The Most Comprehensive Suite of Security Services and Solutions in the Market

Similar documents
Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Best Practices in Securing a Multicloud World

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Background FAST FACTS

Sirius Security Overview

to Enhance Your Cyber Security Needs

CYBER RESILIENCE & INCIDENT RESPONSE

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Continuous protection to reduce risk and maintain production availability

locuz.com SOC Services

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SECURITY SERVICES SECURITY

BHConsulting. Your trusted cybersecurity partner

SYMANTEC DATA CENTER SECURITY

Run the business. Not the risks.

IT Consulting and Implementation Services

TRUE SECURITY-AS-A-SERVICE

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Security Communications and Awareness

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

SOLUTION BRIEF Virtual CISO

Accelerate Your Enterprise Private Cloud Initiative

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Sage Data Security Services Directory

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

DATACENTER SERVICES DATACENTER

BHConsulting. Your trusted cybersecurity partner

Cognizant Cloud Security Solution

Securing Your Digital Transformation

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

RSA NetWitness Suite Respond in Minutes, Not Months

Securing Digital Transformation

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Modern Database Architectures Demand Modern Data Security Measures

SIEMLESS THREAT DETECTION FOR AWS

SIEMLESS THREAT MANAGEMENT

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Security. Made Smarter.

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Data Sheet The PCI DSS

HP Fortify Software Security Center

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

VMware Cloud Operations Management Technology Consulting Services

Global Security Consulting Services, compliancy and risk asessment services

Designing and Building a Cybersecurity Program

Security in India: Enabling a New Connected Era

Supporting the Cloud Transformation of Agencies across the Public Sector

CipherCloud CASB+ Connector for ServiceNow

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Consolidation Committee Final Report

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

ISE North America Leadership Summit and Awards

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

From the eyes of a customer

One Hospital s Cybersecurity Journey

Cybersecurity. Securely enabling transformation and change

Better skilled workforce

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Incident Response Services

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

in PCI Regulated Environments

HCL GRC IT AUDIT & ASSURANCE SERVICES

GDPR: An Opportunity to Transform Your Security Operations

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

IoT & SCADA Cyber Security Services

White Paper. How to Write an MSSP RFP

Transforming IT: From Silos To Services

THE ACCENTURE CYBER DEFENSE SOLUTION

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

NEXT GENERATION SECURITY OPERATIONS CENTER

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Department of Management Services REQUEST FOR INFORMATION

Traditional Security Solutions Have Reached Their Limit

Cybersecurity Protecting your crown jewels

Symantec Security Monitoring Services

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Infoblox as Part of the Ecosystem

The Resilient Incident Response Platform

What It Takes to be a CISO in 2017

Welcome ControlCase Conference. Kishor Vaswani, CEO

Automating the Top 20 CIS Critical Security Controls

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Data Management and Security in the GDPR Era

align security instill confidence

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Security Communications and Awareness

Reinvent Your 2013 Security Management Strategy

Transcription:

LINE CARD Security Solutions SECURITY SOLUTIONS The Most Comprehensive Suite of Security Services and Solutions in the Market With a full suite of service capabilities, Optiv is positioned to help you define your strategy, identify threats and risks and help you deploy the right technology to secure your business. Our services are targeted to meet your specific information security project needs or address your organization s broader strategic requirements. SECURITY PROGRAM STRATEGY The evolving threat landscape continues to elevate information security priority and visibility within organizations. For security leaders, it is imperative to align operation excellence and security priorities, meet business objectives and articulate a clear vision of how the security program maps to the realities of the business. By leveraging Optiv s security program strategy services, you will be better equipped to plan, build and run a business aligned and threat aware security program. Security Program Strategy Security Strategy Enterprise Security Program Executive Workshops Executive Consulting and Staffing Virtual, On-Demand and Staffed CISO Security Communications and Awareness Executive Vulnerability Security Awareness Training with CyberBOT Security Awareness Circuit Training (SACT) CLOUD SECURITY As public, private and hybrid cloud environments gain traction among enterprises looking to scale and achieve agility and flexibility, organizations must understand the associated risks and responsibilities and apply a holistic cloud security program across their enterprise. Optiv can help you define, architect and operate cloud security at scale so you can grow your organization with confidence. Our comprehensive suite of cloud security solutions provides you the tools to develop, enhance and mature your cloud security program. Cloud Security Architecture Program (private/vmware NSX, hybrid or public AWS/Azure cloud environments) Embedded Cloud Security Architect Microsoft Office 365 Security Micro Service and Container Security Strategy (Docker) Micro-Segmentation Services Cloud Access Security Broker Services Implementation and Integration Services (Palo Alto Networks, VMware, Symantec Elastica, Netskope) Embedded Cloud Security Architect Program Governance and Managed Cloud Security Services (Armor)

