CNS Security and Network Monitoring. Managed Services Description

Size: px
Start display at page:

Download "CNS Security and Network Monitoring. Managed Services Description"

Transcription

1 Page 1 of 20 CNS Security and Network Monitoring Managed Services Description Author(s) Martin.Dipper@cnsuk.co.uk Date 16 th January,2012 Version V1.00

2 Page 2 of 20 INDEX 1 DOCUMENT CONTROL ISSUER DETAILS DOCUMENT HISTORY NON-DISCLOSURE STATEMENT INTRODUCING SECURITY AND NETWORK MONITORING SERVICE SECURITY AND NETWORK MONITORING SERVICE INTRODUCTION SECURITY AND NETWORK MONITORING SERVICE SUMMARY CLIENT QUICK START KEY FACTS CLIENT RESPONSIBILITIES All Managed Services Security and Network Monitoring Service MANAGED SERVICES TEAM ENGAGEMENT CNS MANAGED SERVICES TEAM NOTIFICATIONS TO CLIENTS FROM SERVICE DESK OPERATION OF SECURITY AND NETWORK MONITORING SERVICE SERVICE INITIATION LOG WATCH MANAGEMENT CENTRE LOG ENGINE ADDING DEVICES ADDING USERS AND GROUPS LOG ENGINE INSPECTOR LOG ENGINE LIVE FEED LOG ENGINE RULE MANAGEMENT LOG ENGINE REPORTING LOGWATCH MANAGEMENT CENTRE MONITORING LOGWATCH MANAGEMENT CENTRE PORTAL CHANGE REQUEST SECURITY AND NETWORK MONITORING SERVICE - SUPPORTED VENDORS... 20

3 Page 3 of 20 1 DOCUMENT CONTROL 1.1 ISSUER DETAILS Issuer (Convergent Network Solutions Limited) Address 76 Cannon Street, London, EC4N 6AE Telephone Fax Author(s) Martin.Dipper@cnsuk.co.uk Reviewer(s) Jason.Moody@cnsuk.co.uk;Paul.Rose@cnsuk.co.uk 1.2 DOCUMENT HISTORY Date Issue Version Type/Change 16/01/ First Version 1.3 NON-DISCLOSURE STATEMENT This document contains intellectual property rights and copyright, which are proprietary to. The work and the information it contains are submitted for the purpose of advising on the operation of the Security and Network Monitoring Managed Service. It shall not be copied or disclosed to third parties in whole or in part without the prior written consent of.

4 Page 4 of 20 2 INTRODUCING SECURITY AND NETWORK MONITORING SERVICE 2.1 SECURITY AND NETWORK MONITORING SERVICE INTRODUCTION Welcome to the CNS Security and Network Monitoring Services Description. Establishing and maintaining a secure infrastructure is a key business requirement for many organisations, often enforced by stringent regulation. In recent years there has been significant growth in regulatory mandate and best practice advice from many groups. However, the tools and services for cost effective monitoring for small and medium enterprises (SME) have not always been readily available or affordable. Many vendors will sell you a solution that is complex to operate and manage as well as requiring expensive hardware and software maintenance agreements. Coupled with this is the need to keep suitably qualified staff trained in the technology and the threats and very quickly the cost can become prohibitive. CNS MOSAIC (Managed Operations, Security, Assurance, InfoSec & Compliance) overcomes these problems for SME s by delivering a complete set of managed services that will protect your corporate assets wherever they are exposed to compromise or attack. Our services provide protection across your network estate safeguarding the perimeter, critical internal assets, corporate data, remote users, clients and partners alike. Our services provide insight and remedy to infrastructure events impacting your business operation whilst also offering key controls in line with regulations such as PCI. Security and Network Monitoring is part of the MOSAIC portfolio that delivers real time monitoring of the clients infrastructure linked to our 24x7 Service Desk located in London, UK. As a leading PCI DSS QSA and CESG accredited company, CNS fully appreciates the challenges faced by IT Departments, CIO s, CISO s and network managers in their need to access, interpret and map actionable intelligence in line with regulation and security best practice. The seemingly daunting task of logging, detecting and alerting on the millions of events occurring daily can be overwhelming. For those companies able to overcome the technical and aspects of deploying the necessary technology there is then the more challenging question of how to deliver the on-going daily management and response to alerts. With the launch of the Security and Network Monitoring Service CNS are positioned to deliver on-going monitoring, alerting and professional wrap around services that enable security best practice within our clients. The service is built and targeted towards small and medium enterprise clients

