Customer Support Portal Login

If you have any questions, Send us Email sales@noorgroupco.com

IT Solutions

NOOR GROUP will analyze and plan IT infrastructure that will suit your IT needs. We will improve the effectiveness of your technology strategy and operations. Consultation will be provided from architecture planning, business impact, application development, network design and security. NOOR GROUP consultation will ensure your solution will be optimized by analyzing and improving the effectiveness of your IT structure. We will suggest the best engineered networking solutions by using either a single source or a combination of 3rd party and custom resources and products that will best fit your network environment.

Our Products & Services
  Antivirus & Firewall Solutions

Antivirus Solution:
Antivirus is a term used to describe a computer program that attempts to identify, neutralize or eliminate malicious software. Designed exclusively to combat computer viruses; however most modern antivirus s is now designed to combat a wide range of threats, including worms, phishing attacks, root kits, Trojan horses and other malware. Antivirus software typically uses two different techniques to accomplish this: Examining (scanning) files to look for known viruses matching definitions in a virus dictionary. Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods
Firewall Solution:
Firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ). Intrusion Detection & Protection Solution:

1- An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (Viruses, Trojan horses, and Worms).

2- An IDS is composed of several components: Sensors which generate security events, a Console to monitor events and alerts and control the sensors, and a central Engine that records events logged by the sensors in a database and uses a system of rules to generate alerts from security events received. There are several ways to categorize an IDS depending on the type and location of the sensors and the methodology used by the engine to generate alerts. In many simple IDS implementations all three components are combined in a single device or appliance.

[Close Layer]

  Encryption Solution:
Encryption Solution

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. software for encryption can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

[Close Layer]

  Internet Proxy Solution:
Internet Proxy Solution

In computer networks, a proxy is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible.

Types and functions:
» Caching proxy server
» Web proxy
» Anonym zing proxy server
» Hostile proxy
» Intercepting proxy server
» Transparent and non-transparent proxy server
» Forced proxy
» Open proxy server
» Split proxy server
» Reverse proxy server
» Circumventor
» Managed 'clean-pipe' proxy servers

[Close Layer]

  Network Solution:
Networking Services

The development of new networking technologies requires increasingly specialized expertise. New services such as e-Commerce, Voice over IP (VOIP), multimedia, Virtual Private Networks (VPNs), multicasting and videoconferencing offer tremendous efficiencies in business processes. However, they also make new demands for scalable, reliable, high performance network designs. Our Networking Services are designed to maximizing your Return on Investment (ROI) while minimizing your Total Cost of Ownership (TCO).

Networking Services are:
» IP Address Management Services
» Network Design and Architecture Services
» Network Assessment Services
» Network Implementation Services
Lan Solution:
Local Area Network (LAN) is a computer network covering a small geographic area, like a home, office, or groups of buildings e.g. a school.
WAN Solution:
Wide Area Networks (WANs), include their much higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines.
WLAN Solution:
Wi-Fi is a wireless technology brand owned by the Wi-Fi Alliance intended to improve the interoperability of wireless local area network products based on the IEEE 802.11 standards. Common applications for Wi-Fi include Internet and VoIP phone access, gaming, and network connectivity for consumer electronics such as televisions, DVD players, and digital cameras.
The Wi-Fi Alliance is a consortium of separate and independent companies agreeing to a set of common interoperable products based on the family of IEEE 802.11 standards. The Wi-Fi Alliance certifies products via a set of established test procedures to establish interoperability. Those manufacturers that are members of Wi-Fi Alliance whose products pass these interoperability tests can mark their products and product packaging with the Wi-Fi logo. [Close Layer]

   Unified Communications Solutions:
Unified Communications Solutions

VoIP/IPT:
Voice over Internet Protocol (VoIP) is a protocol optimized for the transmission of voice through the Internet or other packet switched networks. VoIP is often used abstractly to refer to the actual transmission of voice (rather than the protocol implementing it).
Call Center / IPCC:
A call center is a centralized office used for the purpose of receiving and transmitting a large volume of requests by telephone. A call center is operated by a company to administer incoming product support or information inquiries from consumers. Outgoing calls for telemarketing, clientele, and debt collection are also made. In addition to a call center, collective handling of letters, faxes, and e-mails at one location is known as a contact center.
A call center is often operated through an extensive open workspace for call center agents, with work stations that include a computer for each agent, a telephone set/headset connected to a telecom switch, and one or more supervisor stations. It can be independently operated or networked with additional centers, often linked to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice and data pathways into the center are linked through a set of new technologies called computer telephony integration (CTI).
Most major businesses use call centers to interact with their customers. Examples include utility companies, mail order catalogue firms, and customer support for computer hardware and software. Some businesses even service internal functions through call centers. Examples of this include help desks and sales support
CTI Application:
Computer telephony integration (CTI) is technology that allows interactions on a telephone and a computer to be integrated or coordinated. As contact channels have expanded from voice to include email, web, and fax, the definition of CTI has expanded to include the integration of all customer contact channels (voice, email, web, fax, etc.) with computer systems.
Call recording Systems:
Call recording software or call logging software allows a party to record a telephone conversation, either PSTN or VoIP to a digital file format, usually in wav or mp3.
Advanced Level of IPCC Consultancy:
Integrate your CRM functions (marketing, sales, e-commerce, service, and support) across communications channels (telephone, Web, and e-mail).
Solution Benefits:
Improved customer satisfaction levels—reduced queue wait time, no repeat questions, and right first-time contact Increased revenue generation—integrating cross-sell and up-sell opportunities into marketing campaigns, fewer discarded shopping carts, more first contact closes Dramatic operating cost reductions efficient use of agent and call center resources Ability to extend beyond traditional call center environments to use of branch offices and home agents Tested, managed, end-to-end customer contact solutions from AVAYA,LUCENT & many other vendors. Migration to multi-channel and multi-site customer contact.
[Close Layer]

