Unlocking the Power of the Cloud

Similar documents
WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Click to edit Master title style. DIY vs. Managed SIEM

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

SIEMLESS THREAT MANAGEMENT

SIEMLESS THREAT DETECTION FOR AWS

Reinvent Your 2013 Security Management Strategy

locuz.com SOC Services

Qualys Cloud Platform

From Managed Security Services to the next evolution of CyberSoc Services

UNIFICATION OF TECHNOLOGIES

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

TRUE SECURITY-AS-A-SERVICE

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Securing Your Digital Transformation

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Run the business. Not the risks.

ITSM SERVICES. Delivering Technology Solutions With Passion

to Enhance Your Cyber Security Needs

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print

Cyber Security Technologies

ALERT LOGIC LOG MANAGER & LOG REVIEW

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

IBM Security Services Overview

Security Diagnostics for IAM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

NEXT GENERATION SECURITY OPERATIONS CENTER

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Automating the Top 20 CIS Critical Security Controls

SecureVue. SecureVue

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Security Configuration Assessment (SCA)

in PCI Regulated Environments

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

SIEM Solutions from McAfee

Microsoft Security Management

The threat landscape is constantly

IBM Managed Security Services - Vulnerability Scanning

RSA NetWitness Suite Respond in Minutes, Not Months

Speed Up Incident Response with Actionable Forensic Analytics

Think Like an Attacker

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

RSA IT Security Risk Management

Security Operations & Analytics Services

Cyber Security Audit & Roadmap Business Process and

Cloud Customer Architecture for Securing Workloads on Cloud Services

SIEM: Five Requirements that Solve the Bigger Business Issues

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Managed Endpoint Defense

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

IBM services and technology solutions for supporting GDPR program

Security. Made Smarter.

the SWIFT Customer Security

Security Terminology Related to a SOC

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Security Information & Event Management (SIEM)

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

SYMANTEC DATA CENTER SECURITY

Qualys Cloud Platform

Everything visible. Everything secure.

EXABEAM HELPS PROTECT INFORMATION SYSTEMS

One Hospital s Cybersecurity Journey

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

INFINIT Y TOTAL PROTECTION

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Machine-Based Penetration Testing

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Symantec Security Monitoring Services

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Modern Database Architectures Demand Modern Data Security Measures

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

IBM Internet Security Systems Proventia Management SiteProtector

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Vulnerability Management

Total Security Management PCI DSS Compliance Guide

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Comprehensive datacenter protection

PROTECT AND AUDIT SENSITIVE DATA

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Your Trusted Partner in Europe European Business Reliance Centre

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Transcription:

TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business

The Innovation Dilemma IT teams spend more than 80% of their time maintaining existing infrastructure and less than 20% of their time strategically innovating to transform their business >80% <20%

We Help Solve the Dilemma

TRANSFORM YOUR BUSINESS With Smarter IT Advanced Managed Security Hybrid Networking Managed Security Cloud Communications Fully Managed software-defined solutions that adapt to the shape of your business

Customer Driven Innovative Solutions Hybrid Networking Managed Security Cloud Communications Customizable, high-performance global cloud networking with software-defined network control, fully managed 24/7. Next-generation threatmanagement solutions, fully managed with continuous monitoring by security experts. Feature-rich global unified communications solutions that are inherently resilient and infinitely scalable. 5

Source: McKinsey World Economic Forum The Security Dilemma The Case for Managed Security

Early Detection Failed

What we offer A turn-key 24 x 7 managed network security service solution.. Monthly Fee-for-Service, all equipment included The value we deliver comes from 2 key areas: UNIQUE TECHNOLOGY PATENTED BEHAVIORAL ANALYSIS NATURE OF CUSTOMER EXPERIENCE WE DELIVER Y2015 MSSP NPS=86.we are more than just eyes-on-glass An effective marriage of Machine+Human Intelligence

We Work As An Extension of Your Security Team Trained, industry-certified Security Analysts leverage our 360º threatscape intelligence knowledge Early detection of sophisticated threats..e.g. Proactive Dark/Deep Web Monitoring Actionable remediation information detailed remediation assistance until vulnerability is mitigated.. Customized incident response & SLA by customer. co-management relationship All tuning, updating and maintenance Custom security reporting SSAE 16-certified SOC II