5 Page 5 of 20 without the bloat ware provided in many vendor solutions and services. CNS owns the logging and monitoring technology, are responsible for the service, maintaining availability and responding to alerts and events. Typically the process is as follows: o A CNS consultant scopes the client logging and monitoring needs and offers best practice guidance for log alerting and retention. o The CNS Service Desk build a hardened Log Watch Management Centre (LWMC) in our secure NOC that is customised to the needs of our client. No two needs are the same and each appliance is built for the client infrastructure, it is not one size fits all. o The CNS Service Desk will deploy the Log Watch Management Centre on the client site and deploy the rules engine to capture all security, network and IT events. o The CNS Service Desk will then tune the appliance over the next 30 days ensuring the appropriate level of logging and priorities are applied. With the launch of the Security and Network Monitoring Service CNS is able to offer extended benefit and cost savings beyond that of traditional standalone auditing tools and other complex SIEM appliances available in the market today, plus deliver intelligence for on-going protection against threats. The service is fully supported by CNS highly accredited understanding of secure design and security best practices. Our clients will receive a much extended level of benefit along with the extra level of IT assurance offered by qualified consultants.

6 Page 6 of SECURITY AND NETWORK MONITORING SERVICE SUMMARY The table below illustrates s summary of the service offering. Service Features CNS Solutions Group CNS Managed Services Enablement Service design and installation LWMC appliance(s) build and delivered to site Reconfiguration of client network devices Configuration and deployment of appliance(s) Add client devices and applications into LWMC Configure user accounts and setup device portal Validate all users connected and operational Assistance with tuning requests first 30 days Tune service during the first 30 days Assistance with migration from a third party platform Management LWMC appliance(s) lifecycle management LWMC server appliance(s) fault and performance management LWMC server appliance(s) health monitoring LWMC client policy management User configuration assistance LWMC updates and additions to the service Administrator Portal with RBAC Service Features Near real time detection of defined events Customised alerting on events and incidents Intuitive Rules Engine for ease of use and visibility Business hours or 24x7 Service Desk support Technical assistance with updates Technical support with service issues SLA'd response to incidents Daily backup of logs to off-site storage Access to all logs on site through portal Ability to undertake filtered searches on logs Ticketing of all incidents Monthly reports Quarterly service reviews(2) Assistance with remediation of issues on site(1)

7 Page 7 of 20 (1) Additional work outside the service which may require the purchase of Fault Management time or Solutions (Professional Services) time. (2) Quarterly Service Reviews will depend on the mix of services provided to the client and annual spend. 3 CLIENT QUICK START 3.1 KEY FACTS For prospects and new clients, it is important to understand some key helpful facts regarding the service, as follows: The Security and Network Monitoring Service is delivered using at a minimum, one device located on the client site: o Log Watch Management Centre contains the Log Engine, Rules Engine, Portal and Administration facilities that enables the retrieval, inspection and storage of client logs and events. o Depending on the location of the client devices to be monitored and the network architecture, more than one Log Watch Management Centre may be required. Business Take On (BTO) - CNS uses a structured BTO process to implement new clients or existing clients bringing on additional devices. The BTO approach is managed by a qualified project manager for a client that is new to the service. The project manager will contact the client as soon as possible after the contract is signed and arrange for an initial conference call to agree with the client the process for implementing the service. As part of the implementation, a CNS technician will work with the client to gather the necessary technical information (e.g. infrastructure auditing, server auditing etc) that allows CNS to enable the service. This information differs between clients, but your CNS contacts will be skilled in rolling out new services and guide you through every step of the process. Service Desk - This is the services support desk. It will be the main point of contact for all Security and Network Monitoring Service technical issues and queries. The contract will detail the hours of support but all clients can call during business hours for any issues relating to the service. The Service Desk will assist with and own the query, with the issue being ticketed and given a support reference number. Details on contacting the Service Desk are given further on in this document. Service Management - A service manager will be assigned to the client and visit at least once a quarter to conduct a service review. This will provide the client the opportunity to go through the reports