  Storage Solutions
DAS:
Direct-attached storage (DAS) refers to a digital storage system directly attached to a server or workstation, without a storage network in between. Mainly used to differentiate non-networked storage from SAN and NAS.
SAN:
In computing, a storage area network (SAN) is an architecture to attach remote computer storage devices (such as disk arrays, tape libraries and optical jukeboxes) to servers in such a way that, to the operating system, the devices appear as locally attached. Although cost and complexity is dropping, as of 2007, SANs are still uncommon outside larger enterprises.
By contrast to a SAN, network-attached storage (NAS) uses file-based protocols such as NFS or SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block.
NAS:
Network-attached storage (NAS) is a file-level computer data storage connected to a computer network providing data access to heterogeneous network clients.
Disaster Recovery Solution DRS:
Disaster Recovery is the process, policies and procedures of restoring operations critical to the resumption of business, including regaining access to data (records, hardware, software, etc.), communications (incoming, outgoing, toll-free, fax, etc.), workspace, and other business processes after a natural or human-induced disaster.
To increase the opportunity for a successful recovery of valuable records, a well-established and thoroughly tested data recovery plan must be developed. This task requires the cooperation of a well-organized committee led by an experienced chairperson.
A disaster recovery plan (DRP) should also include plans for coping with the unexpected or sudden loss of communications and/or key personnel, although these are not covered in this article, the focus of which is data protection. DRP is part of a larger process known as business continuity planning (BCP).
[Close Layer]

  Microsoft Solutions
Active Directory:

Active Directory (AD) is an implementation of LDAP directory services by Microsoft for use primarily in Windows environments. Its main purpose is to provide central authentication and authorization services for Windows based computers. Active Directory also allows administrators to assign policies, deploy software, and apply critical updates to an organization. Active Directory stores information and settings in a central database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects. Active Directory was previewed in 1996, released first with Windows 2000 Server edition, and revised to extend functionality and improve administration in Windows Server 2003. Additional improvements were made in both Windows Server 2003 R2 and Windows Server 2008. Active Directory was called NTDS (NT Directory Service) in older Microsoft documents. This name can still be seen in some AD binaries. There is a common misconception that Active Directory provides software distribution. Software distribution is run by a separate service that uses additional proprietary schema attributes that work in conjunction with the LDAP protocol. Active Directory does not automate software distribution, but provides a mechanism in which other services can provide software distribution.

Exchange:
Microsoft Exchange Server is a messaging and collaborative software product developed by Microsoft. It is part of the Microsoft Servers line of server products and is widely used by enterprises using Microsoft infrastructure solutions. Exchange's major features consist of electronic mail, calendaring, contacts and tasks, and support for the mobile and web-based access to information, as well as supporting data storage.
SMS
Microsoft Systems Management Server (SMS) is a systems management software product by Microsoft for managing large groups of Windows-based computer systems. SMS provides remote control, patch management, software distribution, and hardware and software inventory. An optional feature is operating system deployment which requires the installation of the SMS 2003 OS Deployment Feature Pack. The current version is 2003 SP3 R2.
Consultation
NOOR GROUP will analyze and plan IT infrastructure that will suit your IT needs. We will improve the effectiveness of your technology strategy and operations. Consultation will be provided from architecture planning, business impact, application development, network design and security. NOOR GROUP consultation will ensure your solution will be optimized by analyzing and improving the effectiveness of your IT structure. We will suggest the best engineered networking solutions by using either a single source or a combination of 3rd party and custom resources and products that will best fit your network environment.
NOOR GROUP consultancy unit offers extensive know-how and accumulated experience of dozens of experts in a wide variety of areas, and with all the convenience and flexibility characterizing the outsourcing business model. Based on well known of Saudi market, and on their cutting edge knowledge in the field, NOOR GROUP consultancy unit offers a number of possible paths for collaboration, answering to each client's specific needs. NOOR GROUP consultancy solutions are based on international methodologies adapted to the needs of the local market, guaranteeing the success of every project and the ability to adhere to the highest service standards each client demands.
To increase the opportunity for a successful recovery of valuable records, a well-established and thoroughly tested data recovery plan must be developed. This task requires the cooperation of a well-organized committee led by an experienced chairperson.
A disaster recovery plan (DRP) should also include plans for coping with the unexpected or sudden loss of communications and/or key personnel, although these are not covered in this article, the focus of which is data protection. DRP is part of a larger process known as business continuity planning (BCP).
[Close Layer]

Our Consultancy Services

Using the Noor's Consultancy Framework of Assess, Analyze and Recommend our local, world-class, expert consultants. Our Consultancy Services.

  • CCTV Security System
  • Fire Protection
  • Digital Telephony
  • Data Center Design
  • Voice & Video Over IP
  • Fiber Optic Solutions
  • Ip & Wireless Serivce
  • Internal Network
Contact Us

Abu Oubaidah Ibn Al Jarrah, Al Fayha, Riyadh,
Kingdom of Saudi Arabia
Tel: +966 11 5059647
Fax: +966 11 5059647
Email:sales@noorgroupco.com