Managed Security Services

Size: px
Start display at page:

Download "Managed Security Services"

Transcription

1 Managed Security Services Are You Ready? BT White Paper

2 02

3 Contents Overview 04 State of play 04 Examining the issues 05 Risk 05 Threats 06 Constant vigilance 06 Regulation 06 Justifying security spend 07 Why organisations are moving to managed services 07 Choosing a partner 07 03

4 Responding to market, governance, and cost issues Driven by regulatory and geopolitical pressures, institutions are prioritising investment in managed security services to manage their risk profile. Overview The issue of whether to insource or outsource security management is now very much on the agenda of boardrooms on both sides of the Atlantic. For companies that have invested significant time and resource in maintaining their security infrastructure, the decision to share responsibility with a third party, let alone hand it over, may have been unthinkable until recently. However the recent economic downturn, coupled with the continued sophistication and easy availability of hacking exploit tools, has forced companies to re-evaluate their ability to cope effectively without expert help. State of play The optimism of the late 1990s in addressing key security issues has been replaced by hard pragmatism. Important new technologies such as Intrusion Detection Systems (IDS), Identity Management, and Public Key Infrastructure (PKI), have not yet become mainstream. Whilst individual product solutions do exist, significant integration and operational service wrap is required to realise their full benefit; and it goes without saying that there is no magic bullet. This is only partly down to technology immaturity and lack of interoperability standards. A more significant factor is the growing appreciation of the complexity of the challenge and if anything that challenge is increasing. We are currently witnessing an arms race between the hacker community and the guardians of corporate infrastructure. The only certainty about this race is that it will continue for some time yet. The fact is that there are problems in security that large numbers of enterprises have failed to acknowledge or confront head on. In computer science speak, we could say the the problem space is much bigger than we anticipated. These problems manifest themselves especially where technology interacts with people and where degrees of risk need to be considered (which we will cover shortly). As we will also discuss, key issues in security are also down to our inability to maintain consistently high standards with repetitive, laborious processes (such as patch and configuration management). The result is that, to be effective, today s security management solution must be carefully crafted, integrated, and underpinned by rigorous procedures and first class security staff, as well as leading products and technologies. (see Figure 1 below). Failure to have all of these elements in place will compromise security, with potentially disastrous effects for a business. Figure 1 Security Expertise Service Design Integration Technology Technology Technology People Process Product Over time, as the technology matures, there will be a gradual shift from reliance on people to increasing levels of automation. However we are some way off from automating security management. 04

5 Examining the issues Some of the key security issues affecting business today are: Inability to effectively patch vulnerable systems, as well as poor configuration management practises Inability to monitor for and cope with daily threats such as virus and denial of service (DoS) attacks, spam, and information theft Lack of, or inability to retain, skilled security staff Increasing complexity and increasingly mobile workforce. The shortage of security skills continues to be a problem, amplified by the recent economic downturn and lack of investment. Good security analysts are very hard to find and are slow in the making. This problem shows no sign of abating. Security is a relentless and unforgiving discipline, and basic configuration management problems continue to be a major issue. Patching is perhaps the best intrusion prevention technique available, but still causes major headaches for all kinds of organisations. Many vulnerabilities are publicised before there is an exploit, and patches are often available weeks or even months before the exploit is available or widely publicised. So why do companies continually fail to patch effectively? A recent Gartner report concluded that 30% of attacks exploit vulnerabilities where a patch is available, and 65% of attacks exploit mis-configured systems. Only 5% of attacks exploit things in areas that were previously not known to be a problem. The answer is that patching vulnerable systems in a large enterprise with many different platforms, locations, and legacy applications, can be non-trivial and extremely time consuming. Security technologies are still maturing. Intrusion Detection Systems require careful deployment and tuning to avoid the management headaches of excessive False Positives and False Alarms. Identity Management, biometrics and PKI require expertise and skilled resources to ensure proper integration, ongoing management, and return on investment (ROI). Security management and event correlation is also undergoing a revolution, evidenced by the fact that this is an active area of research. One of the key areas of debate is currently between traditional static signature based techniques and statistical/behavioural techniques. The former is employed widely on much of the current IDS, AntiVirus and Correlation technology. It is predictable and easily understood, but is vulnerable to sophisticated attacks (such as polymorphic worms and viruses, where attacks can change form over time). Conversely, statistical/behavioural systems are promising, but much harder for customers to comprehend, and there is still some way to go before they prove reliable, especially where there is the potential to stop a transaction erroneously (i.e a False Negative). Considerable research and experimentation is still required in these areas. Risk All organisations today are faced with some level of security risk. You should never assume that your organisation is 100% protected at all times. In fact, the deployment of technologies such as Intrusion Detection and monitoring acknowledges that a certain level of suspicious or malicious activity is likely to get through. It also acknowledges that there are internal threats (maybe from disgruntled employees, or simply human error) which have to be countered with skill and imagination. The detection and monitoring systems we refer to are the equivalent of movement detectors inside premises, behind the locked front door. Security risk is also heavily influenced by time. For example, if a new virus is released, for which no patch is available, then the rate of infection is critical. Some organisations will clearly be affected, and it is then a matter of how long it takes for an Anti-Virus fix to be released before this exploit spreads to your network. In such events it is vital that you, or your service provider, have early access to vulnerability data and patches. If you do become affected then it is absolutely critical that you have procedures and people in place to contain the spread and minimise damage as soon as the problem is detected. Real time security monitoring can greatly help in this respect, acting as an early warning system. It is important to recognise that all organisations (at least those with finite budgets) accept some level of risk. Risk is, after all, a trade off between the amount of money you wish to spend on countermeasures, against the perceived level of threat and vulnerability, to protect the estimated value of your assets. The important thing is that risk is identified, and either a) mitigated, b) transferred, c) insured, or d) clearly documented as a risk acceptance. 05

