Spyders Managed Security Services

Size: px
Start display at page:

Download "Spyders Managed Security Services"

Transcription

1 Spyders Managed Security Services

2 To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built on a foundation of industry best practice procedures, processes, policies, and enabling technology. Our team of experienced and certified security analysts deliver a suite of advanced security services, and leverage strong technology partnerships to deliver value for clients. Each Spyders Managed Security Service offerings include the following SOC services / features: 24X7X365 Technical Helpdesk Support Security Monitoring Network Monitoring Incident Management Change Management Configuration Management Device Management Technology Lifecycle Management Compliance & Threat Reporting & Monthly Meetings On-demand Professional Services Incident Forensic Services Service Level Agreement (SLA) Spyders Risk Mitigation Centre (RMC) is staffed with full time permanent Level I and II security analyst that provide continuous monitoring, proactive management, and 24X7X365 technical support for clients. Third level support for escalations and complex issue resolution is provided by Spyders IT security and network engineering team. Should a service disruption, technical issue, suspicious activity of security violation occur, clients can contact Spyders helpdesk at any time. Spyders certified and experienced security analysts follow incident response procedures to appropriately address any security issues and work diligently to resolve technical issues to ensure adherence to client service level agreements (SLA s). For each incident, a trouble ticket is created by the Risk Mitigation Centre detailing the event, severity, relevance and magnitude of the correlated event. Tickets are shared with all required parties, and are only closed once the necessary remediation steps have been completed. Spyders maintains the highest level partnerships with technology vendors. This enables the Risk Mitigation Centre to access advanced vendor technical support staff and senior engineering staff that can be called on to efficiently and effectively resolve client issues. The RMC closely monitors the deployed security systems for suspicious activity and uses network monitoring tools to confirm the health of each security system. Each system is configured to generate alerts and events that are sent to the Risk Mitigation Centre. Security analysts conduct event monitoring by reviewing these alerts, events and offenses. Each one is investigated to determine if it is a false positive or true attack. If the event is confirmed to be a legitimate threat, the RMC assigns a severity level to the incident and follows the appropriate incident response procedure Spyders Inc. 2

3 defined in the client RMC manual. If it is a false positive that persists, tuning of the SIEM, firewall or IDS devices is conducted to eliminate the noise and focus on alerts and events that may pose real threats. On a daily basis security system vitals are checked to ensure optimal operation of the security technology. As new threats emerge clients can be confident they are being protected. The RMC is equipped with early warning detection services that provide security analysts with notifications on the latest security threats, malware trends, and system vulnerabilities. Early warning systems such as Secunia, US- Cert, SANS ISC, and reputational intelligence services provide detailed and up-to-date notifications for vulnerabilities discovered in software applications and hardware platforms. These resources deliver breaking news that affects the information security landscape. Network outages and network performance problems can have significant impact on an enterprise s day-to-day operations and can leave clients exposed to potential attacks. Monitoring network devices is critical to maintaining the health and integrity of the network. Spyders qualified Risk Mitigation Centre (RMC) security analysts proactively monitors the network devices 24x7x365 through network management tools and a variety of methods, including console checks, Ping, network probe, port checks, and by querying the standard SNMP MIBs implemented by vendors. This visibility enables Spyders to detect the failed elements that may interrupt network connectivity, impact performance or availability of the network. Action is taken quickly when a device is down or performance may be impacted. Following Spyders incident management process, the severity of the incident is assessed, an investigation is conducted and the issue is resolved in collaboration with the client. Spyders monitors network availability and performance of physical and logical managed systems, supporting the Layer 2 and Layer 3 network elements that may form part of the security perimeter. These are the underlying devices that provide end-to-end connectivity and security of the network. Interruption to or unusual activity on these systems can be the first indication of malicious network activity, as well as being a potential indicator for a system fault that could impact service. A number of key health indicators and network performance metrics are reviewed by Spyders. When combined with application and system level metrics, this data provides a deeper and more thorough understanding of the impact of increased network activity in a client s environment. The RMC uses a professional ticketing system and network monitoring technology to monitor availability, performance, events and configuration across layers and platforms for each managed service client. The network monitoring platform provides the RMC with the following capabilities: Application, Network and Systems Monitoring and Management Alerting and Automatic Remediation System Log Monitoring and Event Management Automated Inventory Discovery and Change Tracking Data Collection via SNMP, SSH, WMI, JMX and Syslog Virtual and Cloud Infrastructure Monitoring and Management Alerting via and SNMP Integration with Configuration Management Tools VMware ESX monitoring Highly customizable backend that can be modified to meet specific client needs Spyders Inc. 3

