IBM Internet Security Systems
|
|
- Aron Hensley
- 8 years ago
- Views:
Transcription
1 IBM ISS Overview THE VEHICLE THE SKILL THE SOLUTION
2 Agenda The Evolving Threat IBM Security Framework & IBM ISS Protection Platform IBM X-Force Security Research & Development IBM ISS Proventia Security Products & Solutions IBM Data Security Solutions Break IBM ISS Professional Security Services IBM ISS Managed Security Services 2
3 The Security Perfect Storm The evolving threat - From notoriety to profit motive The productivity machine - Business enhancements = risk Security costs growing 3x faster than IT budgets - Point product approaches no longer scale Accelerated growth of IP-aware networks - Accelerates IT risk Rapid growth in data - Data is the new currency Compliance mandates - Driving costs and spending 3
4 The State of Evolving Threats Expanding e-crime - Big business driven by profit - Innovation to capture new markets (victims) - Victim segmentation and focus - Stealth is the new black - Rate of attacks is accelerating - Form of attack is more malicious - Attacks are designer in Nature 4
5 The real security problem New Methods and Motives: Adding to the complexity and sheer number of risks Compliance Spending: Investing in more point products to solve more point problems IT Innovation: Requiring new ways to secure the new ways we collaborate The Global Economy: Driving new security support requirements Flexibility in Business Methods: To improve operations and serve customers Complexity remains the biggest security challenge!* Integration is key to managing the cost and complexity of the evolving landscape *InformationWeek 2008 Security Survey 5
6 Not all risks are created equally Frequency of Occurrences Per Year Virus Data Corruption frequent infrequent 1, /10 1/100 1/1,000 1/10,000 1/100,000 Worms Disk Failure Application Outage System Availability Failures Lack of governance Network Problem Failure to meet Failure to meet Industry standards Compliance Mandates Terrorism/Civil Unrest Workplace inaccessibility Natural Disaster Regional Power Failures Building Fire Pandemic $1 $10 $100 $1,000 $10k $100k $1M $10M $100M low Consequences (Single Occurrence Loss) in Dollars per Occurrence high 6
7 Neither are all Security Solutions Find a balance between effective security and cost - The axiom never spend $100 dollars on a fence to protect a $10 horse Studies show the Pareto Principle (the rule) applies to IT security* - 87% of breaches were considered avoidable through reasonable controls* Small set of critical security controls provide a disproportionately high amount of coverage - Critical controls address risk at every layer of the enterprise - Organizations that use critical security controls have significantly higher performance* Pressure Cost Complexity Effectiveness Agility *Sources: W.H. Baker, C.D. Hylender, J.A. Valentine, 2008 Data Breach Investigations Report, Verizon Business, June 2008 ITPI: IT Process Institute, EMA December 2008 Time 7
8 To address these concerns, CIOs are developing contingency plans for their IT organizations CIO strategies for managing in an uncertain environment include: Cutting operating expense Postponing long-term projects in favor of near-term return on investment (ROI) Deferring or reducing capital expenditures Revisiting existing service contracts Seeking productivity increases in their existing infrastructure Postponing hiring of additional IT staff Postponing the launch of new initiatives CIOs are being challenged to realize near term cost reductions while continuing to drive structural change 8
9 Security Optimization can help gain operational efficiencies and IT capacity -- to save money and increase investments in new solutions IT Spending Liberating Funds 100% New Solutions Liberated funding for direct saving or transformational investment IT Spending Application Enhancements Cost of Operations Strategic Change Capacity New Solutions Operations Support Operations Maintenance Security Optimization Services Application Enhancements Operations Support Operations Maintenance 9
10 Optimization of Security and Resiliency Redefine and Simplify Risk and Risk Management - Re-evaluating business priorities to balance risk in light of evolving challenges and business Requirements Establish a Total Security Framework and Solutions Portfolio - Take Inventory of current security and continuity practices - Leverage innovation and integration and global expertise Simplify the Security & Risk Lifecycle - Aligning with business processes to ensure continuous improvement, Cost & Complexity removal Join with a Transformative Security Partner - Call in the experts - Leverage global knowledge and learning 10
11 11
12 IBM Solutions for Security and Resiliency deliver sustainable and optimized business operations Designed to: Enable innovation through secured, end-to-end infrastructure and platforms Reduce number and complexity of required security controls Reduce redundant security expenses Improve organizational and operational agility and resiliency Leverage industry expertise to help unify policy management Deliver needed visibility, control and automation IBM Systems Group 12 12
