DELTA LINE INTERNATIONAL FOR INFORMATION TECHNOLOGY · SOPHOS UTM UTM & Next-Gen Firewall Sophos...

28
DELTA LINE INTERNATIONAL FOR INFORMATION TECHNOLOGY WE DO THE INFORMATION TECHNOLOGY FOR YOUR BUSINESS

Transcript of DELTA LINE INTERNATIONAL FOR INFORMATION TECHNOLOGY · SOPHOS UTM UTM & Next-Gen Firewall Sophos...

DELTA LINE INTERNATIONALFOR INFORMATION TECHNOLOGY

WE DO

THE

INFORMATION

TECHNOLOGY

FOR YOUR

BUSINESS

ABOUT US

Delta Line International is leading IT Security Company over GCC, Since 2006 Delta Line has pioneered

the way of providing IT security with high quality of service and up to date technology. Delta Line has

built its reputation by focusing on two main points customer satisfaction and great relation with

partners. Currently Delta Line has two main branches in Riyadh and Dubai and looking forward to open

new branches soon.

WE BELIEVE THAT YOUR SECURITY IS OUR BUSINESS

WHY CHOOSE US?

Leading IT Security Provider Top Awarded partner

Quali�ed System Integrator Great Customer satisfaction

High Level Services 24/7 Support

Since its formation Delta Line has focused on the IT Security �eld and has invested in its team to build

great expertise and reputation, Currently Delta Line has reached a great level in this �eld with top level

expert team, Services and solutions.

OUR SERVICES

Consultancy Security Assessment Professional Services

Delta line o�ers businesses the

IT consultancy service through

advising them on how best to

use information technology to

meet their business objectives

and what they need to cover all

IT aspects and how to develop

their environment to follow

latest technology updates.

We help businesses to locate

their IT vulnerabilities and risks

to insure that all security aspects

are covered and all necessary

components are integrated, so

they can insure that their busi-

ness is protected. We also assist

them with our recommenda-

tions to solve these issues

Our team of experts is ready to

provide you professional servic-

es anytime and anywhere to

ful�ll your needs. We study, plan,

design, Implement and support

you to a level that exceeds you

expectations. Our team will

collaborate with you in every

step to achieve your goals.

OUR CLIENTS

Ministry of InteriorSaudi Arabia

Ministry of EducationSaudi Arabia

General Auditing BureauSaudi Arabia

Bureau of InvestigationSaudi Arabia

Border GuardsSaudi Arabia

Saudi Commission for Health Specialties

Ministry of Water and ElectricitySaudi Arabia

Ministry of Defense and AviationSaudi Arabia

Council of Saudi Chambers

Al Qassim MunicipalitySaudi Arabia

Al Jouf University

Jazan University King Abdulaziz and His Companions’ Foundation

for Giftedness and Creativity

Arab Open University RIYADH SCHOOLS

Al Qassim University

Sulaiman Al Rajhi Colleges Shaqra University Tabuk University Sanad Children's Cancer Support Association

Almarai Drake & Scull International

Emaar Riyadh metro

L'AZURDE Sipchem Bupa ARABIA INSURANCE COOPERATIVE COMPANY

Sky News Arabia Samba Al Tayyar Travel Group

AFRASSaudi Arabian Trading

& Contracting Company

Othaim Markets Al Tamimi & Company Al kaffary Group

Body Masters

Arab Engineers for Trading Company

Naseej Drive Dentsu ALAA For Industry

OUR PARTNERS

OUR SOLUTIONS

Endpoint Protection

KASPERSKY Endpoint Security for Business

SOPHOS Endpoint Protection

UTM & Next-Gen Firewall

SOPHOS UTM

FORTINET FortiGate

Secure Web Gateway

Websense TRITON AP-WEB

BLUECOAT ProxySG

SOPHOS Web Gateway

Secure Email Gateway

SOPHOS Email Gateway

FIREEYE Email Security

Websense TRITON AP-EMAIL

Data Backup

SYMANTEC Backup Exec

SYMANTEC Net Backup

Data Encryption

SOPHOS SafeGuard Encryption

Data Loss Prevention

BLUECOAT Data Loss Prevention

Websense DLP MODULE

Virtual application delivery

CITRIX XenDesktop

Load Balancing

A10 Thunder ADC

Mobile Control & Security

SOPHOS Mobile Control

Wireless Control & Security

SOPHOS Wireless protection

Patch Management

GFI LanGuard

Kaspersky Endpoint Security for Business

Kaspersky Total Security for Business delivers the most complete

platform of protection and management o�ered in the industry

today.

