Dimension Data s Managed Intrusion Detection and Prevention Service

Similar documents
Managed Network Services. Managing your network to enable your digital business

Server Virtualisation Assessment. Service Overview

Technology Lifecycle Management Assessment. Know your network - achieve business agility

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Transforming networks and services for communications service providers

Software-defined Networking Development Model

addendum Uptime Cisco customer interactive solutions

addendum Uptime Cisco security solutions

Consulting services for cybersecurity

addendum Uptime Tandberg converged communications solutions

Why Business Model Changes for Higher Education Require New IT Infrastructure Strategies

How to measure the real ROI of virtualisation

Dimension Data Cloud Services

Sustainable Data Centre

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Innovative Fastening Technologies

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Improving digital infrastructure for a better connected Thailand

Access Code and Phone Number

Simplify Your Network Security with All-In-One Unified Threat Management

CORPORATE PRESENTATION

locuz.com SOC Services

TRUE SECURITY-AS-A-SERVICE

E-Seminar. Voice over IP. Internet Technical Solution Seminar

Spoka Meet Audio Calls Rates Dial-In UK

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Security

Purchasing. Operations 3% Marketing 3% HR. Production 1%

SECURITY SERVICES SECURITY

THE POWER OF A STRONG PARTNERSHIP.

Symantec Security Monitoring Services

No Purchase needed

Digital EAGLEs. Outlook and perspectives

Global entertainment and media outlook Explore the content and tools

NEXT GENERATION SECURITY OPERATIONS CENTER

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

Shell Global Helpline - Telephone Numbers

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE


Cisco Optimization Services

Securing Your Digital Transformation

Benefits of Local Manufacturing

Reinvent Your 2013 Security Management Strategy

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

Data Loss Prevention - Global Market Outlook ( )

Support and Management for AWS

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

CISCO IP PHONE 7970G NEW! CISCO IP PHONE 7905G AND 7912G XML

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Power Analyzer Firmware Update Utility Version Software Release Notes

Incident Response. We ve had a privacy breach now what?

Global Security Consulting Services, compliancy and risk asessment services

Collaborative Regulation in the APP Economy

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Cisco AVVID The Architecture for E-Business

CISCO FAX SERVER. Figure 1. Example Deployment Scenario. The Cisco Fax Server solution consists of the following components:

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

Cyber Security Technologies

Ponemon Institute s 2018 Cost of a Data Breach Study

BUILDING TRUSTED CYBER SECURITY SOLUTIONS

iclass SE multiclass SE 125kHz, 13.56MHz 125kHz, 13.56MHz

BUILDING AND MAINTAINING SOC

INTRODUCTION OVERVIEW ON CYBERCRIME

Moving Professionals Forward. World Leader In Competence Based Certification

LinkedIn Economic Graph Project

MORE THAN JUST A PRODUCT, CABLOFIL IS A GLOBAL SOLUTION. Safer, more economic economic and more performant and A SYSTEM AN EXPERTISE A SERVICE

The Critical Importance of CIIP to Cybersecurity

Turquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

CAPABILITY STATEMENT

Configuring DHCP for ShoreTel IP Phones

Safeguards on Personal Data Privacy.

Partner Guidelines to sign Agreement. May, 2017

ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY

SIEMLESS THREAT MANAGEMENT

Strategic IT Plan Improves NYCHA Resident Services While Reducing Costs US$150 Million

Continuous protection to reduce risk and maintain production availability

IaaS Buyer s Checklist.