13 IBM Security Framework Control Description Identity & Access Management Encryption and Key Management Database Protection Release Management Change & Configuration Management Threat & Vulnerability Management Problem & Incident Management Security Information & Event Management Compliance Reporting and Management Process for assuring access to enterprise resources has been given to the right people, at the right time Capability enabling use of pre-existing investments by providing central management of encryption keys Capability that allows for granular protection of data in test and production databases Process for assuring efficiency and integrity of the software development lifecycle Process for assuring routine, emergency and outof-band changes are made efficiently, and in such a manner as to prevent operational outages. Process and capabilities designed to protect the enterprise infrastructure from new and emerging threats Automated workflow and Service Desk designed to assure incidents are escalated and addressed in a timely manner Automated log management, monitor and report security and compliance posture Automated processes for compliance certification, reporting and remediation (E.g. PCI) 13
14 IBM Internet Security Systems Protection Platform Among the most advanced and complete security architectures ever developed delivering preemptive security Integrated security intelligence Comprehensive suite of professional security services Single, integrated view into the network Platform and service extensibility Correlation and integration of multiple data sources Underlying best-in-breed appliances 24/7 outsourced security management Improved system uptime and performance without a large investment in technology or resources Guaranteed protection services Protection Platform 14
15 IBM Security - Backed by the IBM X-Force Research Team Research Technology Solutions Original Vulnerability Research Public Vulnerability Analysis Malware Analysis Threat Landscape Forecasting Protection Technology Research X-Force Protection Engines Extensions to existing engines New protection engine creation X-Force XPU s Security Content Update Development Security Content Update QA X-Force Intelligence X-Force Database Feed Monitoring and Collection Intelligence Sharing The X-Force team delivers reduced operational complexity helping to build integrated technologies that feature baked-in simplification 15
16 Ahead Of The Threat X-Force found Mozilla Unicode URL Stack Overflow. IBM Customers protected. May 13, 2008 Adobe Reader and Adobe Acrobat Remote Code Execution Vulnerability Discovered February 7, 2008 X-Force updated protection engines and vulnerability database IBM Customers protected. February 13, 2008 September 23, 2008 Mozilla Unicode URL Stack Overflow public disclosure MySQL targeted by automated SQL injected attacks Vulnerability Discovered IBM Customers protected. November 13, 2007 August 2008 Widespread Exploitation in the wild April 22, 2008 Automated SQL Injection Attacks 16
17 Ahead Of The Threat Vulnerability Discovered by: CVSS Base Score Vendor Disclosure ISS Protection Shipped Days Ahead of Threat Block by default? Multiple (3) Microsoft Windows TCP/IP Remote Code Execution and DoS Vulnerabilities X-Force 10 / 7.4 Jan 8, 2008 MS Critical CVE and CVE Jan 8, 2007 SSM_List_BO Aug 16, 2007 ICMP_Router_Advertisement_DOS 1 year Yes, drop packet Yes, drop packet Adobe Flash Player Invalid Pointer Vulnerability X-Force 9.3 / 6.9 April 8, 2008 APSB08-11 CVE Nov 13, 2007 Multimedia_File_Overflow 150 days Yes, via rewrite Multiple Vendors Vulnerable to DNS Cache Poisoning Dan Kaminski 6.4 / 5.3 July, 2008 (Several) 2006 CVE May 29, 2003 HTTP_GET_SQL_UnionSelect Nov 13, 2007 July DNS_Cache_Poison Aug 12, 2008 DNS_Cache_Poison_Subdomain_ Attack ~ 5 yrs 240 days present Yes, Block connection Yes, Drop Packet Yes, drop packet Microsoft Windows Server Service RPC Code Execution In the wild 10/8.7 Oct 23, 2008* MS Critical CVE Aug 8, 2006 MSRPC_Srvcs_Bo Oct 27, 2008 MSRPC_Srvsvc_Bo 22 months Block connection 17
18 Ahead of the Threat: Conficker Nov 21, 2008 Conficker.A discovered Dec 29, 2008 Conficker.B discovered Feb 20, 2009 Conficker.B++/C discovered Mar 4, 2009 Conficker.C/D discovered DEC-08 JAN-09 FEB-09 MAR-09 APR-09 X-Force is the first to reverse- engineer the worm s Peer-to-Peer communication protocol. 18
19 Proventia Network IPS IBM ISS Virtual Patch What it does - Provides a buffer of time where newly discovered vulnerabilities are addressed before scheduled patches can be applied. How it works - X-Force research focuses on high-risk security vulnerabilities. - Virtual Patch TM technology focuses on the underlying vulnerability instead of the exploit. How this helps - Prevent zero-day attacks & conveniently manage new patches. Why IBM ISS - X-Force leads the industry in primary vulnerability research. 19
20 20
21 The Power To Deliver The Most Advanced Internet Security Solutions Security Products Central Management Platform Network Intrusion Protection System Virtual IPS & Web Application Security Host-based Intrusion Protection System Enterprise Vulnerability Management Multi-Function Security (UTM) Enterprise Data Leakage Protection Endpoint Data Leakage Protection Network Data Leakage Protection Gartner has positioned ISS in the leader quadrant of the Magic Quadrant for Managed Security Service Providers & Intrusion Prevention products NSS IPS + Enterprise 2006 Award **The GX5108 was the first in the industry to receive the IPS + Enterprise certification** Certified by J.D. Power and Associates for Technology Service and Support Excellence - First in Security Industry To Be Certified - First Technology Company To Be Certified Globally ISS Named Best Security Company USA by SC Magazine. February