6 Threats All organisations are subject to security threats, which expose their vulnerabilities, and this increases significantly with factors such as their need to do business over the Internet, the profile of the organisation, and the value of their assets. High profile corporations are under constant threat because of the possible infamy associated with security breaches. Even so, it should be understood that any organisation that connects to the Internet is placing it s business at risk if it is not adequately protected by at least firewall and Anti Virus. Key threats to organisations include: Virus, Trojans and Worms SPAM Web Site Defacements Denial of Service Attacks (DoS) Theft of information (e.g. credit card details, source code, biotechnology secrets). A significant proportion of attacks are through viruses and worms, and more insidious planting of Trojan Horses on target systems. These allow hackers to gain remote access to vulnerable systems and recover passwords or confidential information. Spam has become a major problem, not only because it can significantly reduce productivity (with some recent reports showing Spam as up to 40% of traffic), but because Spam can also be used to carry offensive materials and viruses. Anti-Spam techniques are becoming increasingly sophisticated to meet the rising complexity of Spam obfuscation techniques. One of the primary effects of these threats is to compromise availability. The need to communicate and be online 100% of the time is becoming the norm for many companies, and it can be business-critical for organisations such as investment banks, hospitals, and utilities (such as power companies). With downtime for investment banking estimated to cost approximately $6.4m per hour (the US Contingency Planning Association), resilient communications infrastructure is essential. For organisations such as hospitals and utilities it may even be life threatening Virus, worm, denial of service attacks, and web site defacements can all seriously impact availability. These require a considered, integrated, and managed suite of countermeasures, including a defence-in-depth protection strategy, and real-time security monitoring. Constant vigilance If you cannot manage and monitor your network 24x7x365 then you are leaving yourself exposed to significant risk. Security attacks are now becoming so aggressive that real and near real time response is required to avoid serious damage. Up to 30,000 systems were being affected per hour by the BLASTER worm at it s peak during August 2003 (Vnunet). By monitoring in real-time you can potentially identify the prelude of an attack and proactively take defensive actions. Without full-time vigilance your countermeasures could be rendered ineffective should an attack breach your main defences delays of several hours typically mean that the damage is already widespread. To date the damage caused by the code red is estimated at $2.6B. (Computer Economics). Regulation One of the major drivers for security management and risk governance, especially in industries such as global finance and healthcare, is the increasing spectre of regulation. In the finance community for example, regulations already impose significant demands for corporate governance and data protection standards; from bodies such as the Securities and Exchange Commission (SEC) in the US, and the Financial Services Authority (FSA) in the UK. In the UK, the Turnbull Report places company continuity and risk governance firmly on the boardroom table of all companies listed on the London Stock Exchange. And the FSA now expects all listed businesses to demonstrate rigour in their business continuity planning processes and to place a much greater emphasis on testing their effectiveness. On a global level, a great deal of investment in business assurance is linked to the increasing need for financial institutions to control and measure their operational risk. This is important because banks need to meet the requirements of the Basel II accord from the Bank of International Settlements. Basel II is due to come into force as a mandatory requirement at the end of Most financial institutions are not currently compliant with Basel II requirements, though operational risk levels won t have an impact on required capital adequacy ratios until the beginning of But to take advantage of the most favourable calculation methods, banks need to be able to show three years worth of auditable data that demonstrates their commitment to reducing all forms of risk. This includes credit risk, market risk and operational risk. This is driving organisations to put in place effective security and risk monitoring frameworks right now. 06

