A Comprehensive Guide to Remote Managed IT Security for Higher Education

Similar documents
ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISE North America Leadership Summit and Awards

TRUE SECURITY-AS-A-SERVICE

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

to Enhance Your Cyber Security Needs

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

How to Write an MSSP RFP. White Paper

Security Operations & Analytics Services

GDPR: An Opportunity to Transform Your Security Operations

Background FAST FACTS

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Cylance Axiom Alliances Program

SIEMLESS THREAT MANAGEMENT

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

White Paper. How to Write an MSSP RFP

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

RSA NetWitness Suite Respond in Minutes, Not Months

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Securing Your Digital Transformation

Background FAST FACTS

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

THE TRIPWIRE NERC SOLUTION SUITE

locuz.com SOC Services

From Managed Security Services to the next evolution of CyberSoc Services

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Layer Security White Paper

THE ACCENTURE CYBER DEFENSE SOLUTION

Ransomware A case study of the impact, recovery and remediation events

Unlocking the Power of the Cloud

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Cybersecurity Auditing in an Unsecure World

Industrial Defender ASM. for Automation Systems Management

Managed Endpoint Defense

CYBER RESILIENCE & INCIDENT RESPONSE

Gujarat Forensic Sciences University

Cyber Security Stress Test SUMMARY REPORT

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Cyber Risks in the Boardroom Conference

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Sage Data Security Services Directory

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Cyber security tips and self-assessment for business

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. EventTracker 8815 Centre Park Drive, Columbia MD 21045

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Click to edit Master title style. DIY vs. Managed SIEM

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Cybersecurity The Evolving Landscape

SECURITY SERVICES SECURITY

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

PROTECT AND AUDIT SENSITIVE DATA

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

CoreMax Consulting s Cyber Security Roadmap

SIEM Solutions from McAfee

Ransomware A case study of the impact, recovery and remediation events

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

BHConsulting. Your trusted cybersecurity partner

RSA INCIDENT RESPONSE SERVICES

Securing Your Most Sensitive Data

with Advanced Protection

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Imperva Incapsula Website Security

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

SIEMLESS THREAT DETECTION FOR AWS

HOSTED SECURITY SERVICES

Manufacturing security: Bridging the gap between IT and OT

RSA INCIDENT RESPONSE SERVICES

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

What is Penetration Testing?

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Put an end to cyberthreats

BUILDING AND MAINTAINING SOC

Information Technology

Security. Made Smarter.

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

IBM Security Services Overview

Automating the Top 20 CIS Critical Security Controls

Cyber Security For Business

in PCI Regulated Environments

CipherCloud CASB+ Connector for ServiceNow

DIGITAL TRUST AT THE CORE

Snort: The World s Most Widely Deployed IPS Technology

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Transcription:

A Comprehensive Guide to Remote Managed IT Security for Higher Education

About EventTracker EventTracker enables its customers to stop attacks and pass IT audits. EventTracker s award-winning product suite includes EventTracker Security Center and EventTracker Log Manager which transform high-volume, cryptic log data into actionable and prioritized intelligence to optimize IT operations, detect and deter costly security breaches, and comply with multiple regulatory mandates. Along with its award-winning products, EventTracker has a Remote Managed SIEM offering to guarantee customer success. EventTracker s experienced staff assumes as much or as little responsibility for all SIEM-related tasks as clients require, including planning, scoping, and installing the implementation, as well as performing run, watch and tune functions of the implementation on each client s behalf. EventTracker s team includes experts in various technologies including Windows, Cisco, VMware, Checkpoint and many security solutions such as Snort, McAfee, Imperva, etc. As the only SIEM vendor to own both product and service delivery functions, EventTracker s solutions are tailored to customer need, resulting in superior quality at competitive pricing to the SME market. 2

Introduction Students, faculty and campus employees need access, but computing autonomy and decentralization makes maintaining security a difficult and demanding endeavor. With phishing, malware and social engineering rampant, how can you secure valuable data and information? Hacking accounts for 36% of education data breaches Education is third among top 10 sectors breached by number of incidents 3

Universities face unique IT security challenges University and higher education communities face unique IT security challenges because of their openness and transparency. Unlike business environments, university and higher education hours can be fluid because staff may work later hours, or because campuses are situated in different locations and time zones. Many higher education communities lack the network security expertise and IT security resources to properly defend against advanced security threats. Multiple locations and different business time zones makes it difficult to safeguard all devices and data from cyber threats, on the interconnected network. This requires a solution that can scale up and down with real-time 24x7 monitoring to protect sensitive data. 1.36 million identities were exposed in educationrelated breaches Higher education communities are increasingly challenged by security breaches, malware and ransomware. 4