Kaspersky Total Security for Business secures every layer of your network and includes power-

ful con�guration tools to ensure your users are productive and free from the threat of malware,

regardless of device or location.

Anti-Malware & Firewall

App,Web and Device Control

Data Protection (Encryption)

Patch and License Management

Vulnerability Scan

File Server Security

Mobile Endpoint Security

Mail,Web and Collaboration

MAIN FEATURES:

LICENSING:

ENDPOINT PROTECTION

SOPHOS Endpoint ProtectionENDPOINT PROTECTION

Sophos Endpoint Protection makes it simple to secure your

Windows, Mac and Linux systems against malware and

advanced threats, such as targeted attacks.

Sophos next-generation endpoint protection integrates innovative technology like malicious

tra�c detection with real-time threat intelligence from SophosLabs to help you prevent, detect

and remediate threats with ease. We also add web �ltering, application control, device control

and more right into the lightweight endpoint agent, so your organization’s policies are enforced

anywhere your users go.

Web, Device, and Application control

Malicious tra�c detection

Patch assessment

Microsoft Exchange antispam and anti-malware

Anti-malware for network storage

Client �rewall

Data Loss Prevention

Mobile device management

MAIN FEATURES:

Enforce your web, application, device and data policies with ease, thanks to seamless integration

within the endpoint agent and the management console. Ì Web Control Category-based web

�ltering enforced on and o� the corporate network Ì Application Control Point-and-click block-

ing of applications by category or name Ì Device Control Managed access to removable media

and mobile devices Ì Data Control Data loss prevention (DLP) using prebuilt or custom rules.

Sophos Endpoint Protection is continually tuned for the best performance. The lightweight

agent keeps users secure without slowing them down. Protection updates are small— typically

under 30 KB—so updates are easy on your network and your endpoints.

COMPLETE CONTROL:

LIGHTNING PERFORMANCE:

SOPHOS UTMUTM & Next-Gen Firewall

Sophos UTM gives you complete security from the network

�rewall to endpoint antivirus in a single modular appliance.

It simpli�es your IT security without the complexity of multiple-point solutions. The intuitive

interface will help you quickly create policies to control security risks. And clear, detailed reports

will give you the insight you need to improve your network performance and protection.

SOPHOS UTM modular approach lets you add layers of protection as your needs evolve,Select the

modules that meet your needs:

UTM Network Protection: Stops sophisticated attacks that a �rewall alone can’t

UTM Web Protection: Lets you protect your employees from web threats and control

UTM Email Protection: Stops spam and viruses and keeps sensitive data safe.

UTM Web Server Protection: Hardens web servers and apps ensuring compliance with

UTM Wireless Protection: Gives you secure Wi-Fi in minutes.

Extend your security:

Sophos RED

Wi-Fi Access Points

VPN Clients

Free UTM Manager

Sophos iView

a web application �rewall.

their time online.

FORTINET FORTIGATEUTM & Next-Gen Firewall

Whether you need to deploy a High Performance Data Center Firewall, an Enterprise Next Gener-

ation Firewall or a smaller UTM device for your Distributed Enterprise site or Small Business, there

is a FortiGate physical or virtual appliance to �t your unique Network Security requirements

Fortinet’s Network Security Platforms can serve many di�erent roles in your enterprise network:

High Performance Firewalls for Data Centers

NGFW (Next Generation Firewall) for the Enterprise Edge

UTM (Uni�ed Threat Management) for Distributed O�ces

Deployment:

FW - includes high-speed Firewall and VPN

NGFW - includes Firewall, intrusion prevention and application control

ATP - includes advanced threat protection and endpoint control

WF - includes Web �ltering and explicit proxy

NGFW + ATP - includes NGFW and ATP features

UTM - includes all previously mentioned features plus email �ltering, data loss prevention,vulnerability scanning

FortiGate 3000 Series FortiGate 1000 Series

FortiGate 800-600 Series FortiGate 500-300 Series

Websense TRITON AP-WEB

TRITON AP-WEB provides a Comprehensive real-time protection

against Advanced Threats and data theft.