22 Uncompromising Protection for Every Layer of Your Network 22
23 This one s a bit of an Eye Chart! 23
24 Uncompromising Protection for Every Layer of Your Network IBM Proventia Network Intrusion Prevention Business Challenges The Proventia Solution 24
25 Uncompromising Protection for Every Layer of Your Network IBM Proventia Network Intrusion Prevention The most complete portfolio available 25
26 Uncompromising Protection for Every Layer of Your Network IBM Proventia Network Intrusion Prevention Model GX4002 GX4004 GX5008 GX5108 GX5208 Ports US List $10,995 $15,995 $37,995 $57,995 $85,995 GX $188,995 26
27 Uncompromising Protection for Every Layer of Your Network IBM Proventia Server Business Challenges Managing disperse security agents Demonstrating risk and compliance Protecting critical data, intellectual property and access to vulnerable servers Maintaining server uptime along while providing strong host intrusion prevention technologies Tracking file access and changes among business critical servers The Proventia Solution Reduces security costs, protects server environments and reduces downtime Enforces corporate security policy for servers Provides out-of-the-box protection with advanced intrusion prevention and blocking Utilizes multiple layers of defense to provide preemptive protection Support operating system migration paths Protects at-risk systems before vendor-supplied patches are available Industry s broadest operating system support: 27
28 Uncompromising Protection for Every Layer of Your Network IBM Proventia Network Enterprise Scanner Business Challenges Managing enterprise security risk Demonstrating risk reduction and compliance Optimizing protection against existing vulnerabilities Automating the vulnerability scanning process Managing the vulnerability remediation workflow Improving efficiency and decreasing operating costs The Proventia Solution Increase network uptime and bandwidth Perform fast, accurate vulnerability scans Free up resources by automating the scan process Leverage your existing IT infrastructure Monitor vulnerability status and maintain compliance Combine with Proventia Platform for Scan and Block capabilities #1 Network VA Vendor (2005) 28
29 Uncompromising Protection for Every Layer of Your Network IBM Proventia Network Multi-Function Security Business Challenges Protect your business from internet threats without jeopardizing bandwidth or availability Secure your end users from spam, incompliant activity and other productivity drainers Conserve your resources by eliminating the need for special security expertise The Proventia Solution Complete protection against all types of Internet threats, with firewall, intrusion prevention, and Virus Prevention System Spam effectiveness ~95%, define Web browsing policies, filter database of +63 Million URLs in 62 categories Set and forget security, automatically updated to protect against the next threat and tailored to needs of your small business or remote offices 29
30 Uncompromising Protection for Every Layer of Your Network IBM Proventia SiteProtector Business Challenges Enterprise-wide view of asset, threat & vulnerability data Comprehensive visibility into network communications Securing Enterprise asset Keeping the network available, bandwidth utilization Maintaining too many security management systems Acceptable use of network resources The Proventia Solution Documents the security process Provides centralized management of high performance network security in addition to host and gateway devices Ease of use through console consolidation Offers visibility through the detection system Enables keeping ahead of rising standard of due care Keeps workflow support for policy mgmt, incident response and vulnerability remediation 30
31 Uncompromising Protection for Every Layer of Your Network 31
32 IBM Data Security Services Endpoint Encryption - powered by PGP Corporation - Full Disk (protect data when device lost or stolen) - File / folder / vdisk / removable media, shared media Network Data Loss Prevention (ndlp) - powered by Fidelis Security Systems - Policy-based enforcement of data protection policy (notify, block, encrypt, remove, relocate) Endpoint Data Loss Prevention (edlp) - powered by Verdasys Inc. - Automated discovery of sensitive content, classifying / tagging of files, - Policy-based enforcement of data protection policy (notify, block, encrypt, remove, relocate) - Close the gap between user action and automated policy-enforced action - Removable media port control with Fine-grain control of external I/O ports Activity Compliance Monitoring & Reporting - powered by Application Security Inc. and Tivoli Compliance Insight Manager (TCIM) - Help assess the security strength of network-based database applications by identifying vulnerabilities - Locate, examine, report on and suggests fixes for security holes and misconfigurations - Policy-based, compliance-focused solution to monitor user activity across heterogeneous systems 32
33 Enterprise Content Protection (ECP) Prevent leakage of sensitive data outside and inside. Protect valuable information and comply with regulations. Framework allowing tailored solution for protection at the network and endpoint levels. In combination, or as separate components (Network / Endpoint) Proven, best technical capability from IBM Business Partners integrating with IBM Professional Security Services and Managed Security Services to protect data, brands, intellectual property and resources. Scalable to support the enterprise of any size and distribution 33