4 Spyders' Risk Mitigation Centre follows the ITIL industry standard network security incident response lifecycle process to ensure attacks on corporate assets are quickly and efficiently detected, contained, and remediated. The lifecycle includes all activities from incident monitoring to prevention. MONITOR The RMC continuously monitors security alerts from network monitoring systems, intrusion detection systems, security information and event management systems, and early warning systems. DETECT Analysts investigate every security alert generated to verify the legitimacy of the alert. If the activity is suspicious, RMC analysts assign a severity level to the incident, and follow the incident response process flow, which includes client and management notification. A trouble ticket is opened for each investigation. CONTAIN To minimize the exposure or damage that can be caused, analysts contain the incident by implementing changes to eliminate the attacker's means of access, removing affected devices / systems from the network. INFORM Analysts coordinate and provide technical and management teams with updates and responses, which can involve instructions to further contain, resolve, or mitigate the incident and actions to recover affected systems. The RMC provides stakeholders with regular updates on the detected incident and the status of remediation efforts regularly. CORRECT An incident post mortem analysis is conducted to identify weaknesses in the security architecture or system configuration. A root cause analysis document is prepared and circulated detailing the root cause of the incident, incident data, post mortem analysis, lessons learned and changes required. PREVENT To mitigate the risk of future incidents, system or architecture changes are implemented. Spyders invokes the change management process, and obtains the necessary approvals needed to implement the changes. Changes are tested to verify the same security incident cannot be repeated post change. A change management workflow and procedures are clearly defined upon onboarding of any new Managed Security Service client. Clients either follow Spyders change management process and procedures, or provide change procedures and related documents for their established process. The Risk Mitigation Centre follows ITIL based change management procedures. All changes include a well-defined roll-back plan, and must be approved by Spyders Security Operations Manager and the client Change Advisory Board. Where possible, changes are tested in Spyders Test and Integration lab. Urgent and non-urgent change management process flows outline the actions, decisions and roles involved in each process. Spyders Inc. 4

5 Client Config. Manager Spyders Change Manager Spyders Tester Spyders Change Builder Spyders Change Management Process Non-Urgent Change Process = B Build Change, Back-out & Test Plan per RFC No Test Change (Where possible) Test Successful? Yes Notify Client of Test Success Change Successful? Yes Review Change Measure Change Success Coordinate & Implement Change No Notify Client & Confirm Decision to Fix or Back-out Change Successful? Yes Notify Client Coordinator & helpdesk, Close Spyders RFC Fix or Implement Back-out plan No Initial Update to Logs & Notify Users Update Users & Logs Update Change Log and Associate new RFC with Old Close RFC in Log Reporting is a critical component of Spyders Managed Security Services. Reports are designed to present information in alignment with IT security and compliance objectives, and provide relevant information in the most appropriate format for each objective. Spyders reports provide clients with relevant information about security incidents, threats, vulnerabilities, IT compliance, and changes. These reports help clients gain the meaningful insights and new perspectives they need to answer questions and make better security decisions. They provide clients with point-in-time snapshots as well as historical trending data across multiple security metrics. Typical reports include security, performance and availability metrics, a summary of the security events, results of investigations, and both actionable and strategic recommendations to address issues and improve security. When clients are on-boarded, Spyders security specialists work with each client to design reports that address their specific requirements and goals. Spyders Inc. 5