TRITON AP-WEB goes beyond anti-virus defenses by using eight defense assessment areas in a

composite scoring process that uses predictive analysis with the Websense® ACE (Advanced

Classi�cation Engine). Multiple real-time content engines analyze full web page content, active

scripts, web links, contextual pro�les, �les and executables.

Secure Web Gateway

Real-Time Analysis for Advanced Threat Protection:

The TRITON AP-WEB advanced threat dashboard provides forensic reporting on who was

attacked, what data was targeted, where the data almost went and how the attack was executed.

Security incidents include data theft capture when possible. Defenses analyze inbound and

outbound communications.

Easy Dashboard Access to Forensic Data:

Industry-leading integrated data theft defenses (optional) detect and intercept data theft

attempts and provide regulatory compliance for data loss prevention (DLP). Examples of these

capabilities include detection of custom encrypted uploads, password �le data theft, slow data

leaks (drip DLP), optical character recognition OCR (Optical Character Recognition) of text

within images and geolocation destination awareness

Integrated Data Theft Defenses:

Learn how to better protect your company’s assets by analyzing the behavior of malware

automatically with the integrated optional sandbox service.

Integrated Sandboxing:

BLUECOAT ProxySG

ProxySG appliances provide complete control over all your web tra�c—with robust features that

include user authentication, web �ltering, data loss prevention, inspection, and visibility of

SSL-encrypted tra�c (including the ability to stream decrypted content to an external server

with an Encrypted Tap license), content caching, bandwidth management, stream-splitting and

more.

Advanced web threat protection

Real-time web content ratings

On-demand cloud intelligence

Web 2.0 mashed up content �ltering

Social networking threat protection

True �le type checks

Compressed archive analysis

File and attachment �ltering

MAIN FEATURES:

Secure Web Gateway

Inline threat analysis (three AV)

Data loss prevention integration

Proxy avoidance blocking

Protocol method controls

Bandwidth management

Media stream splitting and caching

Acceleration and optimization

Transparent or Explicit deployment

Web, mobile web, and native application and operation controls

ProxySG 9000 ProxySG 600 ProxySG S500

SOPHOS Web Gateway

SOPHOS Secure Web Gateway prevents malware infections and gives you control over your

employees’ web use. Spyware and viruses are stopped before they can enter the network. And,

you can quickly create policies that set where and how employees spend time online.

Prevent infection with dual, independent antivirus engines

Enforce browsing quotas and time-based web sur�ng policies

Enhance policies with custom site categories using our innovative site tagging

Monitor web activity by users or department

Maintain privacy with anonymity in reports

Email scheduled reports directly to managers

Hardware, virtualized, software or cloud-based appliance

Highlights

Secure Web Gateway

Sophos purpose-built secure web gateway makes web protection simple. It provides advanced

protection from today’s sophisticated web malware and gives you full control over your employ-

ees’ online activity. You can easily create policies for individuals or groups while gaining important

insights into user activity on your network.

SOPHOS o�ers both dedicated Secure Web Gateway appliances and uni�ed next-gen �rewall

appliance options as well.

Sophos Web Appliance:

SOPHOS Email GatewaySecure Email Gateway

Secure your email gateway with Sophos UTM and get simple yet powerful protection from spam

and phishing attacks. And you can protect your sensitive emails from data loss with our built-in

DLP and encryption. Our intuitive browser-based interface with built-in reporting on all models

make it easy to manage your mail protection.

Advanced multilayer spam detection techniques

Detects the latest phishing URLs within emails

Dual-engine Live Antivirus with deep scanning of attachments

Unique SPX encryption with integrated DLP policy

UserPortal lets users manage spam and supports 15 languages

Hardware, virtualized, software or cloud-based appliance

Highlights

Secure your email from spam, phishing and data loss Our purpose-built secure email gateway is

an all-in-one solution for email encryption, DLP, anti-spam and threat protection. It provides

advanced protection from today’s sophisticated phishing attacks and gives you full control over

data leaving your organization via email.

SOPHOS o�ers both dedicated Secure Email Gateway appliances and uni�ed next-gen �rewall

appliance options as well.

