1 What happens when you sign up to the ZoneFox Service? Overview According to the highly respected Verizon 2014 Data Breach Investigations Report 1, 2013 set a new record for the number of data breaches from external threat actors, and the percentage of breaches from internal threat actors continues to increase in percentage terms year on year. Customers usually buy ZoneFox for one of two key reasons they want to minimise the loss from a potential breach of their perimeter defences or else they have already been breached and have lost valuable business data or intellectual property and they want to decrease the time to discover a future breach and minimise any costs resulting from it. ZoneFox s rapid, zero-configuration deployment combined with a tried and tested on-boarding process ensures that you and your data are protected in the shortest time possible. When we start to work with a new customer, we at ZoneFox have a standard procedure to on-board them which ensures: Immediate monitoring of key data and intellectual property Your data is protected using ZoneFox s standard alerting package which is built on best practices from standards including ISO27001, HIPAA and PCI DSS. Your team is trained on how to understand any alerts triggered by suspicious user, machine or process activity within your organisation. In this white paper, we detail the process that we go through with a customer to help them achieve these benefits. 1 Verizon 2013 Data Breach Report
2 ZoneFox s On-boarding process Review Deployment Model 2 Days Project Initiation 2-3 Days Trial and Fact-Finding (Only if Trial not already done) 2-4 Weeks Agree roll-out plan and hardware requirements 2 Days System roll out and early support 1 Week Retrospective Review Security Policy and Core Rule Set 2-3 Days Administrator set up and training 2 Days Phase 1 Phase 2 Phase 3 Phase 4 Phase 5
3 Project Initiation At the outset of the project, we will agree with the customer the key contacts during the project, including: Client-Side: o Business Sponsor o System Administrator(s) o Support-reporters ZoneFox o Account manager o Support contacts We will discuss the aims for the project and what the key success measures are from the client s perspective. We will also agree target dates for the project and discuss any regulatory, audit or other milestones. Based on these discussions, a project plan will be written by the ZoneFox team and agreed with the customer. Indicative Duration: 2-3 Days Trial and Fact-Finding If a customer has not participated in a trial before purchasing ZoneFox, we would strongly recommend that they undertake an initial 2 to 4 week period of system monitoring to build a baseline of gathered data. This is a highly valuable process as it allows us to make more effective decisions if we understand data volumes and other factors specific to the customer. The process of managing a customer data-gathering trial is detailed elsewhere but includes: Agreeing duration of a trial Setup of trial environment (local or cloud-based) Weekly account management call Review of findings from data gathered Indicative Duration: Up to 4 weeks Review Deployment Model One of the key decisions that must be made is the type of deployment that a customer requires on-premises or cloud-hosted. The choice of on-premises or cloud deployment is entirely up to the customer and may be influenced by the following: Appetite for CAPEX versus OPEX expense. An on-premises solution requires the up-front purchase of hardware for a ZoneFox deployment but it brings predictable monthly costs. A cloud deployment has
4 little initial capital expenditure and a variable operating expense depending on the capacity of cloudbased resources required each month Security. Some clients prefer not to stream data to a cloud hosting environment due to perceived security weaknesses. Company strategy and policy may mean that one deployment model is preferred over the other. Prior to planning the roll-out of ZoneFox, a client must decide which of the two models of deployment is preferred. Indicative Duration: 2 Days Review Existing Security Policy and Core Rule Set ZoneFox is deployed out the box with a recommended base rule-set created by the ZoneFox team. These rules have been defined by the Cyber Security team at ZoneFox with reference to ISO27001, HIPAA and PCI DSS security policies. We will explain and review these core rules with the customer. If a client has an existing security policy, the ZoneFox team will additionally review that policy with the customer and plan any additional rules required. Indicative Duration: 2-3 Days Administrator set up and training A nominated individual or individuals will be shown the ZoneFox administration interface and the system will be fully demonstrated to new administrators. This training will cover: ZoneFox terminology, concepts and fundamentals Logging into the administration console Understanding and configuring the Dashboard Using the Alerts page How to configure new rules Searching for historic alerts and events Administration of agents, system status and users Using the Daily and Weekly Summary Reports How to use ZoneFox to conduct a forensic examination of recorded data Some customers require additional, complex rules in addition to the core rule-set and following administer training, we can assist a new client in configuring these additional rules, if required. Indicative Duration: 2 Days
5 Agree roll-out plan and hardware requirements Once the customer has decided on their chosen deployment model (on-premises or cloud-based) and after initial data gathering, the ZoneFox team will assist in planning the hardware requirements for the system and roll-out plan. We recommend a staged roll-out, possibly based on department, geography or corporate function. Indicative Duration: 2 Days System roll out and early support The ZoneFox team will assist with the roll-out of the system and we will be on hand to support any queries that you have regarding the system. Indicative Duration: First week of operation Early-Stage Support We recommend to all new customers that after the system goes live, we hold meetings at the end of weeks 1, 2 and 4 in addition to the regular account management meetings to ensure that the system is working effectively. Indicative Duration: Meetings at the end of weeks 1, 2 and 4. Meetings usually less than 1 hour. Retrospective 3 months after Go Live, ZoneFox will organise a retrospective with the key project stakeholders to review how well ZoneFox met their expectations, discuss whether all the original success criteria have been met and to seek feedback from the customer on improvements that ZoneFox could make to the on-boarding process. Indicative Duration: Meeting lasting up to 2 hours.