Security-as-a-Service: The Future of Security Management

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops

CYBER RESILIENCE & INCIDENT RESPONSE

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Introduction to the Export Services Branch Programmes and Services Ministry of International Trade

Security by Default: Enabling Transformation Through Cyber Resilience

Biorisk Management Professional Certification Program. Maureen Ellis Executive Director International Federation of Biosafety Associations

FORGING A TRUE GLOBAL CONNECTION - BROADBAND PASSES 500 MILLION SUBSCRIBERS

Safety. Introduction

New Zealand Government IBM Infrastructure as a Service

NEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Dashboard. Feb 18, Feb 18, 2008 Comparing to: Site. 13,318 Visits 28,414 Pageviews 2.13 Pages/Visit

Transcription:

data sheet Dimension Data s Managed Intrusion Detection and Prevention Service A robust security infrastructure is essential to conduct business successfully in a networked world. Firewalls and other barriers are a good start, but intrusion detection and prevention systems provide an extra layer of protection that improve the ability to respond to potential intrusions or unauthorised behaviour before they become serious security breaches. Intrusion detection and prevention systems are, however, complex technologies that are difficult to manage and maintain. They generate large volumes of complex data and alerts, which require rapid, accurate analysis and interpretation to truly reduce risk. This level of vigilance requires time, effort and specialised expertise and focusing your internal IT department s energies on monitoring and managing intrusion detection and prevention systems means you have less time to execute strategic business activities. If you re seeking to implement intrusion detection and prevention systems, without devoting costly internal resources to manage, maintain and monitor the systems, Dimension Data s Managed Intrusion Detection and Prevention Service can help. We offer a fully managed, 24/7/365 service that protects networks from attack and misuse, using network-based intrusion detection and prevention systems. If you re seeking to implement intrusion detection and prevention systems, without devoting costly internal resources to manage, maintain and monitor the systems, Dimension Data s Managed Intrusion Detection and Prevention Service can help. The service provides: Around-the-clock protection: true continuity of process and constant vigilance. Support for solutions from marketleading vendors: Cisco, McAfee, Juniper, Sourcefire, Tipping Point, Palo Alto, IBM, Fortinet, Industrial Defender and Snort. Turnkey daily management: including fine-tuning of filters, software upgrades and patches, and system configuration. Rapid intrusion identification, escalation and response using proven processes that ensure security events are responded to and escalated quickly. Client security portal: that provides the intelligence and analytics you need to easily understand your risks, demonstrate compliance and make better security decisions. The client security portal gives you full visibility into your security and compliance posture with advanced reporting functionality integrated across all of our Managed Security Services.

Benefits to you: Improved security posture, delivering a stronger return on investment than you d achieve by managing the system internally. Reduced costs associated with hiring, training, managing and retaining high quality security engineering personnel. Improved agility by freeing up your internal resources to focus on your core business outcomes and requirements. Access to Security Operations Centre (SOC): for 24/7 support and escalated engineering. Certifications: AS/NZS 27001, ASIO T4, ISO/IEC 27001:2005, Defence Signals Directorate (DSD) certified gateway up to protected classification level and PCI DSS. Access to critical security data: including detailed analysis, summary overviews and customised query reports. Business intelligence: the client security portal features integrated business intelligence and analytics tools to help you gain the meaningful insights and new perspectives you need to answer these questions and make better security decisions. Highly customisable data visualisations and reports give you point-in-time snapshots as well as historical trending perspectives across multiple security metrics. Security reporting: To help demonstrate security effectiveness and reduce the burden of compliance reporting, client security portal provides you with an extensive set of pre-built reports for security and compliance. Reporting has been specifically designed to help clients demonstrate adherence to regulatory requirements and provide enterprisewide visibility into the performance of security controls. The service elements include: Service elements Essential Advanced Client take-on 4 4 Event management Performance and availability monitoring and notification 4 4 Security information and event management Log collection Log filtering Log aggregation Log categorisation Log normalisation Log forwarding Log mining Log correlation 8 4 Global intelligence correlation 8 4 Vulnerability scan data correlation 8 4 Content aware monitoring 8 4 Context aware monitoring 8 4 Predictive intelligence 8 4 Incident management Security incident management Phase 1: security incident identification Phase 2: security incident investigation Phase 3: security incident response & containment Phase 4: security incident rectification Phase 5: restart Phase 6: monitoring 8 4 Remote incident diagnosis and troubleshooting 4 4 Workaround or permanent resolution identification 4 4 Workaround or permanent resolution implementation 4 4