8 Page 8 of 20 on the services performance and discuss any issues of importance during the last quarter. We recommend the review as it helps clients get extra value from the service and provides feedback for CNS to help improve the service. Client Points of Contact (PoC) - We will ask for authorised points of contacts (PoC) for all services. The CNS Service Desk staff needs to know they are speaking with authorised and approved client contacts and the team will work with the client to build an authorised contact list which is stored securely in the CNS Service Desk. Escalation Contacts - Depending on provisioning, the Service Desk may also ask for client escalation contacts in the event of a specific incident occurring. As an example, if a specific event is seen that significantly affects the client s security posture, the CNS Service Desk will need to contact a specific resource within the company. Communication - Additional communication will occur when we see a specific event that matches a condition or alert which the Service Desk knows will impact the client business. Typical of these communications are: o A device becomes unavailable and we advise next actions. o The device operating parameters are outside of normal. o We have seen suspicious or unauthorised activity. o An event has occurred which will compromise your security posture or network operation. o A serious vulnerability has been discovered that could lead to a major compromise. The natures of the communications are manifold but the Service Desk role is to be the ears and eyes on your Security and Network Monitoring Service and to offer advice and assistance as appropriate. Client Portal The Log Watch Management Centre contains a client portal for authorised client contacts only. A Role Based Access Model (RBAC) is deployed on the portal and the CNS Service Desk will assist in defining the correct access for client users. The portal will contain at a minimum the following features o View logs and alerts generated from devices including a live feed. o Add, edit or remove a device (working with CNS Service Desk). o Administer the system by adding, editing and deleting users (if authorised). o Define logging rules, based on application event ID and specify whether to Alert, Acknowledge, Log or Drop (working with CNS Service Desk).

9 Page 9 of CLIENT RESPONSIBILITIES While a majority of the tasks and responsibilities associated with the delivery of security services are handled by CNS Managed Services, the client still maintains the following responsibilities to ensure the successful delivery of services All Managed Services Clients are responsible for the following: Coordinating any changes to the network security architecture, that may impact the CNS detection ability in advance. These changes should be communicated 24 hours (during the business week) prior to the actual change window. At minimum, this includes: o Changes to systems that are logging and reporting to the CNS hosting centre. o Changes to network architecture and/or switch configurations that may impact the traffic presented to CNS. o Ensuring contact information for all authorized client POC(s) stays current. Out-of-date contact information impacts timely ticket notification and incident escalation. o Where appropriate, ensuring all client owned networks are registered with the Service Desk. This information can be critical when responding to an event. o Providing feedback to CNS on service delivery so that continuous improvements can be made Security and Network Monitoring Service Clients are responsible for the following: A secure site-to-site Virtual Private Network (VPN) tunnel between Convergent s Network Operating Centre (NOC) and the client target site. CNS will ensure remote access to the client site is only permitted via CNS on-site log agent. The VPN will be provided by utilising the client hardware and Internet connection. Encryption, hashing and Diffie Helman group algorithms to be agreed between CNS and client depending on client hardware capabilities. Ensure that the Log Watch Management Centre(s) are properly installed in a network rack, powered and connected to the client network environment. A CNS technician will assist with this. Allow the CNS Log Watch Management Centre access through switches and border security devices to transport events and device information. The following ports are required to be opened: o TCP 22 (SSH) Secure shell access to client devices.

