HAWK Overview
Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients 11 Next Steps 12
Challenges How do I protect my critical information assets? Are my critical IT assets being monitored effectively? What is my current security risk posture across information assets? How do I demonstrate compliance on an ongoing basis? How do I uncover security or compliance anomalies? How do I achieve desired security maturity? Any automated remediation solution available to manage risk? How do I protect myself from known vulnerabilities and threats? How do I continuously detect and remediate vulnerabilities?
HAWK Introduction HAWK is an automated security solution enabling organizations to take complete control on their security posture. Features: Unified portal integrated with enterprise Active Directory or Database for Access Control Applying appropriate security controls (based on CIS, NIST or custom baseline security standards) Ad-hoc or Scheduled Scan for violations Automated Remediation of identified violations Roll Back Remediated non-compliances Manage Exceptions/Dispensations Audit Ready Reports Available On-Premise and on SaaS Cloud Remediate Non Compliances Define Relevant Policies Manage Exceptions / Dispensations Scan for Non Compliances
HAWK Introduction (Contd..) 100 + Policies Pre-built policies based on CIS Controls o Operating Systems o Databases o Network, etc., Custom Policies Customized Policies to meet an enterprise demand (NIST, ISO, SAMA, etc.,) Exceptions - Mark & Track Exceptions / Dispensations Remediate Individual or Group of Assets Scheduled Remediation following Change process Full or Selective Remediation Roll Back Remediated Non- Compliances API based 3 rd party integration o SIEM o Service o GRC, etc., Email and SMS notifications 1 2 3 4 5 6 Architecture Policy Library Scan Remediation Reports APIs Secure, Scalable & Efficient Enterprise Authentication (AD, LDAP, DB compliant) CMDB Integration Agentless Asset Enrolment Supports both Cloud and On- Premise Deployment Run Policies on Individual or Group of Assets Schedule Scan on periodic basis or Ad-hoc Run Entire Policy or Selective Scan Audit Ready Compliance Reports Periodic Scan Reports Periodic Remediation Reports Custom Reports
Key Benefits Reduced CAPEX & OPEX Day Zero Assured Security Compliance HAWK Benefits Improved Security Posture Audit Ready Compliance Reports Accelerated Security Integration
About Us Privately owned since 2008 Headquartered in Bangalore, India 10 years of experience in Application Development, Cyber Security Services and Identity & Access Services 50 man years of combined experience Top 20 Identity & Access Solution provider in India (by CIOReview) More about Gavin Technologies at http://www.gavinit.com
Our Security Practice Security Pillars Strategy & Policy Governance, Risk & Compliance Operations Assurance Cyber Threat Strategy Enterprise Security Architecture Policy & Controls Security Risk Policy & Controls Compliance Regulatory Compliance Monitor, Detect & Alert Security Log & Event Analysis Managed SOC Request Fulfillment Incident Response Vulnerability Penetration Testing Investigations Forensics Cyber Security Awareness Malware Contention Cyber Threat Intelligence Customer Threat Defense Layers Identity & Access Endpoint Security (Email, Data, Web) Cloud Security Network & Datacenter/SDDC Security Application & System Security
Security Services Approach Capital Expenditure Operational Expenditure Cost of Technology Refresh Cost of Ownership Protecting Organization s Reputation Impact on Brand Impact on Financials Losing Customer/Stakeholder Confidence Unified Processes & Procedures Industry Best Practices Training & Awareness Resource Retention People & Process Compliance Audit Findings Merger & Acquisitions Contractual Obligations & Penalties Objectives Best of the Breed Technology Solution Cloud based Cyber Security Solution Secure & Scalable Infrastructure Prudent Technology Governance Weak Governance Model Synergy & Consolidation Lack of Visibility & Focus Enterprise Cyber Security Strategy Alignment with Business Initiatives Cyber Security Strategy Breach Readiness Identification of Breach Breach Readiness & Response Crisis
Why Gavin Technologies Collaborative Approach Private Limited Company founded in 2008 Contextual Methodology Trusted IT Solution/Services Provider End-to-End IT Services Gavin Technologies Serving IT for 10 Years Proven Engagement Record Pragmatic Solutions Quick turn-around-time Consistent Quality Delivery Breadth of Technology Experience
Key Clients
Next Steps