BUSCA Y POSTULATE EN NUESTRAS VACANTES DISPONIBLES

1Entra a nuestro sitio web.
2 Llena tus datos y/o envía tu Curriculum.

www.amauta.mx/staffing

Amauta Staffing

DIGITAL INNOVATION

IoT – Roambee

Solution based on IoT, which gives us visibility from start to end of the supply chain worldwide - Within the locality, outside the locality and in transit.

Solutions for Improvement of Efficiency:

  • Monitoring from start to finish at the product level.
  • Diagnosis of asset utilization..
  • Use of the warehouse.

Solutions for security:

  • Monitoring from start to finish to prevent fraud.
  • Diagnosis of recovery in the field..
  • Recovery in the field and in storage.

Solution for Monitoring Conditions:

  • Prevention of damage to goods that are in transit.
  • Monitoring from start to end of the cold chain..
  • Know in advance anything and everything that can interrupt a single shipment or your entire supply chain.

IoT – PTC

ThingWorx enables industrial innovation, ThingWorx is the industry's leading platform for industrial innovation that has been designed to rapidly provide IIoT (Industrial Internet of Things) applications and augmented reality (AR) experiences that unlock the value of convergence between the world physical and the digital world.

It is proven that the ThingWorx platform accelerates industrial innovation, which includes the rapid development of industrial IoT applications, AR experiences and much more. It includes technologies and tools that allow industrial companies to quickly and easily develop, implement and expand IoT applications and revolutionary AR experiences.

ThingWorx offers the flexibility to be implemented in different ways and is supported by a dynamic ecosystem of partners.

Artificial intelligence

Machine Learning

High level description of the project:

The period of time established to achieve the objectives of the project is 6 months, based on an initial estimate.

AuraPortal has optional modules such as APBI (AuraPortal Interactive Business Intelligence). It is a very friendly module of reports, which does not require a technical knowledge for its use, especially oriented to business users. Another optional module is the Workflow for External Users, This module allows the External User Tasks to be directly linked, that is, these users can send tasks to each other without the need for an employee to intervene. Without this module, an employee must always intervene through a Task.

Process automation

Automation without code, statistics simulation, dynamic editor.

Analysis and decision making

Native Reports & Deep BI, Integration with Tableau, Intelligent Analytics.

Data model and relation of records

Management of relational records, business rules.

AuraPortal cuenta con módulos opcionales como APBI (AuraPortal Interactive Business Intelligence). Es un módulo muy amigable de reportes, que no requiere de un conocimiento técnico para su uso, especialmente orientado a usuarios de negocio. Otro módulo opcional es el Workflow para Usuarios Externos, Este módulo permite que las Tareas de Usuarios Externos estén directamente vinculadas, es decir, estos usuarios pueden enviarse tareas entre sí sin necesidad de que intervenga un empleado. Sin este módulo, un empleado siempre debe intervenir por medio de una Tarea.

Security

IBM Security Intelligence

What is IBM Security Intelligence?

IBM Security Intelligence is a continuous monitoring in real time, responsible for collecting, normalizing and analyzing data generated by users, applications and infrastructure. The objective of this monitoring is to generate relevant information derived from the security analysis of all the collected data.

BM QRadar Security Intelligence is a security platform that integrates log management, SIEM, anomaly detection, vulnerability management, configuration management and forensic analysis functions in a unified solution.
Through the application of intelligence, integration and automation, it provides a 360 ° view of the infrastructure with real-time threat detection, simple administration and low cost of ownership.

IBM SECURITY QRADAR SIEM

How long does your company take to detect a security breach?

20% of companies hacked, it takes more than 2 years to discover the security breach they suffered and 20% is unable to locate the moment the attack began.

QRadar SIEM is an event correlator, performs immediate normalization and correlation of event logs, network flows, user activity and vulnerabilities. It generates a complete 360 ​​° view of what happens in the infrastructure and provides an automatic detection of security incidents and warnings.

IBM SECURITY QRADAR INCIDENT FORENSICS

How long does it take my company to resolve a security breach?

55% of hacked companies can not identify the location of the violation and it takes up to 2 years to resolve the consequences of the violation.

QRadar Incident Forensics allows you to conduct and conduct minor investigations of security incidents, reducing the time it takes for security teams to investigate an incident and respond before the business is affected. It offers clarity about what happened, who is involved and what data has been transferred or accessed.

IBM SECURITY QRADAR VULNERABILITY MANAGER

Can you predict and prioritize security weaknesses before criminals?

QRadar Vulnerability Manager discovers vulnerabilities, configuration errors and dangerous defaults proactively. Prioritizes vulnerabilities to direct remediation efforts and decrease risk.

Unlike autonomous tools, this solution provides vulnerability management features that allow the consolidation of other analysis tools and have a unique view of the position of the organization in the face of vulnerabilities.

IBM SECURITY RISK MANAGER

Monitors network topology configurations, switches, routers, firewalls and intrusion prevention systems (IPS) to reduce risk. Simulates changes in configurations and attacks to the network to evaluate the impact of these on security. Correlates vulnerabilities with network configuration and traffic to identify current attack routes and high-risk assets and provides network topology and connection visualization tools to observe current and potential network traffic patterns.

IBM SECURITY RISK MANAGER

Monitors network topology configurations, switches, routers, firewalls and intrusion prevention systems (IPS) to reduce risk. Simulates changes in configurations and attacks to the network to evaluate the impact of these on security. Correlates vulnerabilities with network configuration and traffic to identify current attack routes and high-risk assets and provides network topology and connection visualization tools to observe current and potential network traffic patterns.

IBM SECURITY QRADAR LOG MANAGEMENT

Do you have to comply with any regulations that require the management of your logs?

QRadar Log Management is a system for collecting, normalizing and storing large volumes of events. Supports a wide variety of network devices, routers, switches, IPS / IDS, firewalls, databases, antivirus, servers, mail applications, web applications, etc. Helps create audit reports for compliance.

Artificial Intelligence Solutions

Intuitive APIs

Intuitive APIs

Transform your business by adding cognitive functionalities to your applications and services. Discover the Watson APIs for language, vision, voice and data.

Cloud infrastructure for cognitive computing

Cloud infrastructure for cognitive computing

Improve your IT infrastructure to support cognitive workloads. Improve cloud solutions to manage peak data growth and high-performance analytics processing.

AI for the company

AI for the company

Get deeper knowledge adapted to your business using systems that can reason and learn. Analyze and interpret large amounts of data to be able to exploit them and boost the growth of your business.

TOP