10 Page 10 of 20 o TCP 25 (SMTP) For nodes to send alerts to central portal for CNS alerting. o TCP 80 (HTTP) Integrated Lights Out management of Log Watch Management Centre. o TCP 443 (HTTPS) - For Log Watch Management Centre to send alerts to central portal for CNS alerting. o TCP 3142 (Updates) How the Management Centre and portals update information. o TCP 6556 (Check_MKAgent) Log Watch Management Centre and portal network management. o UDP 53 (DNS) How the Log Watch Management Centre and portals resolve names. o UDP 123 (NTP) For Log Watch Management Centre and portal to sync against an atomic clock. Configure the following access list requirements on the firewall for access between devices and nodes: From To Service Explanation Client Devices That Client Push client device logs to either central UDP 514 Require to be Logged Portal client portal or separate logging node Allows client Log Watch Management All Client Log Watch CNS Update TCP 443 Centre to obtain updates from CNS Management Centres Server architecture Configure security devices and log collection servers to accept CNS access. Provide technical support for any network-related issues during service initiation.

11 Page 11 of 20 4 MANAGED SERVICES TEAM ENGAGEMENT 4.1 CNS MANAGED SERVICES TEAM The CNS Managed Services team operates from a secure Network Operations Centre in London and all client systems are hosted in a secure and resilient environment. The main contact for all Security and Network Monitoring Service client queries and issues is the CNS Service Desk which can be contacted as below: Name Address Direct Dial Details Service Desk servicedesk@cnsuk.co.uk +44 (845) When using , clients should be aware that due to the lack of strong authentication and audit capabilities, this option may require verbal follow up and confirmation the Service Desk is communicating with a valid and authorised client contact. The Service Desk consists of: Technical Service Engineers who will answer the phone and resolve client queries. Service Manager responsible for all contracts and administration and performing service reviews to an agreed schedule. Service Desk Team Lead responsible for the Service Desk, client satisfaction and formal escalation point. Head of Managed Services responsible for the operation of the managed services and the Service Desk. 4.2 NOTIFICATIONS TO CLIENTS FROM SERVICE DESK The client will, based on the services subscribed to, receive the following notifications from the Service Desk. Ticket Notification - Authorised client contacts will receive notification of tickets by ensuring their contact details stored by CNS are accurate and up-to-date. A valid business address and a configured subscription to the relevant services are required to receive notifications sent based on the following conditions: o The ticket requestor always receives update notifications. o Tickets assigned to specific devices or events are sent only to POCs associated with the device/ event. o Tickets not assigned to specific devices or events are sent to all POCs subscribed to the specific service.

12 Page 12 of 20 Incident Notification - Authorised client contacts may subscribe to receive notifications of specific incidents based on the following conditions: o The incident affects a device or an event belonging to the contacts company. o The incident or events assessed severity met or exceeded the thresholds set by the contact. Escalations to clients where there is a recurring incident activity tracked within a single open ticket, telephone escalations are attempted to authorised client contacts

13 Page 13 of 20 5 OPERATION OF SECURITY AND NETWORK MONITORING SERVICE This section outlines the elements of the managed service and what clients can expect to see in daily operation. 5.1 SERVICE INITIATION The following documents are required for CNS Managed Services to proceed with the provisioning of new or additional services: Signed Security and Network Monitoring Service Agreement. Signed Managed Services Terms & Conditions. Client Purchase Order. Sales Order Form. Upon receipt of these, CNS will begin the BTO process. The BTO process is detailed below and a PMO resource will contact the client to arrange the first conference call or meeting. At the first conference call or meeting the PMO will explain the process and introduce a draft project plan, along the lines of the below: A job sheet is raised to include services, resources, hardware and software required. Client actions identified and documented. Site survey and audit scheduled / reviewed. Log Watch Management Centre builds construction and send to site. CNS VPN connectivity established. Installation of device on client site(s) and final device configuration, including SNMP monitoring setup (for CNS monitoring). Client action contacts, configurations uploaded and deployed. Base lining tuning of all logging, monitoring and alerting features. Documentation completed and checked. Finalisation internal sign off, BTO sign off, contacts and documentation in CNS help desk. Go live fully functional service, supported by CNS Service Desk. It is during the baselining process that the client logs will be setup to alert for the event IDs and expressions being monitored. During this important phase a CNS resource will: Ensure that all devices are logging to the Log Watch Management Centre and logs are being successfully received. Ensure that the Log Watch Management Centre events catalogue is populated with the events and expressions required by the client. Setup the Log Watch Management Centre rules engine to parse the logs for the events and expressions.

