THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Similar documents
CA Security Management

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

THE ACCENTURE CYBER DEFENSE SOLUTION

Building Resilience in a Digital Enterprise

RSA NetWitness Suite Respond in Minutes, Not Months

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Managed Endpoint Defense

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Best Practices in Securing a Multicloud World

deep (i) the most advanced solution for managed security services

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Background FAST FACTS

NEXT GENERATION SECURITY OPERATIONS CENTER

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Security by Default: Enabling Transformation Through Cyber Resilience

Cyber Security For Business

ForeScout Extended Module for Splunk

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Sage Data Security Services Directory

Vulnerability Assessments and Penetration Testing

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

CYBER SECURITY AIR TRANSPORT IT SUMMIT

esendpoint Next-gen endpoint threat detection and response

An ICS Whitepaper Choosing the Right Security Assessment

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

with Advanced Protection

Carbon Black PCI Compliance Mapping Checklist

ForeScout ControlFabric TM Architecture

CYBER RESILIENCE & INCIDENT RESPONSE

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

DIGITAL TRUST Making digital work by making digital secure

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

CyberEdge. End-to-End Cyber Risk Management Solutions

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

SIEMLESS THREAT DETECTION FOR AWS

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Are we breached? Deloitte's Cyber Threat Hunting

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

TRUE SECURITY-AS-A-SERVICE

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

The Cyber War on Small Business

Incident Response Services

MITIGATE CYBER ATTACK RISK

AT&T Endpoint Security

Symantec Advanced Threat Protection: Endpoint

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

HOSTED SECURITY SERVICES

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

to Enhance Your Cyber Security Needs

CloudSOC and Security.cloud for Microsoft Office 365

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Kaspersky Open Space Security

A company built on security

Continuous protection to reduce risk and maintain production availability

Run the business. Not the risks.

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

May the (IBM) X-Force Be With You

Mastering The Endpoint

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Choosing the Right Security Assessment

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Resolving Security s Biggest Productivity Killer

Securing Your Digital Transformation

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Service Provider View of Cyber Security. July 2017

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

converged agile practical Design Your Security We build tailored, converged security for you.

HP Fortify Software Security Center

Transcription:

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into ship safety. Owners risk having their ships detained if they have not included cybersecurity in ship safety management systems by 1 January 2021. Traditionally, attacks on marine vessels included piracy, boarding, theft, and/ or physical destruction. Today s attacks are much different. Ships large and small are undergoing the digital transformation, implementing automation and integration measures across all levels of the company. As this technology continues to develop, information technology (IT) and operational technology (OT) on ships is being networked together and more frequently connected to the internet. Today s stealthy cyber attacks are less brazen, so that the attacker can exploit the compromised vessel for a longer period of time and greater profit. For modern maritime businesses, a cyber attack could lead to business disruption, financial loss, damage to reputation, damage to goods and environment, incident response cost, fines and legal issues. Attacks might include low-level crime or even national security concerns. Hackers could target tangible and intangible assets, such as navigation aids and supply chain elements. The severe potential impact of a single cyber attack calls for companies to invest in robust cyber risk management that can protect a complex set of assets. Speedcast offers proactive cybersecurity that can quickly and dynamically respond to threats with all security elements seamlessly exchanging real-time threat intelligence and coordinating actions. Most importantly, Speedcast s range of cybersecurity solutions is adaptable to the constantly-changing threat landscape. 2018 Speedcast. All rights reserved. Provision of services is conditioned on execution of a service agreement. Specifications are subject to change; other terms and conditions may apply. Trademarks and trade names are the property of their respective companies. 12/2018 SPEEDCAST.COM

Speedcast s Cybersecurity Suite As companies undergo digital transformation, they must also undergo a security transformation to account for evolving cyber threats. Speedcast uses collaborative cybersecurity, a strategy that utilizes multiple technologies working together for the detection of advanced threats. The integration of devices using open standards, common operating systems, and unified management platforms enables the sharing and correlation of real-time threat intelligence. Speedcast s Security Operations Center (SOC) proactively monitors the protection level of customer sites, provides alerts and reports, and protects against malicious threats. Our aim is trifold: To prevent and defend, to detect and monitor the threat, and to mitigate any attack. Speedcast s cybersecurity solutions scale and deliver seamless, end-to-end protection. In addition to our base cybersecurity offering, we have developed the following cybersecurity value added services: Analyst-Based Service Management: With monthly automated reports. Reports can be standard or customized. Cyber Vulnerability Assessments: Including for threats and vulnerabilities, penetration testing, for severity and likelihood of impact.