RISK AND COMPLIANCE MANAGEMENT Our security risk and compliance management services are designed to address regulatory requirements, industry standards and security program goals to efficiently measure and manage ongoing risk and compliance initiatives. We can also augment your staff with our resident advisors to help accomplish your daily objectives. Our expert consultants provide the following: Risk and Compliance Management Information Security PCI Healthcare Information Security Controls Information Security Maturity Information Security Risk Information Security Gap Analysis Policy and Development Capabilities Risk Management Consulting Readiness Review Gap Analysis PCI Risk Self- Questionnaire (SAQ) Guidance Scope Reduction Strategy PCI DSS Report on Compliance (ROC) SAQ Payment Application PA-DSS Validation Experian EI3PA ASV Scanning PCI Application s and Penetration Testing PCI Staff Augmentation PCI Program Development, Management and Support Healthcare Controls Healthcare Policy Review/Development HIPAA/HITECH Security Rule Gap Analysis HIPAA/HITECH Risk Analysis HIPAA Privacy Rule Meaningful Use Testing Technical Controls HIPAA Compliance Consulting Business Associate Reviews GRC Third-Party Risk Management Other Services GRC Health Services GRC Program Readiness GRC Strategic Roadmap Quick Start Service GRC Platform Configuration and Deployment Integration Services Post Implementation Support GRC Training and Education (RSA, LockPath, MetricStream, RSAM) TPRM Program TPRM Program Development TPRM Discovery and Analysis TPRM Risk Third-Party Risk-as-a-Service enabled by Optiv Evantix Data Centric Consulting Data Discovery Services Data Lifecycle Analysis Policy

APPLICATION SECURITY Optiv provides a comprehensive suite of solutions to mature clients application security programs to discover unknown vulnerabilities, reduce data breaches and shorten the time to remediate. Our team of experts have built a field-tested methodology that offers a tailored solution to each client use case through research, application profiling, threat analysis, work plan creation, manual testing blocks and high frequency reporting. Web Application s Mobile Application s Threat Modeling Web Application Penetration Testing DevOps Security and Automation Code Review SDL/SDLC Review and Implementation Smoke Testing Architecture and Secure Design IDENTITY AND ACCESS MANAGEMENT We offer comprehensive, integrated IAM solutions to address all of your identity needs. Our IAM solutions advisors leverage a suite of services that include workshops and assessments, implementation and integration and program governance, as well as technologies developed by Optiv and leading IAM vendors. Our goal is to create customized solutions that help you plan, build and run strategic IAM programs. Our dedicated team of IAM experts deliver the following services: Strategic Consulting Strategy Workshop Role Compliance Identity Management Readiness Technology Health Checks (Ping Identity, RSA, CyberArk, SailPoint) Program Governance Technology Selection and Sourcing Implementation and Integration Services (Ping Identity, RSA, CyberArk, SailPoint, Lieberman Software, BeyondTrust, Okta, SecureAuth, STEALTHBits, Varonis and Microsoft FIM/MIM) Architecture Development and Design Support Product Installation Implementation and Engineering Support Customization Management Quick Start Implementations (Ping Identity, RSA, CyberArk) Optiv Developed Technology Vendor Integrations Ping Identity Integration Kits: SiteMinder, Axiomatics, HitachiID RSA SecureID Suite Integration Kits: CyberArk, Microsoft Office 365 Migration Tools Legacy WAM (Oracle Access Manager and Siteminder) to PingAccess Extensions and COTS Enhancements RSA SecureID Access Manager and L&G Custom Integration and Extensions Unix Access Governance Tool

