locuz.com SOC Services

Similar documents
ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

INTELLIGENCE DRIVEN GRC FOR SECURITY

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

CCISO Blueprint v1. EC-Council

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Accelerate Your Enterprise Private Cloud Initiative

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Carbon Black PCI Compliance Mapping Checklist

Nebraska CERT Conference

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

NEXT GENERATION SECURITY OPERATIONS CENTER

SIEMLESS THREAT DETECTION FOR AWS

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

BHConsulting. Your trusted cybersecurity partner

White Paper. How to Write an MSSP RFP

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

align security instill confidence

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

CipherCloud CASB+ Connector for ServiceNow

TRUE SECURITY-AS-A-SERVICE

BUILDING AND MAINTAINING SOC

IT Consulting and Implementation Services

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

to Enhance Your Cyber Security Needs

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

The Convergence of Security and Compliance

Continuous protection to reduce risk and maintain production availability

Mapping BeyondTrust Solutions to

CA Security Management

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

FOR FINANCIAL SERVICES ORGANIZATIONS

TSC Business Continuity & Disaster Recovery Session

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Automating the Top 20 CIS Critical Security Controls

Annexure 08 (Profile of the Project Team)

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

MITIGATE CYBER ATTACK RISK

Business Context: Key for Successful Risk Management

Welcome ControlCase Conference. Kishor Vaswani, CEO

Are we breached? Deloitte's Cyber Threat Hunting

SIEMLESS THREAT MANAGEMENT

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Your Trusted Partner in Europe European Business Reliance Centre

Security Information & Event Management (SIEM)

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC)

BHConsulting. Your trusted cybersecurity partner

Unlocking the Power of the Cloud

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Certified Information Systems Auditor (CISA)

CIRCULAR. CIR/MRD/CSC/148/2018 December 07, 2018

Symantec Security Monitoring Services

FROM SIEM TO SOC: CROSSING THE CYBERSECURITY CHASM

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

deep (i) the most advanced solution for managed security services

Cyber Security Solutions Mitigating risk and enhancing plant reliability

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

CERT Development EFFECTIVE RESPONSE

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Security Operations & Analytics Services

RSA INCIDENT RESPONSE SERVICES

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

GDPR Update and ENISA guidelines

Reinvent Your 2013 Security Management Strategy

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Cybersecurity Auditing in an Unsecure World

Supporting the Cloud Transformation of Agencies across the Public Sector

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Security and Privacy Governance Program Guidelines

Certified Information Security Manager (CISM) Course Overview

IBM Security Services Overview

Security Incident Management in Microsoft Dynamics 365

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES

How to Write an MSSP RFP. White Paper

MEETING ISO STANDARDS

SYMANTEC DATA CENTER SECURITY

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cyber Security Technologies

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SECURITY & PRIVACY DOCUMENTATION

THE TRIPWIRE NERC SOLUTION SUITE

01.0 Policy Responsibilities and Oversight

SECURITY SERVICES SECURITY

Transcription:

locuz.com SOC Services 1

Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security operations help with 24/7 Security and threat intelligence management for enterprises. Our Security experts help prevent breaches, mitigate risk and ensure regulatory compliance. 2

The world today is comprised of two types of organizations: those who have been breached, and those who do not yet know that they ve been breached. The difference between these types of organizations is related to how soon the company can detect a breach and how effectively they can respond. Detecting and protecting information systems from today s advanced, constant threats requires a comprehensive understanding of how different information security silos relate to each other. By deploying IT security analytics solution, you can detect the attacks as fast as possible, they can block or stop such attacks and provide in detail information to re-build an attack. With a focus on responding to, and containing threats, it is possible to define a Security Operation Center in simple terms: the technology and processes used to detect breaches and coordinate the appropriate response. An effective Security Operation Center provides the information necessary for organizations to efficiently detect threats and subsequently contain them. While eliminating the threats we face is an impossible goal, reducing the time it takes to respond and contain them is certainly achievable. Locuz Security Operations Center provides you with an analysis on possibilities of security risks to your network, firewalls, servers and applications. Outsource your security operations, and we can help you with 24x7 staffed monitoring and management services. Our experts help you manage your risk, reduce costs, and ensure regulatory compliance. One of the Leading General Insurance Companies in India, trusts us for continuously monitoring & managing their Security Incidents & Events. We enable them to detect, respond and prevent threats which has considerably enhanced their Security Posture while gaining operational visibility, investigative capabilities and achieve compliance to meet IRDA Regulations. 3

Security Operation & Governance SOC - Framework This framework delivers advanced threat analysis, comprehensive information security reporting, and an intelligent security search. By utilizing a broad range of information logs and other events generated by hosts, devices, applications and databases, network flow data, known vulnerabilities, and more, it provides deep visibility and analytics to address the most demanding security and compliance requirements. Business Driver Security Strategy Policy & Standard Risk Management Compliance Security Intelligence Incident Hunting & Reporting Security Analytics Security Audits Emergency Response Advisory Service Admin Support Threat Monitoring Threat Response Operations Tool Development Tool Integration Threat Analysis Impact Analysis Investigation Event Analysis Escalation Help desk Incident Mngt Problem mngt Change Mngt Client Infrastructure Events Logs Alerts Key Benefits Implement and measure critical Security controls Gain advanced security intelligence Discover and eliminate today s advanced threats Reduce information security complexity Continuous monitoring of security events Assist with compliance needs around PCI-DSS, HIPAA etc. Lower the total cost of ownership (TCO) for information security 4

