate data erasure into your management process and keep control over your sensitive data assets until your servers or data centers have been decommissioned.

      Securely erase data on loose drives and enclosures. Hardware Solutions provide the most trusted approach for onsite data sanitization requirements using a quick and effective process.
 
A 3-year limited warranty and support are also available.

Read more

ปรึกษา CLICK ME!

Cloud Migration Click...

Cloud Migration

    Enterprises considering the transition to a hybrid or fully cloud-based working environment must take care to track the process—planning the move, reducing the data spread and establishing a chain of custody when eradicating redundant, obsolete or trivial (ROT) data before the changeover.
 
Data Erasure Throughout The Data Lifecycle
– Erase ROT (Redundant, Obsolete or Trivial) data on laptops, PCs, LUNs or VMs
 
– Erase temporary data – project files, sensitive client information, etc. in files, partitions or on-demand, or schedule file removal to run automatically through Group Policy / Task Scheduler
 
– Erase data to meet retention policies- E.g. financial or other sensitive processing data (e.g. credit card information) that needs to be removed on a specific, ongoing basis from your systems; or remove data at the end of a specified time frame as required by legislation (e.g. HIPAA)

Read more

ปรึกษา CLICK ME!

Certificate Of Erasure and Report Click...

Certificate Of Erasure and Report

       A comprehensive, digitally-signed and tamper-proof Certificate of Erasure, customizable according to your organization’s compliance and auditing needs, is generated.
 
      All activities are logged, ensuring absolute transparency and gapless security before and during the auditing process. Each report includes a digital signature for maximum security and to avoid tampering.
 
Manage, Enforce And Report Management Console
      Access a centralized reporting solution where you can manage all data erasure licenses, create and modify users, and have complete visibility of erasure activities. And, your organization will benefit from a centralized point of data management control with certified, tamper-proof audit reports.

Read more

ปรึกษา CLICK ME!

More

บริการทำลายข้อมูลดิจิตอลแบบถาวร ตามมาตราฐานสากลโดยผู้เชี่ยวชาญ ป้องกันไม่ให้ข้อมูลส่วนบุคคลรั่วไหล
ให้คำปรึกษา การทำลายข้อมูลแบบถาวร
Solutions :
Drive Erasure, Mobile Erasure Removable, Media Erasure, Virtual Machine Erasure ,File Erasure (Window and Data Center) ,LUN Erasure ,DISK Wiping , Magnetic Drive (Degausser)
โดยผู้เชี่ยวชาญ และ เป็นไปตามมาตราฐานสากล โดยมี Report*

ให้คำปรึกษาทั้งหน่วยงานภาครัฐและเอกชน ตามคุ้มครองข้อมูลส่วนบุคคล พ.ศ.2565 (PDPA)รวมถึงตามนโยบาย สกมช. และ
พรบ. การรักษาความมั่นคงปลอดภัยไซเบอร์ พ.ศ. ๒๕๖๒ อย่างเป็นทางการโดยผู้เชี่ยวชาญ

ปรึกษา Click me!

BERRY B GROUP CO., LTD.

ผู้นำเข้า-ผู้แทนจำหน่ายอย่างถูกต้องตามกฎหมาย ถูกแต่งตั้งประเทศไทย