7 Justifying security spend Return on investment criteria rightly govern most IT investment decisions in large organisations. Security spending has traditionally been viewed as a cost of doing business, but in fact it is an important investment in the on going success of any business we are after all dealing here with the major issues of customer service, customer trust and confidence, and the overall integrity of a business. A recent study by Deloitte, Touch and Tohmatsu of the top 300 global financial institutions, stated that these organisations now regularly spent on average 6% of the IT budgets on security. Having an effective framework for security monitoring, reporting and capturing audit data is a powerful mechanism for justifying security spend. Such a framework will emerge out of a thorough business and risk assessment review, which itself will determine the policies, processes and countermeasures your business needs to deploy in such a way, we can link our security investments to clearly defined business needs. Capturing the audit data is crucial, as it will help us to show the effectiveness and potential weaknesses with existing security countermeasures. Why organisations are moving to managed services There are a number of key reasons why organisations are now moving to, or considering, managed security services: Security is simply not a core function for many organisations, and security spend is often disproportionately high for smaller organisations. Activities such as patch management are tying organisations up in knots Security technology is changing rapidly just keeping up and making the right choices is highly taxing, and making the wrong choice can prove expensive The nature of security threats is becoming a real concern. Attacks are becoming highly sophisticated, whilst at the same time easy-to-use toolkits are being made available for any novice hacker ( script kiddie ) on the Internet Security is not just about technology, you need first class design and operational support in place, all day, and every day. Rigorous processes need to be adopted and consistency and attention to detail are paramount Security management and monitoring is no longer optional, it demands 24x7x365 attention, and this realisation is now forcing companies to rethink their security strategy. Choosing a partner Security is now a mission and business critical function for many organisations. The decision to choose a managed service partner will rest initially on the benefits of outsourcing all or part of your operational and technology risk to a trusted third party provider. Policy and strategy issues can rarely be outsourced, and will invariably remain within the domain of the client. This is nevertheless a strategic decision, so partnerships need to be considered for the long haul (typically 3-5 years). You should select a partner using the following criteria: Experience: choose a partner who can demonstrate a solid track record with blue chip corporations. A provider who can cope with a leading financial institution for example is likely to cope with the most demanding of customers. A provider with a wide client portfolio is also likely to have in depth hands on experience of dealing with tough security problems on a regular basis. In security, experience counts Stability: choose a partner that has a stable financial history and is in business for the long haul. The last thing you need is to be scrambling around for a new partner when you least expect it Independence: choose a partner that itself has global partnerships with best-of-breed technology vendors. Whilst integration is an issue in security it is critical that best-of-breed products are deployed, and currently no single vendor has all the answers. Security is a dynamic field and you need to be sure that you can get rapid access to the best industry solutions available Credibility: choose a partner that has mature security operations centres (SOCs), and has staff that are well qualified. Security is not just about technology, it is about the service behind it Proactive: choose a partner connected to and international body such as FIRST (Forum of Incident Response Teams), and who has strong relationships with technology vendors. You will ultimately benefit from early access to critical security information and patches. By choosing a managed service provider you get access to first class resources, and the burden of technology change is no longer your concern. This leaves organisations free to concentrate on their core business, leaving security in the hands of the experts. 07