The Key functional components of SOC Tools & Technology Security Analytics Platform Proactive Monitoring - Automated Monitoring, Monitored object reporting, Integrated to Business Processes and 24x7 Monitoring Alert and Notification Security Incident Incident Reporting, Alerts Categorized based on Risk Level and Notifications to Business Process Owners Events Correlation Contextual Correlation of events, Situational Awareness and Mapped to Business Processes Incident Management Incident Response Investigation and Analysis, Evidence Gathering, Escalation Management and Forensics Behavioral Analysis Detection, Anomaly Detection and Network Behavioral Analysis Reporting Periodic Incident / Event Reporting, Trend Analysis Reporting, Feedback and Review Mechanism Risk Management Automation Compliance and Audit Compliance Templates, Compliance Enforcement, Compliance Violation Reporting and Review of Compliance Policies periodically Change Management Change Management processes, Automated Approval Processes and Change Control Validation Configuration Management Configuration Management Database, Configuration Logs, Archrivals, Mapped to Change Control and Configuration Rollback Risk Ranking Risk Management Framework, Categories Alerts, Notifications and Compliance based on Risk level and Risk Review Vulnerability Management Periodic Vulnerability Assessment and Audit, Alert and Notify the Business Process Owners for action to close the Vulnerabilities and Validate Remedial Action Completion 5

Spectrum of Service Deliverables Monitoring & Log Analysis Device and App/DB Monitoring Real time Event Analysis, Correlation and Alerting Creation and adding custom correlation rules Remedial Action Risk & Threat Management and Prevent recurrences VA / PT / App Security Testing Determine what security vulnerabilities exist and plan mitigation/fix Tracking the new vulnerabilities from various resources such as CERT OS/DB Hardening Grey Box Testing Black Box Testing Emergency Response Team comprising of Cyber Security Experts, Security Specialists & CEH Investigation, response & mitigation of all Critical or Severity 1 Incidents Connect with law enforcement agencies Forensic Real-time Forensics Operationalized Flexible, Scalable Security Investigations Fraud investigation Effective remedial solution of intricacies related to Forensic Investigation of crime of any type Security Intelligence Track and advise new global security threats and vulnerabilities Impact & Risk Analysis of New Vulnerabilities and Threats Security Analytics Intelligent Security Search Build sophisticated machine learning models ISMS / ISO / Compliance Carry out ISMS/ISO extension activities such as, Gap Analysis, Risk Assessment & Treatment, Policy and Procedure Formation, & Awareness Internal Security Audits Compliance Automation & Reporting Prepare Reports Security Awareness trainings SOC Operations / Define Critical & Key SLA s Creation of CAB and effectively manage Change Requests Process Checklists and run books Develop & recommend improvement plans Monthly Review and daily/weekly / monthly reports 6

Meet the Team Impact and Risk Assessment of Incidents Manages Risk, Compliance and Governance Alignment of Risk Management with Business Needs Qualified Risk Ranking ITIL Certified Manages resources to include personnel, budget, shift scheduling and technology strategy to meet SLAs; Communicates with management Serves as organizational point person for businesscritical incidents provides overall direction for the SOC and input to the overall security strategy. Network Scanning Vulnerability Scanning Situational Awareness Security Consulting Ethical Hacking Gap Analysis Develop intelligence from their past incidents and from information-sharing sources, such as a specialized threat intelligence vendor, industry partners, the cybercrimes division of law enforcement, information-sharing organizations Threat Intelligence & Vulnerability Mgmt Risk Mgmt Committee SOC Manager Emergency Response Team Subject matter Experts have vast knowledge and experience with network threats, their detection and mitigation, and in-depth experience provides expert security assistance Take immediate corrective action to restore services and attack mitigation Handling Major (High Priority) Incidents and escalations Expert of Security Technology and process Understand attacks and threat matrix Extremely good at reaching to root cause Think out of box Understand Virus, Trojans, backdoor, malicious code Performs deep-dive incident analysis by correlating data from various sources Determines if a critical system or data set has been impacted Advises on remediation Provides support for new analytic methods for detecting threats. Incident Response & Forensics Team Security Monitoring Security Management Team Continuously monitors the alert queue Triages security alerts Monitors health of security sensors and Network Elements Collects data and context necessary to initiate Investigate and Analysis work. Expert of Security, OS, Network, Web technology, Database Configure tools and security technologies Implement security policies in technologies under SOC Quick at Incident response Interact and drive vendors, OEM, Government bodies Handles Day to day operations of the Device Administrations Configuration Management as per the change request policies Device Configuration Backups 7

Facts-at-a-glance Certifications Technology Alliances SOC Powered by Service Assurance Cert-In Empanneled Auditor in India Life cycle Approach - Security consulting/audit, deployment & managed services GRC assurance 74% of compliance reported on one of our largest IAM deployments Field Tested methodologies - Standard and proven framework Domain Knowledge, Focus on Cloud Security & Mobility, Best in Class Resources Industry Experience Large Security Services contracts with several Financial Services firms, Healthcare & Life Science firms and Federal Agencies The team supports and monitors over 10,000 devices and Apps/DB, both physical and virtual, deployed at customer premises and service provider facilities Flexible Engagement Models - On Premise, Cloud based (Shared) and Hybrid 8

Dashboards Work flow (Event Management) 9

About Locuz Locuz is an IT Infrastructure Solutions and Services company focused on helping enterprises transform their businesses thru innovative and optimal use of technology. Our strong team of specialists, help address the challenge of deploying & managing complex IT Infrastructure in the face of rapid technological change. Apart from providing a wide range of advisory, implementation & managed IT services, Locuz has built innovative platforms in the area of Hybrid Cloud Orchestration, High Performance Computing & Software Asset Analytics. These products have been successfully deployed in leading enterprises and we are helping customers extract greater RoI from their IT Infrastructure assets & investments. SOC Services Brochure www.locuz.com