14 Page 14 of 20 Ensure that all events and expressions are being captured and detailed in the Log Watch Management Centre portal. Agree logging and alerting response to specific events with the client and document. Transfer to live service by cutting alerts across to the CNS Service Desk at the agreed time. 5.2 LOG WATCH MANAGEMENT CENTRE The Log Watch Management Centre (LWMC) is the purpose built hardened Linux appliance that sits on the client site. LWMC contains all the hardware and software components necessary to detect, log, monitor and alert to events on the client site. The appliance contains administration and portal functionality that allows local read only access to the events and also is linked to the CNS Service Desk for near real time alerting. 5.3 LOG ENGINE Log Engine is a component of the LWMC and collates information from multiple vendor devices and ensures logs are parsed, normalized, indexed and alerted on in real time. Once the logs are received, Log Engine uses a rules based engine and catalogue of events to allow the client to define the alerts required founded on specific requirements or internal business issues. The results are presented to a local portal where they can be accessed and retrieved by authorised client contacts. 5.4 ADDING DEVICES Devices are added to the service using the Administration Tab in the portal on the LWMC (Administration/Devices/Add New Devices). All new devices will be added by CNS Service Desk personnel, using the information below as part of the Business Take On (BTO) service.

15 Page 15 of 20 Additional devices installed once the service is live will go through the same BTO process. The client will also be able to see a list of devices installed on the service under the Devices tab in the portal. 5.5 ADDING USERS AND GROUPS It is possible to add and edit users in the LWMC portal as follows. Select Administration/Users and an authorised client contact will have the ability to add and edit users in the portal. Users will have read only access to the portal functions as this is a managed service, although it is possible for an authorised client administrator to add users.

16 Page 16 of 20 The Add Group function will only be available to the CNS Service Desk who control the RBAC model in the portal. The Service Desk will help setup and define groups for the client organisation. 5.6 LOG ENGINE INSPECTOR It is possible to view the logs received by going to Products/LogEngine/Inspector. From here logs are displayed and it is possible to search using filtered parameters. All logs can be interrogated and specific events queried and interrogated using the search engine provided. Multiple filters can be applied as per the image above. To the left of the main log display is a separate view of the devices logging with the ability to search the logs by year and then month.

17 Page 17 of LOG ENGINE LIVE FEED It is possible to view a live feed by going to Products/LogEngine/LiveFeed. The Live Feed as the name implies displays the latest log entries as and when they come through to the LWMC portal. Clients should allow several minutes for the incident to appear in the portal based on the connectivity between the device on which the incident occurred and the portal. The Live feed will list events in the order they arrived with the newest on top. The top of the page displays the number of logs queued for review which should normally be zero, plus to the right of this a circle will appear every five seconds indicating the feed is operational and checking for new entries. 5.8 LOG ENGINE RULE MANAGEMENT The events to be logged and alerted are defined explicitly in the LWMC Portal - Service Catalogue, accessible from the GUI below at Products/Log Engine/Rule Management/Add. The GUI displays the event IDs and regular expression that the rules engine is able to search for. The Service Catalogue contains all the events, expression and strings listed by device/application and are updated frequently by CNS. Please note that the Service Catalogue on site may not contain all the currently available entries. The Service Desk will add, modify and delete Service Catalogue entries at the request of clients and ensure that all additions are made. New event IDs and expressions to be logged, alerted, acknowledged or dropped are selected using the GUI and added to the client rules. The GUI is illustrated below and clearly illustrates on the right hand side the items to be logged and alerted.