Sophos Email Appliance:

FireEye Email Security

The FireEye® EX series secures against advanced email attacks. As part of the FireEye Threat

Prevention Platform, the FireEye EX uses signature-less technology to analyze every email attach-

ment and successfully quarantine spear-phishing emails used in advanced targeted attacks. With

all the personal information available online, a cybercriminal can socially engineer almost any user

into clicking a URL or opening an attachment. The FireEye EX series provides real-time threat

prevention for spear-phishing attacks that evade traditional defenses. The EX also delivers a new

level of threat prevention against blended attacks by working with the FireEye NX platform to

quarantine emails with malicious URLs and trace Web-based attacks back to the original

spear-phishing email.

Protects against spear-phishing email attacks

Integrates with the FireEye NX series to stop blended attacks across multiple threat vectors

Analyzes emails for threats, such as zero-day exploits, attacks hidden in ZIP/ RAR/TNEF

Deploys in active protection-mode as an MTA, or monitor-mode (SPAN/BCC)

Quarantines malicious emails with optional user noti�cations

Integrates with the FireEye cloudbased anti-virus and anti-spam protection engine for

Highlights:

Secure Email Gateway

archives, and malicious URLs

complete email security

Analyzes emails for threats, such as zero-day exploits, attacks hidden in ZIP/ RAR/TNEF

WEBSENSE TRITON AP-EMAILENDPOINT PROTECTION

TRITON AP-EMAIL stops advanced targeted attacks, identi�es

high risk users and controls Insider Threats.

The Websense ACE (Advanced Classi�cation Engine) is at the heart of all TRITON solutions and

identi�es malicious lures, exploit kits, emerging threats, botnet communications and other

advanced threat activity across the Kill Chain. This enables TRITON AP-EMAIL to identify the early

stages of an attack. With its powerful malware assessment capabilities that include a fully-inte-

grated, �le behavioral sandboxing, it can even identify Zero-day malware threats

Stop APT and other Advanced Targeted Threats:

To prepare for a malicious Insider Threat or the potentially successful cyber-attack, it’s vital that

outbound communications be monitored. This is also necessary both for data theft compliance

needs as well as for business requirements. Only Websense provides the technology to stop data

in�ltration and ex�ltration, with capabilities such as:

Secure sensitive data against external attacks and Insider Threats:

The rich data collections in TRITON AP-EMAIL are used by a number of policies to report and

identify systems that may require special IT attention. They generate a report on a number of

Indicators of Compromise to identify infected systems and more proactive reports on suspi-

cious behavior, or even ‘disgruntled employee’ activity as potential Insider Threats. User feed-

back capabilities help educate employees as mistakes are made, helping them to better learn

and understand safe email best practices.

Identify ‘high-risk’ user behavior and educate users to improve awareness:

OCR (Optical Character Recognition) scanning to identify sensitive data hidden in images

Encrypted �le detection to recognize custom encrypted �les designed to defy identi�cation.

Drip DLP monitoring to identify where sensitive data is leaked in small quantities over time.

such as scanned documents or screen shots.

Symantec Backup Exec

Symantec Backup Exec™ 2014 delivers powerful, �exible, and easy-to-use backup and recovery

to protect your entire infrastructure whether built upon virtual, physical, or a combination of

both. Using modern technology, Backup Exec backs up local and remote data to virtually any

storage device including tape, disk and cloud. Recovery is fast and e�cient. With a few simple

clicks, you can quickly search and restore granular �le or application objects, applications, VMs,

and servers directly from backup storage. Additionally, easily protect more data while reducing

storage costs through integrated deduplication and archiving technology.

Protect virtual and physical environments with a single solution.

Fast virtual machine snapshots.

Backup to disk, tape, and cloud.

Fast, e�cient, and versatile recovery that easily restores virtual machines, servers,

Integrated bare-metal, physical to virtual (P2V) and virtual to physical (V2P) recovery.

Flexible block-level data deduplication across your entire virtual and/or physical environment.

Automatically identify and protect new VMs as they appear so you can be assured your VMs

MAIN FEATURES:

Data Backup

applications, databases, �le/folders or granular objects in seconds.

are protected from day one.

Backup Exec Editions:

Symantec Backup Exec™ 2014 (per module - media server, agent and option)

Symantec Backup Exec™ 2014 V-Ray Edition (per occupied socket)

Symantec Backup Exec™ 2014 Capacity Edition (per front-end TB)

Symantec Backup Exec™ 2014 Small Business Edition (per server/virtual machine)

Symantec Backup Exec™ 2014 delivers powerful, �exible, and easy-to-use backup and recovery

to protect your entire infrastructure whether built upon virtual, physical, or a combination of

both. Using modern technology, Backup Exec backs up local and remote data to virtually any

storage device including tape, disk and cloud. Recovery is fast and e�cient. With a few simple

clicks, you can quickly search and restore granular �le or application objects, applications, VMs,

and servers directly from backup storage. Additionally, easily protect more data while reducing

storage costs through integrated deduplication and archiving technology.