34 Definition: Podslurping Podslurping: the act of using a portable data storage device such as an ipod digital audio player to illicitly download large quantities of confidential data by directly plugging it into a computer where the data is held, and which may be on the inside of a firewall. As these storage devices become smaller and their storage capacity becomes greater, they are becoming an increasing security risk to companies and government agencies. 34
35 Enterprise Content Protection (ECP) Automated discovery of sensitive content, classifying / tagging of files Policy-based enforcement of data protection policy (prevent, allow, encrypt, etc.) Close the gap between user action and automated policy-enforced action Endpoint Network Server / Data Center Key Business Partners: - Fidelis Security Systems - Verdasys 35
36 Data-Centric Security Process Where and What is Sensitive Data What is the User Doing With It? Where Is the Data Going? Apply Risk Appropriate Policy & Actions Discovery Desktops Laptops Servers Classification Tagging Content Similarity Keyword Pattern Dictionary Context Server Application File Type User Unstructured Data Read Write Move Print Burn Copy/Paste Upload Structured Data View Delete Modify Devices Applications Networks Alert Detection Warn Awareness Prompt Justify Encrypt Protection Block Prevention Mask Need to Know Continuous Audit Logging 36
37 Complementary technologies, comprehensive protection FW Complementary technologies - IBM ISS Proventia prevents intrusions, attacks and compromises - Fidelis XPS prevents leakage of sensitive content Comprehensive protection - Inbound and outbound security for enterprise networks - Asymmetrical depth of defense 37 37
38 38 38
39 SiteProtector Unified Enterprise Security Console for all products Enterprise Protection Products Vulnerability Assessment Network Protection Server Protection Behavior Protection Data Security Services Enterprise Scanner helps to ensure the availability of your revenue producing services and protects your corporate data by identifying where risk exists, prioritizing and assigning protection activities, and then reporting on results High performance network security with real-time attack, malicious code and hybrid threat blocking. Allows secure open transactions in a SOA environment which is an effective way to preserve network availability, reduce the burden on your IT resources and prevent security breaches. Protects systems and the data that can leak from these systems Data Security -- Provides historical data that enables companies to find the origin of a change, breach or string of behavior Insider Threats -- Tracks the who, what, when, where of user/administrator behavior Compliance -- Provides the reporting necessary to prove the security of sensitive information IBM Proventia Network Anomaly Detection System (ADS) is designed to deliver a clear view of your network's behavior while automatically detecting active security threats, risky user behavior, performance issues and noncompliant activities, such as policy violations and unapproved network changes
40 BREAK 40
41 41
42 ISS Professional Security Services Professional Security Services - Assessment Services Application Security Assessment Information Security Assessment Penetration Testing PCI Assessments SCADA Assessment - Design Services - Education Services - Emergency Response Services Benefits - Identification of security weaknesses Unsecured networks and applications Weak security policies - Implementation of a best practices approach to security - Aid compliance with regulations SoX, HIPAA, GLB, PCI 42
43 IBM ISS Professional Security Services ADDME - A Proven Methodology Phase 5. Education IBM ISS Product Training Security Awareness Training Phase 4. Management and Support Emergency Response Service Forensic Analysis Service Staff Augmentation and Support Phase 1. Assessment Application Security Assessment Information Security Assessment Penetration Testing PCI Assessment SCADA Assessment Policy and ISO Gap Analysis Phase 2. Design Implementation Planning Network Security Architecture Design Policy Design and Development Standards and Procedures Development Phase 3. Deployment Deployment Services Migration Services 43
44 Application Security Assessment (ASA) Application security an often-overlooked part of a security plan - Applications house companies critical data customer information, HR data and intellectual property - Security holes in custom applications create opportunities for attackers ASA looks for the vulnerabilities in Web and custom applications - Comprehensive vulnerability assessment of the application and network infrastructure directly supporting the application - Remote attack simulation in which security experts attempt to penetrate an application, using techniques similar to those used by malicious attackers - Targeted code review to provide solid recommendations for improving application security - Assessments performed by security consultants with application development backgrounds Detailed report of findings - Specific recommendations for remediating any vulnerability found 44