18 Page 18 of 20 Additionally, when first opened, the display at Products/LogEngine/Rule Management will display a list of the active rules and description as below: 5.9 LOG ENGINE REPORTING It is possible to access the logs in a reporting format by going to Products/LogEngine/Reporting. This will enable an alternate view as below:

19 Page 19 of 20 An additional function in this section is the ability to Acknowledge alerts, key for some regulations. By clicking the Acknowledge box, the system will record the date and time the event was acknowledged. In addition, it is possible to select and create reports by using the reports feature from the Administration tab and: Selecting a time period. Selecting one device or a range of devices. Selecting an event or range of events. Once the above are selected, the output will be delivered as a PDF report which can be saved or printed LOGWATCH MANAGEMENT CENTRE MONITORING The Service Desk will actively monitor the Log Watch Management Centre(s) for the following KPIs: Response Time >1000 milliseconds Uptime >99% CPU Utilisation >80% Memory Utilisation >80% Environmental alert Additional KPIs may be monitored based on individual and specific implementations LOGWATCH MANAGEMENT CENTRE PORTAL The LogWatch Management Centre Portal provides visibility into the managed service activities. Authorised client users will be given access to the portal form where they will be able to: Inspect a live log feed. Inspect the log events held in the system. Use a Search tool to filter for specific log events. Check logging events configured in the event catalogue. Inspect the rules defined for all log events. Modify local client users and their access rights. Run reports for selected devices and events CHANGE REQUEST Change Management encompasses any configuration change initiated by the client that may affect the operation of the Log Watch Management Centre. Internally CNS uses an ITIL based change control process supported by a Change Advisory Board (CAB) and we recommend all clients adopt the same internal approach. Change requests that could affect the service can include policy changes, gateway-to-gateway and remote-user-to-gateway Virtual

20 Page 20 of 20 Private Network (VPN) changes for firewalls and UTMs/ISAs, or configuration changes to client-to-gateway and gateway-to-gateway VPN connections plus any changes on servers and security devices that the client thinks will impact the service as follows: For networking and policy changes as described above, please contact the Service Desk who will initiate a change control process and agree a time with you to initiate the changes. For additions of new devices or new services, please contact the Service Desk in the first instance who may put you in touch with the service manager or your account manager. For deletions and modifications to devices or services, please contact the Service Desk who will be able to assist you. To initiate a change of service request or device add/modify/delete, only an authorised client PoC may contact the Service Desk. Based on the nature of the request, additional documentation may be required prior to completing the request. This may include: A new Security and Network Monitoring Service Agreement or additions to an existing agreement. Submitting a PO. Undergoing a Business Take On (BTO) process for the new device/service SECURITY AND NETWORK MONITORING SERVICE - SUPPORTED VENDORS For the latest update, please contact the CNS Service Desk direct. Log Engine All major vendors supported, contact CNS

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

EA-ISP-012-Network Management Policy

EA-ISP-012-Network Management Policy Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Customer Service Description Next Generation Network Firewall

Customer Service Description Next Generation Network Firewall Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Interoute Communications Limited

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

ThreatSpike Dome: A New Approach To Security Monitoring

ThreatSpike Dome: A New Approach To Security Monitoring ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0 Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

How to Develop a Log Management Strategy

How to Develop a Log Management Strategy Information Security Services Log Management: How to develop the right strategy for business and compliance The purpose of this whitepaper is to provide the reader with guidance on developing a strategic