6 Reports are reviewed monthly with clients via in person meeting or conference call. Monthly State of Security meetings allow the RMC to review pertinent information about threats, attacks, and vulnerabilities and give clients the opportunity to ask questions. These meetings provide an opportunity for the team to discuss Spyders recommended remediation and develop action plans to mitigate IT security risks. Spyders performs service, asset and configuration management as part of every managed service. This includes: Regular backups of managed systems, Reviews of new releases of firmware and patches for managed devices, Tracking of managed systems and patch level through a CMDB, Back-ups of Configuration Items immediately before and after performing patches or changes, and monitoring of Configuration Items. Configuration Items are routinely backed up and validated, with a safe copy of the configuration stored in an off-site location at Spyders to support disaster-recovery activities. Spyders routinely monitors vendor releases, and vulnerability information for Configuration Items. Critical patch releases and important updates are planned and scheduled to be applied to managed systems as soon as they are discovered. Device management includes all software patches and system upgrades required to ensure optimal operation of the IT security software and hardware. Spyders aim is to keep systems up-to-date and implement the latest fixes and patches as they become available from the vendors. The Risk Mitigation Centre ensures the timely and safe patching and upgrade of systems to address detected vulnerabilities, address system bugs or enable enhanced functionality. This is only done once the RMC is sure that nothing else will be affected. A key element of the service is the quality assurance and reliability we build in as standard. All patches and upgrades strictly follow the change management process. Unless otherwise agreed to with the MSS client, Spyders applies its patch management policy to all managed devices. Spyders patch management process includes: creating and maintaining a system inventory, monitoring for vulnerabilities, remediation, and threats, prioritizing vulnerability remediation, testing and deploying patches, and finally verifying the patch. Spyders' Risk Mitigation Center routinely performs minor maintenance updates on all managed technology components to ensure service stability and security. Minor Maintenance Windows do not have any impact on the availability of services. Major Maintenance Windows are reserved for updates to software or hardware that could potentially cause service disruptions or outages. Spyders communicates with clients whenever a Major Maintenance Window is needed. Typically these windows are used to apply major firmware or software updates, to implement major changes to device configurations, and to perform hardware related maintenance. Emergency maintenance windows can occur if there is a critical severity issue detected in one or more technology components that requires immediate remediation. Emergency maintenance Spyders Inc. 6

7 windows may be required due to server compromise or malware outbreaks and in other situations where changes, updates, and roll-backs need to be applied quickly and with little notice. Spyders account management team works closely with Managed Security Service clients to realize the full benefit of their security technology assets. With an accurate picture of how the IT security infrastructure may evolve over the next one, three, and five years, Spyders can correlate technology acquisition strategy with a financial model that will help client s make the most out of their investments. Spyders Security Technology Lifecycle Management (STLM) is a multi-phased approach that encompasses the planning, design, acquisition, implementation, and management of all elements comprising the client s managed IT security infrastructure throughout the life of the contract. Spyders in-depth technical knowledge, expert engineering and financial services feed into a solid business model that enables clients to proactively address systematic budgeting needs and longterm management of IT security infrastructures. STLM phases include: Assessment and identification of objectives and appropriate application of technology Technology acquisition specific to IT security infrastructure requirements Integration and implementation by certified security specialists Support services such as custom warranty and maintenance packages, help desk services, and systems monitoring Technology refresh to ensure upgrades are timely and relevant Asset disposition Spyders has a strong roster of security specialists with diverse skill sets that can be leveraged by MSS clients. Spyders qualified security consultants and engineers have strong consulting, design and technology integration skills across a broad portfolio. Professional Services are made available on-demand as part of the managed service contract by including a block of service days into the annual contract. Clients benefit from having expertise delivered by a partner that is familiar with their environment, but only incur the cost for the hours used to complete the project or resolve the issues at hand. Computer forensics investigation and reporting services can be delivered by Spyders security consultants. Spyders forensic services provide clients the option of having an impartial third party perform investigations their behalf. Spyders is equipped with a diverse set of skills and tools to facilitate and perform forensics investigations of client Information Technology Assets. This includes, but is not limited to, a review of logs, review of files and folders, review of stored Internet history, and data recovery. Tools that may be used include: Encase Forensic, Access Data FTK, Sans SIFT, Mandiant web historian, Magnet Forensic tools, TSK, and Kali (Backtrack). Standards-based processes are followed to perform gathering of evidence for investigations, which includes taking a forensic image of affected assets to create a workable copy of the data for investigations. Spyders adheres to, and maintains Chain of Custody for any investigated assets, in order to provide legally admissible proof for any criminal proceedings that may arise from the investigation. Spyders Inc. 7