45 Information Security Assessment (ISA) Comprehensive evaluation of an organization s security posture - Based on ISO security standard and industry best practices - Provides complete internal and external assessment of information security state Provides a clear understanding of current information security risks - Identifies the potential impact of vulnerabilities - Raises internal awareness of information security risks - Enables more informed decision-making and identifies the gaps in organizational security controls, policies and processes - Provides a specific, actionable plan to improve overall security posture based on business needs - Helps to meet regulatory compliance requirements Includes a thorough assessment of: - Information security policies - Procedures, controls and mechanisms - Physical security - Networks, servers, desktops and databases Detailed deliverables - Prioritized, actionable remediation steps presented in a workshop format 45
46 PCI Compliance Services IBM ISS is a Qualified Security Assessor (QSA), having met the requirements as a QSAC to perform PCI assessments IBM ISS is a Approved Scanning Vendor (ASV), having met the requirements to perform PCI DSS-approved quarterly network scans ISS PCI services include: - PCI Assessments Pre-assessment Annual on-site audit and Report on Compliance (ROC) Quarterly network scans - Remediation Assistance remediating any issues found during preassessment - Payment Application Assessments Assessing the security of payment applications IBM ISS is an Approved Qualified Payment Application Security Company (QPASC) - Visa Cardholder Information Security Program (CISP) Incident Response IBM ISS is a Visa Qualified CISP Incident Response Assessor IBM ISS can respond to security incidents and provide forensic analysis when there is a loss of cardholder data 46
47 Penetration Testing Penetration testing uncovers network vulnerabilities and assesses the business risk of those vulnerabilities - Real-life network attack simulation in which security experts attempt to penetrate a network mimicking the techniques used by malicious attackers - Demonstrates how attackers can significantly impact a business IBM ISS security expertise - More than a simple vulnerability assessment Use of a combination of proprietary and industry-leading security assessment tools, complete with an in-depth analysis of vulnerability data by a security expert - Leverages security intelligence of ISS X-Force Detailed deliverables - Prioritized, actionable remediation steps 47
48 Emergency Response Services Incident response, preparedness planning and forensic analysis experts - Responds quickly to attacks in progress - Works with customers to develop customized emergency response plans to minimize the effect of future attacks Customers benefit from: - Immediate attack response 24/7/365 to stop attacks in progress and minimize their impact - Forensic analysis to help find and prosecute perpetrators - Incident response methodology that includes steps for analysis and intelligence gathering, containment, eradication, recovery and prevention - Customized incident response plans and procedures to guide you in case of an attack Available as a subscription service or as an on demand service - Subscription service includes incident response planning and phone support to help customers prepare before a security incident occurs Customers experiencing a security emergency can call the IBM ISS Emergency Response Team 24/7/365: 48
49 Additional IBM ISS Professional Security Services Governance, Risk & Compliance Services - Strategic Threat & Risk Analysis (TRA) - Security Policy Development - Network Security Architecture Design - Security Technology Implementation Planning - Deployment Consulting - Staff Augmentation Professional Services Identity & Access Management (IAM) Professional Services - Specifically with respect to Tivoli Identity Manager (TIM) and Tivoli Access Manager (TAM) design, installation & configuration 49
50 50
51 The Power To Deliver The Most Advanced Internet Security Solutions Managed Security Services Managed Protection Services Managed and Monitored Firewall Services Managed IDS/IPS Services Vulnerability Management Service Security Event and Log Management Services Managed and Web Security Services 51
52 IBM Global Security Operations and R&D IBM has the unmatched global expertise to deliver complete solutions and manage the cost and complexity of security 52
53 Breadth of Services 53
54 Breadth of Services Managed Security Services Key Benefits Protect company assets, brand reputation and business continuity with 24x7 reliable monitoring and management Reduces in-house security costs by up to 55 percent Achieves security compliance with industry and governmental regulations Maximizes existing security investments Improves productivity by freeing IT resources to focus on strategic initiatives Reassures clients, partners and shareholders that critical data is protected by trusted resources Reduces operational complexity 54
55 Managed Protection Services (MPS) Guaranteed Protection Services Based on IBM ISS Security Technologies Proventia G (IDPS) Proventia M (UTM) Proventia Server Proventia Desktop Best-in-Class Service Level Agreements Performance based SLAs Multiple Service Level Options Standard, Select, Premium Choose services per device for custom solutions Industry Leading Customer Portal Embedded X-Force Intelligence 55 55