SECURITY OPERATIONS The evolving threat landscape means organizations are increasingly investing in advanced security technologies to effectively predict, prevent, detect and respond to threats. Having a trusted partner that can help with the management, monitoring and orchestration of these disparate tools is a growing necessity, especially given the industry talent shortage. Optiv has the partnerships, teams, skills and services to help our clients with all areas of their security operations. Managed Security Services Co-Managed SIEM (IBM, McAfee, LogRhythm, Splunk) Hosted SIEM (LogRhythm) Platform Management (Blue Coat, Check Point, Cisco, F5, Fortinet, HPE, McAfee, Juniper Networks, Palo Alto Networks, Pulse Secure) Endpoint Management (McAfee) Vulnerability Management (Qualys) Managed Detection and Response (Carbon Black) Cyber Threat Intelligence-as-a-Service (IntSights) Tailored Solutions Authorized Support Technical support for select products across the following vendors: Blue Coat Check Point F5 Networks Fortinet McAfee Juniper Networks Palo Alto Networks Pulse Secure Enterprise Incident Management Next-Gen Orchestration and Analytics Prepare: Plan and Build Strategy/Program Development Incident Response (IR) Planning and Readiness Incident Management Playbooks IR Tabletop Exercises IR Training IR Retainer Respond: During/Post Incident Incident Response Forensics Malware Reverse Engineering Maintain: Always On Experts On-Call and Available 24X7X365 Incident Response Cyber Threat Intelligence Services are under development. Please contact info@optiv.com with any inquiries. Next-Gen SOC Consulting Services Orchestration and Automation Solutions Advanced Intelligence and Security Analytics Program Development Workshops Consulting Services Cyber Threat Intelligence-as-a-Service (IntSights) Attack and Penetration Vulnerability Services Public Information Profile Vulnerability Scan 0-Day Vulnerability Detection Vulnerability Social Engineering Wireless Security Voice Over IP War Dialing Physical Security Penetration Testing Services Targeted Penetration Test Comprehensive Penetration Test Physical Security Penetration Test Product Penetration Test Breach Simulation Services Remote Breach Simulation On-site Breach Simulation

FOUNDATIONAL SECURITY Through thousands of engagements with clients from across vertical industries, our highly skilled teams navigate complex environments applying proven methodologies and industry best practices to help ensure invested technologies are optimized for full utilization. With our expertise, experience, business-driven approach and client-first culture, you can rest easy knowing you have a solid foundation for your overall security program. We offer deep and diverse skills, significant expertise in testing and deploying nearly any technology, and a unique ability to help you select the right solution for your environment. Our organization has established Centers of Excellence to provide superior service across the following domains: Application Security Data Security Application Performance A pplication Security Email Security Web Security Network Security Security Intelligence DLP Endpoint Suites Firewall SIEM and Logging Database Encryption Advanced Malware DNS/DHCP/IPAM Search and Analytics Database Application Control Mobile Device Management Threat Intelligence PKI W eb Application Firewall Endpoint Security Encryption Network Access Control Host IPS Asset Management Vulnerability Management Network IPS Behavioral Analytics Network Security Monitoring Network Malware Wireless Identification and Selection Determine the most appropriate technology for your dynamic business and technical requirements. Implementation Full integration services that include custom configurations, documentation and knowledge transfer. Proof of Concept A limited implementation into your testing environment to validate product features and functionality, and to gain hands-on experience prior to your implementation. Upgrade Upgrade or replace your existing hardware or software with the latest version to improve functionality and stability. Design Optimize system configuration with our technology implementation design. We can also assist with your wireless design needs by conducting a wireless site survey. Quick Start Deploy new technologies into your existing environment using a standard Quick Start configuration. Migration Seamlessly move from your existing platform to your new technology, and receive documentation and knowledge transfer. Health Check A high-level review of your current technology solutions complete with recommendations for improvement. Optimization Increase effectiveness of your equipment through our technology specific optimization services that include recommendations on operational process, personnel, training and configuration. Integration Integrate two or more different products to work together synergistically, improving your overall security posture. Technology Support Frontline technology product support from our highly skilled, certified security engineers that act as a single point of contact for troubleshooting issues related to your security devices. (Blue Coat, Check Point, F5, Fortinet, McAfee, Juniper Networks, Palo Alto Networks and Pulse Secure) Resale Our unique industry view provides insight into the technologies that best fit your situation, and our continuum of services complements your chosen technologies throughout their entire lifecycle. Professional Development Training Optiv provides instructor-led professional development training to help our clients improve data security and maximize ROI on technology investments. Our instructors prepare students for certification testing and deliver real-world, unbiased multi-vendor optimization strategies that can be implemented on day one. Our training courses include the following industry-leading technology solutions: 7Safe, Blue Coat, Check Point, F5 Networks, Palo Alto Networks, CISSP Core Technology Partners 1125 17th Street, Suite 1700, Denver, CO 80202 800.574.0896 www.optiv.com Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv. com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc. 8.17 F1.1