Speedcast s Cyber Security as a Service (CSaaS) Cyber Threats by the Numbers 68% of breaches took months or longer to discover. (Verizon, 2018) 53% of firms indicated that the rapidly evolving nature of cyber threats in the number one challenge to securing their organization. (Forrester, 2017) 45% of organizations say they have a problematic shortage of cybersecurity skills. (ESG Research, 2017) With Speedcast s Cyber Security as a Service (CSaaS), we help you defend against breaches by offering a consultative approach. We work with customers to assess their current infrastructure, so we can design a program that fits their network requirements and is in compliance with specific industry regulations. CSaaS combines the best of content filtering and monitoring, threat management services, and system vulnerability scans to ensure your remote sites operate securely, allowing personnel to focus on supporting your company s critical operations and increasing network efficiency. CSaaS operates from your remote site or vessel and runs on our integrated communication platform, Sigma Gateway or Sigma Xtreme. Protect and Monitor the Vessel s IT Infrastructure With Speedcast s advanced cybersecurity and monitoring protection, you can select URLs, specific sites, applications or categories to block or filter to maximize available capacity, and keep networks safe from threatening malware and spyware. A few examples of the advanced security arsenal we re using to protect our customers infrastructure include: Advanced Malware Protection Service (AMP): Includes Antivirus, Botnet IP/Domain Service, Mobile Malware Security, FortiSandbox Cloud, Virus Outbreak Protection Service and Content Disarm & Reconstruct Web Filtering IPS Antispam NGFW Application Control 2018 Speedcast. All rights reserved. Provision of services is conditioned on execution of a service agreement. Specifications are subject to change; other terms and conditions may apply. Trademarks and trade names are the property of their respective companies. 12/2018 SPEEDCAST.COM

Protect the Workstation with Speedguard Speedcast s comprehensive antivirus solution is designed with the maritime market in mind. SpeedGuard allows you to remotely manage and monitor the protection level of devices, provide alerts and reports, and protect against malicious threats. Speedguard also lets users choose how often to receive signature updates: daily, weekly or live. Updates can be delivered between connected and unconnected devices using a unique, peer-to-peer distribution mechanism. SpeedGuard is powered by ESET endpoint protection, which uses multi-layered technologies that go far beyond the capabilities of basic antivirus. This includes anti-phishing protection to keep your sensitive information secure; botnet protection to help discover malware; and web threat detection to identify threats caused by browser vulnerabilities. Detect and Manage Speedcast provides content-aware network threat detection and response. Prevent infected or suspicious files, spyware and malware from infiltrating your network with industry-leading detection and monitoring software. Customers can also leverage Speedcast 24/7 customer service center support for professional monitoring on incidents. For targeting advanced attacks, customers can use our analyst-based service with progressive tools to identify any threats that the response-oriented monitoring and signature level software may miss. This added protection includes weekly reports, conference call reviews with your security expert, and annual on-site security best practice training.

Educate and Ensure Compliance Speedcast s cyber threat assessments review your current infrastructure and provide detailed evaluations on vulnerabilities, the potential severity and likelihood of impact, as well as recommendations for remediation and correction. Speedcast s compliance assessment is a simple way to make sure that your network is up to par with the current requirements and standards in each specific industry. After completing a self-assessment, work with Speedcast s cybersecurity team to identify ways in which you can improve your security, understand new regulations and ensure your company maintains industry compliance. 2018 Speedcast. All rights reserved. Provision of services is conditioned on execution of a service agreement. Specifications are subject to change; other terms and conditions may apply. Trademarks and trade names are the property of their respective companies. 12/2018 SPEEDCAST.COM

Security through expertise and innovation Your business requires a robust cybersecurity solution so operations can continue and sensitive information can remain safe. Our deep subject matter expertise allows us to proactively and seamlessly react to threats, improving your network integrity. Speedcast CSaaS will help you guard against threat exposure, give you the opportunity to assess and eliminate network vulnerabilities, and ensure you comply with existing and future industry regulations. With 24/7 support available within any time zone, in multiple languages and more than 250 field engineers, Speedcast has the experience, innovation and manpower to deliver superior cybersecurity solutions.

Speedcast Headquarters Unit 4F, Level 1, Lakes Business Park 12 Lord Street, Botany NSW 2019 Australia +61 2 9531 7555 Speedcast Headquarters 15590 NW 15th Avenue Miami, FL 33169 United States +1 305 627 6000 Speedcast Headquarters 4400 S Sam Houston Pkwy E Houston, TX 77048 United States +1 832 668 2300 Speedcast Headquarters 86 Fragklinou Rousvelt Petra Business Center 4th Floor, 3031 Limassol Cyprus +30 216 100 1400 Speedcast Headquarters 5A Toh Guan Road East #06-01 CWT Jurong East Logistics Centre Singapore 608830 +65 6715 9888 2018 Speedcast. All rights reserved. Provision of services is conditioned on execution of a service agreement. Specifications are subject to change; other terms and conditions may apply. Trademarks and trade names are the property of their respective companies. 12/2018 SPEEDCAST.COM