8 Spyders dedicated Risk Mitigation Centre team understands the importance of service excellence. The RMC performs proactive monitoring of client devices through detailed checks, both manual and automated, to ensure that performance and availability of managed systems, security devices and perimeter Internet connections. Interruptions to availability or major performance issues are detected and escalated as per SLAs. Spyders quantifiable Service Level Agreements (SLAs) are tailored to best meet client needs and address support level preferences. Spyders SLA s address incident notification times, response and recovery times, system availability, system performance, change success, report content, report delivery, etc. Modifications to the standard offering can be made to provide extra features and faster response times for customers with more advanced needs. Spyders security notification response time SLA s are broken down in the table below. SLA Metrics Notification SLA Target for MTTR to take action within Severity 1 15 Minutes 30 minutes Severity 2 30 Minutes 4 hours Severity 3 60 Minutes 12 hours Spyders Risk Mitigation Centre holds the Canadian Industrial Security Directorate Facilities Security Clearance at the Secret Level. The facility employs a layered approach to logical security beginning with a redundant configuration of next-generation network firewalls at the perimeter. These firewalls provide the RMC with inline intrusion prevention and application blocking capabilities to ensure that only the protocols needed to manage client devices are allowed through to client networks. These firewalls provide a termination point for IPSec VPN tunnels to all client networks. Access to the firewalls is strictly enforced by a comprehensive set of administrative roles that help segregate configuration, reporting, and troubleshooting functions. Spyders propriety solution, IntelliGO, is used to distribute digital certificates to all Spyders managed devices to secure network access to the wireless, VPN and wired networks. All client managed service client communications are encrypted and the limited client data held on premises is maintained in secure databases. Spyders deploys all internal infrastructure in redundant, high availability pairs and utilizes a dual internet circuit environment with carrier diversity, and maintains high availability firewall and routing capabilities in addition to stacked switching infrastructure. The environment is designed to failover seamlessly between perimeter firewalls and ISPs. Redundant VPN tunnels to client environments are implemented to provide continuous management of client devices should a failover event occur. Spyders security analysts, engineers and management have been CPIC (Canadian Information Police Centre) verified and some hold federal government Secret Level security clearance. Spyders Inc. 8

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

Cisco Security Services

Cisco Security Services Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service.

The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service. (SLA) The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service. Network Internal Network The internal network includes cables, switches, routers, and firewalls

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Agio Remote Monitoring and Management

Agio Remote Monitoring and Management Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Unified Security Management

Unified Security Management Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between

More information

Always on. Hawaiian Telcom. April 27, 2016. State of Hawaii. State Procurement Office Carey Ann Sasaki P.O. Box 119 Honolulu, HI 96810-119

Always on. Hawaiian Telcom. April 27, 2016. State of Hawaii. State Procurement Office Carey Ann Sasaki P.O. Box 119 Honolulu, HI 96810-119 Managed.. Hawaiian Telcom April 27, 2016 State of Hawaii State Procurement Office Carey Ann Sasaki P.O. Box 119 Honolulu, HI 96810-119 Subject: SPO Vendor List Contract No. 12-12 Furnish, Deliver, Install,

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

System Center Service Manager

System Center Service Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats. Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive

More information

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional

More information

IBM Managed Security Services for Network Intrusion Detection and Intrusion Prevention

IBM Managed Security Services for Network Intrusion Detection and Intrusion Prevention Service Description IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. 1. Scope of Services IBM Managed Security Services for

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

IBM Tivoli Asset Management for IT

IBM Tivoli Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits Summit Platform The Summit Platform provides IT organizations a comprehensive, integrated IT management solution that combines IT service management, IT asset management, availability management, and project

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

A COMPLETE APPROACH TO SECURITY

A COMPLETE APPROACH TO SECURITY A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

can you improve service quality and availability while optimizing operations on VCE Vblock Systems? SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible

More information

A Case for Managed Security

A Case for Managed Security A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform

More information

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using

More information

Sector-leading support and in-depth expert knowledge

Sector-leading support and in-depth expert knowledge servicedesk on demand Comprehensive, expertly-managed support services from Axonex that provide flexible and reliable solutions tailored to meet any of your IT infrastructure requirements or challenges.

More information

PULSE SECURE CARE PLUS SERVICES

PULSE SECURE CARE PLUS SERVICES DATASHEET PULSE SECURE CARE PLUS SERVICES Service Overview In today s dynamic marketplace, organizations are under constant pressure to meet market demand while maintaining or increasing return on investment.

More information

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

The Mandate for Lights-Out IT Management

The Mandate for Lights-Out IT Management The Mandate for Lights-Out IT Management By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Introduction Businesses on a worldwide basis are under increasing competitive pressure to become

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

Network Security Policy: Best Practices White Paper

Network Security Policy: Best Practices White Paper Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service.

The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service. The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service. NETWORK INTERNAL NETWORK The internal network includes cables, switches, routers, and firewalls

More information

Sample Vulnerability Management Policy

Sample Vulnerability Management Policy Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director

More information

White paper. Creating an Effective Security Operations Function

White paper. Creating an Effective Security Operations Function White paper Creating an Effective Security Operations Function Awareness of security issues is fundamental to an effective policy. When we think of a security operations center (SOC), we often have an

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information