Symantec NetBackupData Backup

Symantec NetBackup™ is built to protect the largest and most demanding data center environ-

ments. Engineered with Symantec™ V-Ray technology, NetBackup delivers breakthrough capabil-

ities for virtualized systems that go well beyond what traditional backup practices can achieve. A

single, intuitive management console reveals all backup and recovery activity, allowing consist-

ent policies and service levels to be enforced across the enterprise.

One platform, one console uni�es virtual and physical global data protection.

Uni�ed global management of snapshots, replicated snapshots, backup, and recovery.

Backup and appliance integrated, scalable global deduplication across virtual and physical.

V-Ray one pass backup, instant image and single �le restore for virtual and physical.

MAIN FEATURES:

Automated virtual data protection and load balanced backup performance.

NetBackup Appliance:

NetBackup 5230 Backup Appliance and the NetBackup 5030 Deduplication Appliance are enter-

prise appliances and changing how customers backup and recover in virtual and physical envi-

ronments. The NetBackup 5030 Deduplication and 5230 Backup Appliances have greater perfor-

mance and are built on a new, next generation hardware platform. This new platform supports

customers growing workloads and prepares for future NetBackup releases. In addition, the

Appliances deliver greater reliability, availability, and serviceability to further reduce the total

cost of ownership. Built on the strength of NetBackup software, these enterprise class appliances

continue to lead the purpose-built backup appliance (PBBA) market.

SOPHOS SafeGuard Encryption

Complete data protection across multiple platforms and devic-

es; securing your data without slowing you down

Ensures productivity by securing sensitive data wherever it is stored: laptops, USB devices,

Makes regulatory compliance easier with policy enforcement and reporting

Provides key management that lets authorized users share data securely and easily

Save time using the central console for data protection policy de�nition and management

Manages all devices in the organization from one place, including hard disks encrypted with

Uses latest processor technology to make sure that encrypted machines are faster than ever

Highlights:

Data Encryption

network shares or even in the cloud, with minimal impact on performance

BitLocker or FileVault 2 and Opal self-encrypting drives

SafeGuard Enterprise Modules:

Management Center

Device Encryption

Data Exchange

Encryption for Cloud Storage

Native Device Encryption

Encryption for File Shares

BLUECOAT DLPData Loss Prevention

Safeguard your sensitive company data.

Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quick-

ly and accurately, all while achieving industry and regulatory compliance. With Blue Coat DLP,

you can leverage powerful discovery capabilities to prevent sensitive, unsecured data from

traveling across the network and winding up in the wrong hands.

Blue Coat DLP is a highly scalable, single appliance solution. Using centralized management

features, you can easily create policies that analyze the data source, content, destination and

more. Best of all, you can install and start using key compliance and risk mitigation features in

one day.

With Blue Coat DLP, you can:

Identify and protect sensitive data from inappropriate distribution

Protect your organization and your brand

Track data with “�ngerprinting” capabilities

Monitor SSL tra�c across the web gateway

Reduce intentional or accidental data tampering

Install Blue Coat DLP in less than a day

WEBSENSE DLP MODULE

Stop data loss and theft, demonstrate compliance, and safeguard

brand, reputation, and intellectual property

Adopt cloud services like Microsoft O�ce 365™ and Box without fear of data theft.

Quickly deploy easy-to-use security controls for compliance and regulatory requirements

Identify sensitive data within images such as scanned data and screen shots.

Manage the Insider Threat by stopping data loss and proactively identifying high risk users.

Unify your security solutions, coordinate defense policies, share intelligence along multiple

Supports AP-WEB and AP-EMAIL

Data Loss Prevention

points and enjoy centralized management of your data security.

Gain visibility, control and security of inbound and outbound sensitive data by extending enter-

prise DLP capabilities to your Web and Email Channels.

TRITON AP-EMAIL

TRITON AP-WEB

From a damaged reputation to regulatory �nes and penalties, a data breach can have devastating

consequences. Websense DLP Module enables you to discover and protect sensitive data in the

Cloud or on-premise. Secure personal data, intellectual property and meet compliance require-

ments quickly, with custom or out-of-the-box policies by using Websense's unique DLP capabili-

ties to stop data theft.