56 Managed Protection Service Features Industry Leading Performance-based SLAs Completely Web-Driven Interface Virtual-SOC Portal enhances customer control and SOC communications 24/7 Expert Monitoring and Management Security Incident Escalation Standard & Customizable Reporting Systrust & SAS-70 Certified SOC Integrated Vulnerability Management Subscription to XFTAS Security Intelligence 56 56
57 MPS Offerings and Service Levels Benefit from guaranteed service level agreements and a $50,000 money-back warranty ensuring 100% accountable, reliable protection* *Money-back payment (for Managed Protection Services - Premium Level only): If IBM Internet Security Systems fails to meet the Security Incidents Prevention Guarantee the customer's account shall be paid US$50,000 for each instance this guarantee has not been met. Please see IBM Internet Security Systems Service Level Agreements for more details
58 Managed Security Services (MSS) - Summary Industry Proven Managed Security Services Managed Network Intrusion Detection / Prevention Managed Network Firewall Multi-Vendor Security Technology Support Firewalls: IBM ISS, Cisco, Check Point, Juniper IPS: IBM ISS, McAfee, Sourcefire Best-in-Class Service Level Agreements Multiple Service Level Options Standard, Select Standard, Select, Premium Industry Leading Customer Portal Embedded X-Force Intelligence 58 58
59 Managed IPS & Firewall Service Features Best-of-Breed Security Platform Support ISS (IDS/IPS), Cisco (IDS/IPS), Sourcefire, McAfee (IPS) Check Point, Cisco, Juniper, ISS Completely Web-Driven Interface Virtual-SOC Portal enhances customer control and SOC communications Industry Leading Performance-based SLAs Systrust & SAS-70 Certified SOC Integrated Vulnerability Management Access to XFTAS Security Intelligence 24/7 Expert Monitoring and Management Security Incident Escalation (IPS Service) Standard & Customizable Reporting 59 59
60 Managed IDPS Service Features Summary Network Features Standard Level Select Level In which document can the latest platform support and sizing information be found? IDS/IPS: Policy management: Device management: Critical attacks, denial of service, and worms Performed by IBM Performed by IBM All Attack activity, suspicious activity, and network misuse Performed by IBM, unlimited policy change requests per month Performed by IBM Security event monitoring: Vulnerability Management: Log Storage / Availability: Health and Availability Monitoring: Security Content Upgrades: Customer Portal Access: Detailed Reporting: Out of Band Required: High Availability: Automated analysis; escalation 1 IP Quarterly 1 year Yes Yes Yes Yes Optional Optional Add-on Capabilities When supported by the platform Automated plus realtime 24/7 human analysis; or telephone escalation 2 IPs Quarterly Up to 7 Years Yes Yes Yes Yes Yes When supported by the platform 60 60
61 61 61 Managed Firewall Service (MFW) Features Summary Network Supported Bandwidth: Features Policy or Configuration In which document Changes Per Month: can the latest platform support Emergency and Policy sizing information Changes be per Month: found? Maintenance Window for Policy / Configuration Changes: Site to Site VPN Support: Client / SSL VPN Support: Vulnerability Assessment: Log Storage / Availability Device Management: Health and Availability Monitoring: Application / OS Upgrades: Customer Portal Access: Detailed Reporting: Out of Band Required: High Availability: Standard Level Up to 100MB* 2 No No Up to 2 Tunnels No 1 IP Quarterly 1 year Yes Yes Yes Yes Yes Optional Optional Add-on Capabilities When supported by the platform Select Level 100MB through 1 GB and up* 4 No No Unlimited Yes 2 IPs Quarterly Up to 7 Years Yes Yes Yes Yes Yes Yes When supported by the platform Premium Level 100MB through 1 GB and up* Unlimited 1 Yes Unlimited Yes 3 IPs Quarterly Up to 7 years Yes Yes Yes Yes Yes Yes When supported by the platform
62 Managed Unified Threat Management (UTM) Service Unified Threat Management (UTM) Customizable support for best-of-breed multi-function devices Multi-Vendor Security Technology Support IBM ISS, Cisco, Juniper, Check Point Best-in-Class Service Level Agreements Multiple Service Level Options Standard, Select, Premium Industry Leading Customer Portal Embedded X-Force Intelligence 62 62
63 Managed Unified Threat Management (UTM) Service Features Best-of-Breed Security Platform Support IBM ISS, Cisco, Juniper, Check Point Completely Web-Driven Interface Virtual-SOC Portal enhances customer control and SOC communications 24/7 Expert Monitoring and Management Security Incident Escalation Two Packages Protection Content Multiple Service Levels Standard, Select, & Premium Standard & Customizable Reporting Industry Leading Performance-based SLAs Systrust & SAS-70 Certified SOC Integrated Vulnerability Management Embedded XFTAS Security Intelligence 63 63
64 64
65 Security Enablement Services Key Benefits Centralized command center to monitor and control Virtual-SOC services Run queries and generate reports on multi-vendor security devices, security events, service level agreement (SLA) activity and more Automated analysis of security events and logs alerts for remediation Unlimited archive system stores one year of online event/log storage and seven years of offline archiving Authorized access to portal for increased internal protection Integrated with X-Force security intelligence feeds and daily threat assessments 65