Service elements Essential Advanced Service asset and configuration management Configuration and rule-base backup 4 4 Patch release notification 4 4 Asset inventory management 4 4 Role-based access control 4 4 IDS/IPS policy tuning 8 4 Vulnerability scanning service 4 4 Change management Change request process 4 4 Configuration and rule-base administration 4 4 Release and deployment management Patch installations 4 4 Configuration and rule-base restore 4 4 Signature update maintenance 4 4 Reporting Threat intelligence service 4 4 Online searching and reporting 8 4 Monthly reporting (system generated) 8 4 Report validation and review 8 Optional Core service elements Service desk 4 4 Escalation management 4 4 Request fulfilment 4 4 Client security portal 8 4 MACD service units 4 4 Service management Client Services Manager Service management reporting Service review meetings Optional Optional

Why Dimension Data? Broad technical and integration expertise across a variety of IT disciplines, including networking, security, unified communications and collaboration, data centres, virtualisation, Microsoft and contact centres. Strategic partnerships with leading security technology vendors, including Cisco, Check Point, Blue Coat, RSA, McAfee, Zscaler, Juniper, Sourcefire, Imperva, Palo Alto, Fortinet and ArcSight. Proven track record: over 6,000 security clients across all industry sectors, including financial services, telecommunications, health care, manufacturing, government and education. Global footprint, local delivery: with over 14,000 employees and operations in 52 countries across five continents, Dimension Data manages more than USD12.5 billion of network infrastructure through five Global Service Centres on a 24x7 basis, in more than 15 languages. Real-time security information and event management architecture: an enterprise-wide risk management solution enabling our SOC analysts to centrally manage attacks, threats and exposures by correlating security information from firewalls, intrusion detectors, virus scanners, VPNs, operating systems, authentication solutions, vulnerability scanning tools and other security checkpoints. The solution enables our analysts to eliminate clutter such as false-positives, while quickly identifying the real security threats to help them respond with adaptive security measures. Security Operations Centres: our SOCs serve as the command, control and communications centre for all Dimension Data security operations and customer support centres. Staffed 24x7 with three teams, namely the Watch Team, Response Team and Forensic Team, dedicated to maintaining the highest quality of service. The SOCs utilise state-of-the-art equipment and technology for monitoring and managing the network and identifying and resolving problems. Security experts: our team of certified security experts brings a century of combined cyber security experience with organisations such as CERT, Department of Defence, IBM and Cisco, to augment the knowledge base of your IT organisation and provide peace of mind that skilled technicians are there to help you respond to and mitigate threats. Certifications: ISO9001, ISO 27001 Australian Signals Directorate (ASD) Protected Gateway, PCI DSS, Cisco MSCP, Information Security Manual (ISM) and ASIO T4. Dimension Data creates, integrates and manages your security infrastructure in a way that supports your business goals. We offer a broad portfolio of security services coupled with proven technologies from a select group of innovative partners. Our security professionals are recognised for their depth of expertise and passionate client delivery. They re globally connected to bring you the best solutions for your security needs, delivered anywhere in the world. Contact us For more information, please contact your nearest Dimension Data office or visit http://www.dimensiondata.com CS / DDMS-1437 / 09/14 Copyright Dimension Data 2014 For further information visit: www.dimensiondata.com

Middle East & Africa Asia Australia Europe Americas Algeria Angola Botswana Congo Burundi Democratic Republic of the Congo Gabon Ghana Kenya Malawi Mauritius Morocco Mozambique Namibia Nigeria Oman Rwanda Saudi Arabia South Africa Tanzania Uganda United Arab Emirates Zambia China Hong Kong India Indonesia Japan Korea Malaysia New Zealand Philippines Singapore Taiwan Thailand Vietnam Australian Capital Territory New South Wales Queensland South Australia Victoria Western Australia Belgium Czech Republic France Germany Italy Luxembourg Netherlands Spain Switzerland United Kingdom Brazil Canada Chile Mexico United States For contact details in your region please visit www.dimensiondata.com/globalpresence