8 Conclusions Managed Security Services are now mature, and their providers have built upon more than a decade of experience dealing with security problems at the enterprise level. The main problems in managing security today are predominantly in dealing with complexity, integration, and being able to scale to address the sheer size of the task. Patch management, change control, signature updates, and policy enforcement changes all need to be carried out rigorously, day in day out. Security Monitoring requires 24x7x365 attention, and rigorous incident handling procedures to back this up. Underpinning this is the need for experienced, high quality, security personnel to address the shortfall between the expectations and realities of today s security technology. Managing security is clearly not the core business of most organisations. At the SME level the economies of scale make it untenable, and at the enterprise level the challenges now faced on a day to day basis, make security management challenging for any reasonable duration. Bill Rann BT Global Services About BT BT has an established pedigree in managing complex security problems. Here are some facts about our achievements: The scale and critical nature of BT s operations demand a world-class approach to security: BT serves 10,000 multi-site corporate customers worldwide, of which more than 3,400 are multinational companies operating in two or more countries BT carries 80 per cent of all credit card transactions in the UK as part of an estimated 70bn of funds transferred each day BT manages the data networks for 90 per cent of the major UK financial institutions, payment organisations and credit card companies BT provides the networks that transport other high value financial transactions, such as SettleNET, in The City BT blocks 14 million attempted security incursion attempts every month BT has one of the largest dedicated security practices anywhere in the world. Bill Rann heads BT s security practice, a team of world class specialists providing security and business continuity solutions to customers worldwide. We re here to help create complete business communications. Freefone Offices worldwide The telecommunications services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc s respective standard terms of contract. Nothing in this publication forms any part of any contract. BT is a trademark of British Telecommunications plc. All third party trademarks and logos are duly acknowledged. British Telecommunications plc Registered office: 81 Newgate Street, London EC1A 7AJ. Registered in England No Designed by Unigraph Ltd D PHME 45890/05/04

Managed Security Monitoring: Network Security for the 21st Century

Managed Security Monitoring: Network Security for the 21st Century Managed Security Monitoring: Network Security for the 21st Century Introduction The importance of Security The Internet is critical to business. Companies have no choice but to connect their internal networks

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Network Intrusion Prevention Systems Justification and ROI

Network Intrusion Prevention Systems Justification and ROI White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise

BT Advise Connect. Delivering intelligent network capability around the globe. BT Connect IQ Quick Start. BT Advise BT Advise Connect Delivering intelligent network capability around the globe BT Connect IQ Quick Start BT Advise BT Connect IQ Quick Start In today s complex market, the network and delivery of network

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

BT Business. Transform the performance of your field workforce.

BT Business. Transform the performance of your field workforce. BT Business Transform the performance of your field workforce. BT Field Force Automation can help transform the way you operate and serve your customers. Your customers service level expectations are higher

More information

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Global Information Security Survey 2002

Global Information Security Survey 2002 M ARCH 2002 Global Information Security Survey 2002!@# Issues at a glance Only 40% of organisations are confident they would detect a systems attack 40% of organisations do not investigate information

More information

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME: The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

Managed Security Services

Managed Security Services Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

A Cyber Security Integrator s perspective and approach

A Cyber Security Integrator s perspective and approach A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response

More information

Effective Intrusion Detection

Effective Intrusion Detection Effective Intrusion Detection A white paper by With careful configuration and management, intrusion detection systems can make a valuable contribution to IT infrastructure security s Global network of

More information

Security Basics: A Whitepaper

Security Basics: A Whitepaper Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview

More information

Five reasons SecureData should manage your web application security

Five reasons SecureData should manage your web application security Five reasons SecureData should manage your web application security Introduction: The business critical web From online sales to customer self-service portals, web applications are now crucial to doing

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

BT Quick Starts for Retail Banking Customers

BT Quick Starts for Retail Banking Customers BT Quick Starts for Retail Banking Customers An overview of BT s Quick Start services The retail banking industry continues to be heavily influenced by national and international issues including tax regimes,

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Instant Messaging and Security

Instant Messaging and Security Strategic Guide Instant Messaging and Security Businesses recognise that instant messaging can help to improve employee productivity, but are often reluctant to sanction its use due to concerns about security.

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Streamline and enhance the way you work

Streamline and enhance the way you work Streamline and enhance the way you work bt.com More Connections. More Possibilities. A better way In the past businesses learned to work the hard way. They often operated with people in little islands,

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Incident Response and the Role of External Services

Incident Response and the Role of External Services Incident Response and the Role of External Services Andrea Rigoni Business Development Manager - Government Sector Symantec Corp. Andrea_Rigoni@symantec.com Abstract: Managing security is a complex task

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET Digital Barracuda Information Security Worms is Only the Tip FACT SHEET from Viruses and Worms is Only the Tip Do you have security with teeth? You had better, because if the worms don t get you, the viruses

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

security in the cloud White Paper Series

security in the cloud White Paper Series security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),

More information

CompleteCare+ Enterprise Voice

CompleteCare+ Enterprise Voice There s more to communications than email: Unified communication and collaboration, information sharing and team productivity services Contents 1. Executive Summary 2. Introduction Enterprise-level communications

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES True Managed Security Services give you the freedom and confidence to focus on your business, knowing your information assets are always fully protected and available. Finding

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Things To Do After You ve Been Hacked

Things To Do After You ve Been Hacked Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target

More information

Misconceptions surrounding security in a virtualized environment

Misconceptions surrounding security in a virtualized environment Misconceptions surrounding security in a virtualized environment Clavister White Paper ization is a boom technology, and it is imperative that this environment is secure as any other part of the network.