Masergy Unified Enterprise Security (UES):A Better Way Fully-integrated solutions for Cloud, Premise and Hybrid networks Comprehensive suite of managed security services: Network Behavioral Analysis & Correlation Integrated Vulnerability Management Intrusion Detection & Prevention Security Incident & Event Management Managed Firewall Services System architecture enables peer-level sharing of information between security subsystems.threat detection (i.e. us) vs. event detection (i.e. them) Augments/Complements existing security solutions 10

Hybrid Deployment Example Internet Small & Remote Offices Internet As a Service with Intelligent Internet Management Large Office Public Cloud Provider Virtualized within public clouds Enterprise Global Network Virtualized in existing client VM cluster Internet Internet Data Center Dedicated CPE on premise 11

All-n-One Security Module Deployment Network Behavioral Analysis and Correlation (patented subsystem) Unified Administration, Monitoring and Reporting (SIEM) Intrusion Detection & Prevention (Adaptive) Vulnerability Scanner (unlimited IPs/unlimited scans) Log Management and Monitoring Integrated Ticketing System ASM-2520-1U Appliance -VMWare OS Remote office locations connected to primary system ASM-2500-1U Appliance -VMWare OS VMware Computing Cluster Non-intrusive deployment VMware IDS/IPS Behavioral Packet Capture N-1001-V DPM-21XX Core Switch 10/100/1000 Mb/10GB DMZ 10/100/1000 Mb Internet 12

Behavioral Analysis: Masergy approach We ve all had that call from our credit card companies: 10/5/14 3:47pm $327.59 Guitar Center, Inc. CA? 10/5/14 11:47am $15.00 Central Parking, LLC - NY 10/5/14 12:19pm $124.17 Whole Foods, Inc. NY.. We ve noticed some suspicious behavior

Patented Adaptive Network Behavioral Analysis Early Detection, Prevention, and Remediation for Advanced Persistent Threats (APTs) Best method to detect reconnaissance activity leading up to an attack, especially low level or slow activity and inside threats or abuse Able to detect APTs and stealth activities attempted by rogue employees Continuously analyzes and correlates rolling 14-30 days of packet data, 6mo of alerts and 2yrs of behavioral profiles Exceeds traditional frequency, threshold, and net flow-based detection Multi-tiered correlation Continuously adapting to each network 14

Identifying and analyzing abnormal network behaviors People Process Technology 15

Correlation and Analysis Captures and analyzes logs from firewalls, Host Intrusion Detection/Prevention agents, Windows events, syslogproducing devices, etc. Extensive policy-based rules processing capability Policy enforcement capable Supports automatic or on-demand blocking for market-leading firewalls and/or switches and routers to block harmful network traffic 16

Comprehensive Professional Security Service Offerings 17 PCI DSS 3.1 Assessments Certified PCI ASV Quarterly PCI Scans Annual PCI Pen Test PCI Compliance GAP analysis & progress tracking capabilities. Penetration Testing Simulation of skilled remote attacker against critical assists Wireless Penetration Testing Compliance Testing Regulatory Compliance Audits ISO 27001 PCI SOX FISMA NCUA HIPAA Penetration Testing Vulnerability Assessments Internal/External Wireless Assessments Mobile Computing Environments Risk Management Cloud Check Compliance Security assessments Periodic Audits Web app assessments Vulnerability assessments Web Application Assessments Penetration Testing Source Code Analysis Static, dynamic, and manual testing Database Security Databases Asset discovery Database Vulnerability Scanning Forensics Analysis Identification & containment of compromised systems Complete investigation report for executive & tech teams Enterprise Security Assessments (ESAP) Comprehensive security audits & GAP analysis mapped to compliance framework Custom packages to address various security initiatives Device Configurations Firewalls IDS/IPS DNS Servers Database Servers Wireless Infrastructure

Unified Enterprise Security Summary Masergy s Unified Enterprise Security Solution is: Better at predicting threats Better at protecting against threats Able to rapidly discover threats Equipped to deliver expert advice We leverage artificial intelligence + big data analytics To deliver the best network security available

TRANSFORM YOUR BUSINESS With Smarter IT Advanced Managed Security (Thank You ) Hybrid Networking Managed Security Cloud Communications Fully Managed software-defined solutions that adapt to the shape of your business