Features & Bene�ts:

for auditors and executives.

Quickly deploy easy-to-use security controls for compliance and regulatory requirements

CITRIX XenDesktopVirtual desktop and application delivery

Citrix XenDesktop delivers Windows apps and desktops with the

best cost, performance and security for every business need.

With XenDesktop, your business is borderless. Give employees the freedom to work from

anywhere while cutting IT costs. With industry-leading XenApp built in, XenDesktop can deliver

full desktops or just apps to any device.

Citrix XenDesktop delivers virtual Windows apps and desktops as secure mobile services. With

XenDesktop, IT can mobilize the business, while reducing costs by centralizing control and

security of intellectual property. XenDesktop can deliver full desktops or just the apps to any

device. XenDesktop enables the delivery of a native touch-enabled mobile experience that is

optimized for the type of device, as well as the network. XenDesktop is built on a 3rd generation

FlexCast Management Architecture (FMA) and is the only hybrid cloud-ready platform that

separates the management plane from the workload to enable IT to securely deliver published

apps on-premises, and manage workers and mobile workspaces either on-premises or in the

cloud.

Main Features:

XenApp published desktops for maximum IT control and lowest cost

XenApp published apps for secure access to 5 generations of Windows apps on any device

VDI desktops for maximum personalization

VDI with Personal vDisk for maximum personalization with single image management

Hosted physical desktops when hypervisors aren't required

Remote PC Access for secure, direct connections to o�ce PCs

O�ine client virtualization for disconnected user requirementsrequired

A10 THUNDER ADC

Next-generation Application Delivery Controller

Load Balancing

A10 Thunder ADC product line of high-performance, next-generation application delivery

controllers enables customers' applications to be highly available, accelerated and secure.

Thunder ADC is a premier ADC product line, delivering performance scalability up to 150

Gbps, the broadest range of form factors (physical, virtual and hybrid), and expanded system

resources designed to support future feature needs.

Application Availability:

Highly available applications and data centers

Next-generation cloud data center evolution

Fast deployment and proven application con�guration and provisioning

Application Acceleration:

Application acceleration for a better user experience and infrastructure utilization

Virtualization for adc and slb consolidation

Full control and deep packet inspection (dpi) capabilities to solve complex problems

Security:

Enhance your data center security

Enhance, scale and optimize your existing dmz security infrastructure

Protect against the latest emerging threats

SOPHOS Mobile ControlMobile Control & Security

Complete management and security of mobile devices, content

and applications.

Manage your mobile devices, content, applications, and email, in addition to integrated antivirus,

anti-malware and web �ltering.

For IT professionals that want to enable mobility, Sophos Mobile Control (SMC) manages and

secures mobile devices, content, and applications. We take a user-centric approach, delivering

the simplest experience for users and administrators. SMC is the only Enterprise Mobility Man-

agement solution using a user-based approach while providing individual �le encryption on

mobile devices. Stop Bring Your Own Device (BYOD) from becoming an IT nightmare, and choose

the delivery model that suits your needs.

Highlights:

Single solution for all the latest mobile platforms

A simple role-based web console

Push out policies and apps over the air

Assign policies based on the users Active Directory groups

Regularly checks for device compliance

Mobile content on iOS devices

Filter web pages by category on Android devices

On-premise and SaaS deployment options

SOPHOS Mobile Control Modules:

Mobile Device Management

Mobile Content Management

Mobile Application Management

Mobile Email Management

Anti-malware and Web Filtering for Android

Controlled Network Access

OUR LOCATIONS

RIYADH OFFICE

Tahleya Street - Riyadh - Saudi Arabia

O�ce 701 - DAMAC Business Tower - Dubai - United Arab Emirates

DUBAI OFFICE

OUR CONTACTS

UAE: +971 4 4200563KSA: +966114603027

KSA: +96612936282 UAE: +971 4 4200458

[email protected]

www.deltaline-it.com

/DeltaLineInt

/DeltaLine

[email protected]

www.deltaline-it.com

Tahleya Street, Riyadh, KSA

Business Bay, Dubai, UAE

KSA: +966 114603027UAE: +971 44200563

CONTACT US

DELTA LINE INTERNATIONAL