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

How to Develop a Log Management Strategy

How to Develop a Log Management Strategy Information Security Services Log Management: How to develop the right strategy for business and compliance The purpose of this whitepaper is to provide the reader with guidance on developing a strategic

More information

Connecting things. Creating possibilities. A point of view

Connecting things. Creating possibilities. A point of view Connecting things. Creating possibilities. A point of view Is the next technological revolution already here? The Internet of Things is already transforming our daily lives, our health, education and businesses.

More information

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits CYBER CRIME & SECURITY SURVEY REPORT 2013 Foreword Malicious cyber activity is on the increase and every business with an online presence is at risk. This may involve the loss of critical data and consumer

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

Riding technology waves

Riding technology waves BT Assure Riding technology waves Making the bring your own device (BYOD) trend work for you Making the bring your own device (BYOD) trend work for you Your data is everywhere. It s on devices you own

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Smart cyber security for smart cities

Smart cyber security for smart cities Competence Series Smart cyber security for smart cities 1 IT Security made in Europe Cities are becoming smarter Population growth, urbanisation trends and climate change are driving a process of continuous

More information

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER Molex Premise Networks EXECUTIVE SUMMARY This article discusses IT security, which is a well documented and widely discussed issue. However, despite the

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

BT Managed Mobile Service. Increased mobility, greater control

BT Managed Mobile Service. Increased mobility, greater control BT Managed Mobile Service Increased mobility, greater control Increased mobility should mean greater opportunities, not a bigger headache. More flexible working practices can boost efficiency, increase

More information

ACI ON DEMAND DELIVERS PEACE OF MIND

ACI ON DEMAND DELIVERS PEACE OF MIND DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED

More information

The Leading Provider of Endpoint Security Solutions

The Leading Provider of Endpoint Security Solutions The Leading Provider of Endpoint Security Solutions Innovative Policies to Defend Against Next-Generation Threats Conrad Herrmann CTO and Co-Founder Zone Labs, Inc. Network Security Is an Uphill Battle

More information

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT Issue 1.0 Date 24/03/2011 Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration

More information

Best Practices Top 10: Keep your e-marketing safe from threats

Best Practices Top 10: Keep your e-marketing safe from threats Best Practices Top 10: Keep your e-marketing safe from threats Months of work on a marketing campaign can go down the drain in a matter of minutes thanks to an unforeseen vulnerability on your campaign

More information

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure A risky business Why you can t afford to gamble on the resilience of business-critical infrastructure Banking on a computer system that never fails? Recent failures in the retail banking system show how

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Outsourcing customer contact

Outsourcing customer contact Outsourcing customer contact Complete service YOU NEED TO INVEST IN GOOD PEOPLE AND THE RIGHT TECHNOLOGIES AND INFRASTRUCTURE Outsourcing customer contact No-one in business today needs persuading of the

More information

Whitepaper. Ten questions that every IT manager should ask. A Buyer s Guide to Hosted Security: www.exponential-e.com

Whitepaper. Ten questions that every IT manager should ask. A Buyer s Guide to Hosted Security: www.exponential-e.com Whitepaper A Buyer s Guide to Hosted Security: Ten questions that every IT manager should ask www.exponential-e.com Introduction to hosted security Information security remains the number one concern of

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

It s critical to be able to correlate threats pre-emptively and respond to them immediately.

It s critical to be able to correlate threats pre-emptively and respond to them immediately. Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,

More information

93% of large organisations and 76% of small businesses

93% of large organisations and 76% of small businesses innersecurity INFORMATION SECURITY Information Security Services 93% of large organisations and 76% of small businesses suffered security breaches in the last year. * Cyber attackers were the main cause.

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

How To Manage A Patch Management Process

How To Manage A Patch Management Process PATCH MANAGEMENT: CHANGE, CONFIGURATION AND RELEASE OR SOMETHING MORE? By Grant Adams Principal Consultant Fox IT March 2007 Fox IT 2007 Page 1 of 6 PATCH MANAGEMENT Ask many IT Managers what Patch Management

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information