Challenges The biggest challenge is to find the most capable information security solution that can: create operational efficiency improve security meet compliance regulations Someone to +manage it for you. 5

Remote Managed SIEM Security Information & Event Management (SIEM) centralizes the storage and interpretation of security data including logs and allows near real-time analysis for rapid defense and recovery. The central repository also enables forensics, trend analysis and automated compliance reporting. Getting results from SIEM technology requires dedicated IT security expertise. A Remote Managed SIEM allows firms to leverage the expertise of the SIEM vendor, while retaining control of the network. The remote team escalates security incidents with context to the firm s in-house IT team so they can perform remediation. 6

Remote Managed SIEM Security Experts People with the right skills are critical to success in thwarting security breaches, and are often the hardest to assemble, train and retain. At the 2016 Gartner Risk & Security Summit, more than 75% of attendees agreed that they lacked the internal staff to manage all their security activities. Cybersecurity is a complex and nuanced field, and legal organizations require different skills to achieve their unique goals. As a result, not every cybersecurity professional has, or needs to have, all of the relevant skills that a legal firm could need. Unfortunately, the demand for cybersecurity professionals far outpaces the available supply. However, a Remote Managed SIEM allows your firm to leverage a team of highly skilled security experts. 7

Remote Managed SIEM Comprehensive Security Technology A scalable and comprehensive SIEM platform enables you to: Monitor your network for threats including malware, ransomware, advanced persistent threats or phishing attacks. Assess external and internal vulnerabilities Monitor network traffic for data leakage, attack patterns, etc. Review access to critical servers, workstations, network devices, applications, databases, etc. Demonstrate compliance with PCI-DSS, SOX 404, HIPAA, FFIEC and other regulations, all from a simple easy to use dashboard. 8

Benefits Control You can have as much control as you choose Delegate tasks to the ECC to the extent you prefer Customization & Integration Fine grained customization is available to accommodate policy requirements Easily integrated with numerous business applications and other security controls Efficiency & Lower Cost The EventTracker Control Center (ECC) takes advantage of economies of scale and passes the savings on to you Purchase as OpEx or CapEx for lowest cost deployment and maintenance Extend security controls to new areas without significant cost increases Control $ Customizatiion Effificiency & Lower Cost Benefits & Integratiion Locatiion Efffectiiveness Expertiise Location All data remains within your firewall, on your premises, subject to your controls ECC staff get limited, audited access to EventTracker only All SIEM data including reports, incidents and notes remain on your premises Effectiveness Faster response to new threats and vulnerabilities Improvements are deployed to all customers, no action needed on your part Continuous feedback for service improvement Expertise ECC staff includes experts in popular technologies including MS Windows, RedHat, Cisco, VMware, Checkpoint, Exchange, Oracle, Snort, Imperva, McAfee epo etc Over time, we develop deep familiarity with your network architecture and users 9

Remote Managed SIEM What to Expect EventTracker s Remote Managed SIEM, SIEM Simplified, provides experts that work with your team to plan, scope and install the implementation, then run, watch and tune the implementation on your behalf. These activities ensure that you realize the benefits of your SIEM platform, and derive the value you want and expect with your initial purchase. EventTracker will consult and coordinate with your team to configure and deploy EventTracker to meet your needs. Then the staff will assume as much or as little responsibility for all SIEMrelated tasks as you require. 10

Features EventTracker Control Center (ECC) provides expert EventTracker system administration including: EventTracker software updates, services and knowledge packs, new release upgrades, licensing key installation System health checks, storage projections and log volume/performance analysis Analyze changes in log collection for new systems and non-reporting systems EventTracker Administration and Configuration for Users, Standardized Reports, Dashboards and Alerts Generate Weekly System Status Report Confirm external/third party integrations are functioning normally: Threat Intel Feeds, ET-IDS, ET-VAS RUN Analyze your Alerts, Incidents, Anomalies and Reports Escalate as needed Deliver Critical Observations Report Deliver Monthly or Quarterly Management Executive Dashboard Powerpoint WATCH 11

Features Review Top Level Summary Reports for relevant frameworks Review Detailed Reports as necessary Annotate finding as needed Maintain auditor-ready artifacts always be ready for an IT audit COMPLY The SIEM Simplified team provides on-demand expert services on an annual retainer Advanced Correlation and Behavior Analysis Configuration Custom Alerts Custom Scripts Configuring FLEX Reports and Top Level Summaries TUNE 12