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

PCI Compliance in Multi-Site Retail Environments

PCI Compliance in Multi-Site Retail Environments TECHNICAL ASSESSMENT WHITE PAPER PCI Compliance in Multi-Site Retail Environments Executive Summary As an independent auditor, Coalfire seeks to be a trusted advisor to our clients. Our role is to help

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

MANAGED FIREWALL SERVICE. Service definition

MANAGED FIREWALL SERVICE. Service definition MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Feature. Log Management: A Pragmatic Approach to PCI DSS

Feature. Log Management: A Pragmatic Approach to PCI DSS Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

PSN Protective Monitoring. Service Definition

PSN Protective Monitoring. Service Definition PSN Protective Monitoring Service Definition Issue Number V3.0 Document Date 29 September 2015 Author: R.N. Connor Classification UNCLASSIFIED Version G-Cloud 7 2015 Copyright Tenian Limited. All rights

More information

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities

More information

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security

More information

G-Cloud Managed Exchange SaaS. Service Description

G-Cloud Managed Exchange SaaS. Service Description G-Cloud Managed Exchange SaaS Service Description Version No: 5.0g Date: 08/04/2014 Table of Contents FEATURES... 3 OPTIONAL FEATURES... 4 BENEFITS... 4 CONNECTED SERVICES... 4 SERVICE REQUIREMENTS...

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security CIP-005-3 Audit Approach, ESP Diagrams, Industry Best Practices September 24 25, 2013 SALT LAKE CITY, UTAH

More information

See all, manage all is the new mantra at the corporate workplace today.

See all, manage all is the new mantra at the corporate workplace today. See all, manage all is the new mantra at the corporate workplace today. 1) Do you want to schedule backups, software updates using just one consistent automation platform? 2) Do you want a product that

More information

G-Cloud 6 Service Definition DCG Enterprise Backup Reporting Service

G-Cloud 6 Service Definition DCG Enterprise Backup Reporting Service G-Cloud 6 Service Definition DCG Enterprise Backup Reporting Service G-Cloud 6, Service Description, DCG Enterprise Backup Reporting Service Page 1 of 16 CONTACT INFORMATION Guy Silver T: +44(0) 7990 690087

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project. chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

AlwaysMail. Sector 5. Cloud E-Mail

AlwaysMail. Sector 5. Cloud E-Mail AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?

More information

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LogInspect 5 Product Features Robust. Dynamic. Unparalleled. LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

Turn-key Vulnerability Management

Turn-key Vulnerability Management Turn-key Vulnerability Management Security Manager The solution for IT security in your organisation Security issues: How many? Where are they? How can I correct them? Compliance: Has it been achieved

More information

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers May 2010 Cloud Vendor Charter Vendor Version Not for distribution to customers Disclaimer This specification is published without responsibility on the part of BASDA Ltd or the various contributors, sponsors

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

CWSI Service Definition for Server Monitoring

CWSI Service Definition for Server Monitoring CWSI Service Definition for Server Monitoring October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1. About CWSI... 4 2.

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

24x7 Managed Cyber Security for a Process Control Network

24x7 Managed Cyber Security for a Process Control Network 24x7 Managed Cyber Security for a Process Control Network Clayton L. Coleman, CISSP Senior Consultant, Cyber Security Invensys Process Systems Simon Clifford Senior Consultant Integralis Collaborating

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Cisco OnPlus Service. Economically Deliver Managed Network Services

Cisco OnPlus Service. Economically Deliver Managed Network Services Data Sheet Cisco OnPlus Service Economically Deliver Managed Network Services In today s competitive business environment, IT solution providers are increasingly looking to managed and cloud services as

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure. Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security

More information

MicroStrategy Cloud Enterprise User Guide Version 2

MicroStrategy Cloud Enterprise User Guide Version 2 MicroStrategy Cloud Enterprise User Guide Version 2 Service Definition and Policies February 26, 2014 Copyright 2014 MicroStrategy, Inc. All Rights Reserved. TABLE OF CONTENTS MicroStrategy Cloud Platform

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery

More information

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...

More information