66 Vulnerability Management Service Internal & External Vulnerability Assessments Vulnerability Remediation Workflow Embedded Step-by-step Remediation Actions Complete Ticketing System Virtual Patch ties to MPS/MSS Granular Access Control & Permissions Fully functioned Reporting Industry Leading Customer Portal Embedded X-Force Intelligence 66 66
67 Vulnerability Management Service - SLAs Vulnerability Scan Execution Scan will execute +/-1 hour of scheduled time. Virtual Patch Application Virtual patch will be applied within 2 hours of request. Proactive System Monitoring (Internal) 15 minute notification of internal agent unreachable. Security Content Update Content updates completed within 72 hours of release. Customer Portal 99.9% uptime Internet Emergency 15 minute notification 67 67
68 Security Event & Log Management Service (SELM) Log and Event Collection & Archival Syslog, Universal Logging Agent (ULA) On Site Aggregation, Compression, Encryption Secured Communications Forensically Sound Storage Automated Alerting (Select Level Only) Security Incident Tracking Systrust and SAS-70 Certified SOC Industry Leading Customer Portal Embedded X-Force Intelligence 68 68
69 X-Force Threat Analysis Service X-Force Threat Analysis Service News Vulnerabilities Exploits Worms/Virus Breaking Security Intelligence Alerts Configurable Alerting/Advisories Daily s Direct Feed from X-Force Research 30,000+ Records 69 69
70 Managed & Web Security Features: 100% Virus Protection 99.2% Spam Effectiveness with 1 in 1 Million False Positives 90%+ effective in identifying pornographic attachments Enforces Acceptable Use Policy Multiple Layers of Defense Highly redundant infrastructure Assists in stopping confidential information leaving your company Industry Leading Performance-based SLAs 70 70
71 Managed & Web Security Service Details: Anti-Virus - Multiple Scanners - Inbound & Outbound Filtering - Proactive scanning for new threats - Phishing detection - Protection for Zero-Hour Outbreaks - 7-day offsite Virus Quarantine - 100% protection against known and unknown Viruses Anti-Spam - Multiple filters - TCP/IP Traffic Shaping - Highly Effective with minimal False Positives - Transparent Knowledge Base Updates - Multiple-handling options, including end user Quarantine; Confidence to block and delete on signature detection - Configurable White and Black lists 71
72 Managed & Web Security Service Details: Image Control - Proactive Monitoring - Detects 90%+ of borne inappropriate image attachments - Fights Harassment in the workplace and protects Company image - Configurable Sensitivity settings to adjust based on your appetite for risk - Supports Compliance with Internet Acceptable Use Policy and Legal Liability Content Control - Protect Corporate and brand reputation - Maintain Confidential and Intellectual Property - Advance Policy setting criteria including, Group, Users, Sizes, Types, Times of Day - Keyword & Contextual Analysis - Investigate suspicious activity - Preserve Confidentiality and Security and reduce Legal Liability - Defend against careless and malicious actions 72
73 Managed & Web Security Service Details: Web Web Anti-Virus/Anti- Spyware - Real-time Scanning and Analysis of Web Traffic - Combined protection from Spyware, Viruses and all other types of Malware at the Internet level - Skeptic Technology layered over multiple commercial scanning engines - Converged Threat Analysis, taking recent threat information from and IM and applying to Web - Customizable Block messages and alerting Web URL Filter - Combined Real-Time filtering with Sophisticated URL Categorization database - Policy engine with intuitive rule-building - MIME and file type lists - Customizable Block Messages and Alerting - Content Categories include Webmail, blogs, chat and uncategorized - Enforces Web Acceptable Use Policy - Optimizes bandwidth 73
74 74
75 Rick Young, Account Executive IBM Internet Security Systems Questions? 75
76 Thank You! Rick Young, Account Executive IBM Internet Security Systems THE VEHICLE THE SKILL THE SOLUTION
IBM Internet Security Systems
IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager norberto_gazzoni@it.ibm.com +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation
More informationManaged Security Services Portfolio
Managed Security Services Portfolio Managed Security Services Professional Services Security Hardware and Software What is on the truck IBM ISS Agenda An introduction and statement of capability Virtual
More informationIBM Global Technology Services Preemptive security products and services
IBM Global Technology Services Preemptive security products and services Providing protection ahead of the threat Today, security threats to your organization leave little margin for error. To consistently
More informationIBM Internet Security Systems products and services
Delivering preemptive security products and services IBM Internet Security Systems products and services Highlights Helps protect critical assets and reduce costs by preempting online threats Helps secure
More informationIBM ISS Optimizacija Sigurnosti
IBM ISS Optimizacija Sigurnosti Slaven Novak IBM ISS Technical Sales Specialist slaven.novak@hr.ibm.com 1 The Business Challenge: New Methods and Motives: Adding to the complexity and sheer number of risks
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationEstablish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions
Providing stronger security practices that enable PCI Compliance and protect cardholder data. Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions Highlights Offers pre-assessment
More informationIBM Global Technology Services Preemptive Security Products and Services
IBM Global Technology Services Preemptive Security Products and Services IBM Internet Security Systems Ahead of the threat Today, security threats to your organization leave little margin for error. To
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems
IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated
More informationManaged Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationInformation & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
More informationExtreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationAdopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationClavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationThe Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It
The Evolution of Managed Security ISS Virtual-SOC Solution, Security the Way You Need It Copyright 2006 Internet Security Systems, Inc. All rights reserved worldwide The Evolution of Managed Security :
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationIntroducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
More informationIBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
More informationSecurity Event and Log Management Service:
IBM Global Technology Services December 2007 Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management Page 2 Contents 2
More informationManaged Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
More informationSecurity. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
More informationDEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationIBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationEndpoint Security More secure. Less complex. Less costs... More control.
Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap
More informationEnd-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
More informationManaged Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationCloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationMarch 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationGFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More informationBoosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
More informationWebsense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
More informationAlcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationIBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
More informationIBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationDefending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationHow To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
More informationHow To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
More informationCLOUD GUARD UNIFIED ENTERPRISE
Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you
More informationUnified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
More informationDer Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
More informationThe webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationSelecting a Managed Security Services Provider: The 10 most important criteria to consider
IBM Global Technology Services Thought Leadership White Paper May 2011 Selecting a Managed Security Services Provider: The 10 most important criteria to consider 2 Selecting a Managed Security Services
More informationEffective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
More informationModular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
More informationConcierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
More informationClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: iselia@odysseyconsultants.com,
More informationUnified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES
Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)
More informationwww.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationAchieving SOX Compliance with Masergy Security Professional Services
Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationCORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com
More informationComprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
More informationInformation Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
More informationagenda 5 IBM ISS security consulting solutions 6 Reduzca costos y la complejidad de la seguridad en su negocio
Reduzca costos y la complejidad de la seguridad en su negocio Juan Carlos Carrillo Security Sales Leader Viernes, 11 de Septiembre de 2009 agenda 1 2 3 X-Force 2008 Trend & Risk Report Highlights IBM Security
More informationGlasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
More informationIBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
More informationThe McAfee SECURE TM Standard
The McAfee SECURE TM Standard December 2008 What is the McAfee SECURE Standard? McAfee SECURE Comparison Evaluating Website s Security Status Websites Not In Compliance with McAfee SECURE Standard Benefits
More informationSymantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationProactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
More informationFirewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
More informationContinuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
More information