data consult - managed security services

30
Services Description August 2014

Upload: jad-bejjani

Post on 31-Oct-2014

441 views

Category:

Technology


3 download

DESCRIPTION

This slide set presents the Managed Security Services offering of Data Consult. MSS is a cloud-based subscriptional service that allows you to monitor, analyze and correlate all events happening on your network. It also allows alerts and notifications in case any suspicious activity happens on your network, and allows investigation through its forensic capabilities.

TRANSCRIPT

Page 1: Data Consult - Managed Security Services

Services DescriptionAugust 2014

Page 2: Data Consult - Managed Security Services

AGENDA

● Cloud:○ Own v/s Lease○ Decentralization of IT

● Security:○ Threats○ Impact and Urgency○ Cost of Breach○ Log Monitoring

● Solution○ Overview○ Architecture○ Packages

● Backup Slides

Page 3: Data Consult - Managed Security Services

CLOUD

Page 4: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Cloud : Own versus Lease

● Own the asset: you can modify it as you please

● You can sell it whenever you want

● More economical on the long run

● High Investment - Depreciation

● Lower down payment● Lower monthly payments● Lower maintenance costs● Ability to modify the

offering at any time● Ability to change asset

every year or two

● Faster time to install● No need for in-house

expertise● No rent space● Increase or decrease

capacity at will

Page 5: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Cloud Services

Decrease budget and avoid vendor lock-in

Save on technology upgrades and maintenance

Lower footprint on your network

Ensure compliance to regulatory mandates.

Deploy faster and easier

Gartner defines cloud computing as “...a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.”

Page 6: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Cloud: The Decentralization of IT

Hardware

On-Premises

OS

Network

Database

Tools

Application

Data

Users

Hardware

IaaS

OS

Network

Database

Tools

Application

Data

Users

Hardware

PaaS

OS

Network

Database

Tools

Application

Data

Users

Hardware

SaaS

OS

Network

Database

Tools

Application

Data

Users

Page 7: Data Consult - Managed Security Services

SECURITY

Page 8: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Network Security: Malware, Vulnerabilities, Theft

Trojan Horse

File infection

Spam email

zero-day attacks

Software vulnerabilities

OS vulnerabilities

Identify theft

Mobile Loss

Phishing

Page 9: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Impact and Urgency

112

3 2

4 3 2

1

Business Process affected.

Workaround available.

Business Process stopped. Can bare

minimal delay. Very hard workaround

Business Process stopped. No work

around

Urgency

Impact

Any system minor degradation non-business critical.

<50% of users impacted

Any system degraded or partially

unavailable. >50% of users impacted

Any system unavailable.

100% of users impacted

Page 10: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Cost of Breach

IBM Data Breach Statistics 2014

Page 11: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Logs

ODBC

WMI

SDEE

CPMI

SNMP

syslognetflow

ssh

native FIM

Registry Monitor

custom XML-based

log /lôg läg/ - noun"a record of performance, events, or day-to-day activities"synonyms: record, register, logbook, journal, diary, chronicle, daybook, record book, ledger;

RDEP Forensics

Network Behaviour Analysis

Performance Monitoring

Asset Analytics

Configuration Management

Vulnerability Scanner

Log Management

One Solution

Page 12: Data Consult - Managed Security Services

SOLUTIONSIEM as a Service

Page 13: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Solution Overview

MSS is a Unified Security Management service that combines multiple security functions in a single console:

● SIEM (security incident and event management)

● Secure Configuration Auditing

● Compliance Automation

● Contextual Forensic Analysis

Network state and event data is collected continuously. The system deploys alert correlations schemes to identify suspicious activity that can develop into threats affecting your business.

Network data collected is compressed and encrypted to avoid network congestion and ensure maximum security of your data.

‘... customers need to examine security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics, and regulatory compliance…’

Page 14: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Solution Architecture

Page 15: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Key Components● Full SIEM deployment with real-time security monitoring,

historical analysis and event correlation

● 24x7 security and configuration device monitoring:

IPS/Firewall/VPN/Servers/Virtual Environments; up to 160

different node types

● Customized web-portal dashboard to provide real-time

reports and statistics

● Dedicated engineering consultants to support with forensic

investigation and remediation

● Compliance and security risk reviews: PCI DSS, HIPAA,

ISO27001/27002, COBIT, NIST800-53…

● Consulting Services - Security Posture Analysis and

Recommendation

● Full Engineering and Management Services

‘...the technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting...’

Page 16: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Dashboards Online Demo:

Page 17: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

MSS Summary

Low monthly subscription fees

Leverage on DataConsult’s expertise in security

Scale very easily

Ensure compliance to regulatory mandates.

Get Security Monitoring installed in minutes

Page 18: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

PackagesMSS MSS1

(Reporting)MSS2

(Premium)MSSe

(Consulting)MSSe+

(Managed)

Log Collection X X X X

Event Reporting X X X X

Asset and Performance Monitoring X X X X

Daily Security Status Reports X X X X

Forensic Investigations X X X

Configuration and Asset Management X X X

Event Correlation X X X

Network Behaviour Analysis X X X

24x7 Live Alert Monitoring & Notification X X X

Monthly Health Reports X X X

Compliance Automation X X

Security Posture Analysis and Recommendation X X

Remediation and Control X

Full Engineering and Device Management X

Page 19: Data Consult - Managed Security Services

Thank You

Page 20: Data Consult - Managed Security Services

BACKUP SLIDES

Screen Shots

Page 21: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Critical Event per Hour

Page 22: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Denied Connections per Hour

Page 23: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Alert Configuration

Page 24: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Destination Blocking

Page 25: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Destination Protocol

Page 26: Data Consult - Managed Security Services

© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

User by Protocol

Page 27: Data Consult - Managed Security Services

BACKUP SLIDES

References

Page 28: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

MALicious softWARE

Cisco Annual Security Report 2014

Page 29: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Vulnerabilities

Kaspersky Security Bulletin 2014

Page 30: Data Consult - Managed Security Services

© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

Mobile Device Theft

Sophos Security Threat Report 2014