6 Conclusion ZoneFox s rapid, zero-configuration deployment combined with a tried and tested on-boarding process ensures that you and your data are protected in the shortest time possible. Whether your concern is the loss of key company data, the theft of your intellectual property, reducing the time taken to discover a breach, or ensuring that your existing controls are effective and aren t being abused, ZoneFox can be set up to start protecting you in less than 24 hours. Using ZoneFox to stop data loss reduces the financial and reputational loss of a data breach, protects your competitive advantage, enables you to safely do business with partners, and demonstrates compliance with your key regulatory requirements.
SOME CLOUDS ARE MEANT TO BE KEPT PRIVATE Addressing the Application Needs of Business for Sensitive Data & Customized Applications WHITE PAPER Contents 1. EXECUTIVE SUMMARY 2. INTRODUCTION 3. THE RIGHT
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
Backup and Disaster Recovery in Schools White Paper Backup and data recovery within schools is changing due to an ever-expanding amount of data. Coupled with this, schools are moving towards a model of
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
WHITE PAPER Security Solutions The Identity and Access Management Imperative: Securing the Extended Enterprise Introduction For nearly three years, a junior trader allegedly used stolen passwords and insider
BEST PRACTICES: EVENT LOG MANAGEMENT FOR SECURITY AND COMPLIANCE INITIATIVES IN THE EUROPEAN UNION By Ipswitch, Inc. Network Managment Division www.whatsupgold.com July 2010 Table of Contents Executive
Exploiting the Experience of Transformation IT Outsourcing 2006 IT World Limited on behalf of the BuyIT Best Practice Network Page 1 P12 IT Outsourcing May 2006 Forewords One of the prime objectives of
OPEN DATA CENTER ALLIANCE Master USAGE MODEL: Business Strategy Enabled by Cloud Rev 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Taxonomy...5 Anchoring a Cloud Strategy within a Business
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
Invoice finance made simple All you need to keep the cash flowing Your Invoice Finance Experts Your Invoice Finance Experts Contents This informative, easy-to-use guide has been put together to explain
A Guide to Implementing Cloud Services Better Practice Guide SEPTEMBER 2012 AGIMO is part of the Department of Finance and Deregulation Disclaimer This document has been prepared by AGIMO in consultation
Prepared for Virtual Hold Technology June 2006 The Total Economic Impact Of Virtual Hold s Virtual Queuing Solutions Project Director: Dan Merriman TABLE OF CONTENTS Executive Summary...4 Purpose...4 Methodology...4
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Choosing IT Service Management Software What to look for in an IT Service Management solution Monitor 24-7 Inc. www.monitor24-7.com email@example.com 1 416 410 2716 1 866 364 2757 Introduction Service
White Paper Best Practices in Duplicate Invoice Detection Author Dr Michael Lawler Updated 10 Sep 2013 Version 1.1 Table of Contents Executive Summary... 3 Background... 4 Challenges... 4 Businesses In
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.
Benefits of Plan B Disaster Recovery Service: Very Fast Recovery your critical systems back in around 30 minutes. Very simple to set-up it only takes about 20 minutes to install the Plan B DR appliance
ITIL glossary and abbreviations English This glossary may be freely downloaded. See www.itil-officialsite.com/internationalactivities/itilglossaries.aspx for details of licence terms. 1 Acknowledgements
BEST PRACTICES: EVENT LOG MANAGEMENT FOR SECURITY AND COMPLIANCE INITIATIVES By Ipswitch, Inc. Network Managment Division www.whatsupgold.com July 2010 Table of Contents Executive Summary... 1 Event Log
The Inner Circle Guide to Cloud-Based Contact Centre Solutions Written by Sponsored by CONTENTS Introduction: Why is Cloud computing hot?... 4 Drivers for Cloud- based Contact Centre Solutions... 6 Financial...
ITIL V3 Application Support Volume 1 Service Management For Application Support ITIL is a Registered Trade Mark and Community Trademark of the Office of Government and Commerce. This document may contain