CALNET 3 Category 7 Network Based Management Security. Table of Contents



Similar documents
State of California California Department of Technology Statewide Technology Procurement Division

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

PART D NETWORK SERVICES

SERVICE LEVEL AGREEMENT

Advantages of Managed Security Services

Schedule M Managed Security

V1.4. Spambrella Continuity SaaS. August 2

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Core Protection Suite

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SERVICE LEVEL AGREEMENT

Definition & Limits of Service

On and off premises technologies Which is best for you?

Concierge SIEM Reporting Overview

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

SERVICE LEVEL AGREEMENT

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Symantec Hosted Mail Security Getting Started Guide

Securing enterprise collaboration through and file sharing on a unified platform

Protect Your Enterprise With the Leader in Secure Boundary Services

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Configuration Information

Payment Card Industry Data Security Standard

Cisco Advanced Services for Network Security

Lot 1 Service Specification MANAGED SECURITY SERVICES

CMPT 471 Networking II

BigData and (in)security Considerations

DDoS Overview and Incident Response Guide. July 2014

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Glasnost or Tyranny? You Can Have Secure and Open Networks!

How To Manage Sourcefire From A Command Console

Configuration Information

Innovations in Network Security

Uncover security risks on your enterprise network

Driving Company Security is Challenging. Centralized Management Makes it Simple.

SESA Securing with Cisco Security Appliance Parts 1 and 2

Scalability in Log Management

Core Filtering Admin Guide

FortiMail Filtering Course 221-v2.2 Course Overview

SERVICE LEVEL AGREEMENT

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

e2e Secure Cloud Connect Service - Service Definition Document

On-Premises DDoS Mitigation for the Enterprise

FIRN Secure Internet Bundled Services:

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

The SIEM Evaluator s Guide

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Cisco Cloud Web Security

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Mimecast Security

Injazat s Managed Services Portfolio

CLOUD SERVICE SCHEDULE

Advantages of Managed Security Services

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Managed Security Services for Data

ATM END-POINT PROTECTION MONITORING

Cisco Remote Management Services for Security

Critical Security Controls

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Find the needle in the security haystack

Ovation Security Center Data Sheet

Introduction of Intrusion Detection Systems

Introduction to Network Discovery and Identity

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

How To Get The Most Out Of Your From Your Mail Server (For A Small Business)

Better protection for customers, and recurring revenue for you!

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

IBM Security QRadar Vulnerability Manager Version User Guide

Additional services are also available according to your specific plan configuration.

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Important Information

U06 IT Infrastructure Policy

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

F-SECURE MESSAGING SECURITY GATEWAY

Print4 Solutions fully comply with all HIPAA regulations

CLOUD GUARD UNIFIED ENTERPRISE

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

RETHINK SECURITY FOR UNKNOWN ATTACKS

FTA Computer Security Workshop. Secure

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

INFORMATION PROTECTED

Securing enterprise collaboration through and file sharing on a unified platform

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

California Dept. of Technology AT&T CALNET 3. Service Level Agreements (SLA) 7.3 Network Based Managed Security

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Firewall Environments. Name

Securing the Small Business Network. Keeping up with the changing threat landscape

McAfee Next Generation Firewall (NGFW) Administration Course

CALNET 3 Subcategory 6.1 Hosted IVR - ACD. Table of Contents

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Transcription:

State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2 Web Security and Filtering Service Features... 3 7.2.4.2 Security Information and Event (SIEM)... 4 AT&T VSS-PRO (Vulnerability Scanning Service)... 8 Category 7 Network Based Managed Security Updated 6/3/2014 Page i

7.2.1.4.a DDoS Detection and Mitigation Features Contractor s Summary description of service: AT&T Distributed Denial of Service (DDoS) Defense is a service option under AT&T Internet Protect service that is designed to detect and mitigate distributed denial of service attacks on your network. DDoS Defense helps identify and block malicious packets in near real time to help you prevent possible negative affects regarding the flow of your business traffic. DDoS Defense is the service based on the data from the AT&T IP backbone network and doesn't require you to purchase additional bandwidth or premises equipment. Depending on your configuration, a shared or dedicated set of network mitigation s scrub your traffic for denial of service attacks. A shared configuration allows you to share network detector s and a farm of network mitigation s with other AT&T customers. A dedicated configuration provides you with network mitigation s dedicated to you. Geographic Availability: Domestic United States Service Limitations and Restrictions None Change Charge Applicability: N/A (except as noted below in Feature Restrictions, Limitations and Additional Information) A B C D E F G H I J K Line # Feature Name 1 DDoS Detection and Mitigation, 1 2 GB 2 DDoS Detection and Mitigation, 3 4 GB 3 DDoS Detection and Mitigation, 5 6 GB Contractor s Product Identifier DDOSMNT-2 DDOSMNT-4 DDOSMNT-6 Feature Description DDos Detection and Mitigation Service as described in Section 7.2.1.3 for 1-2 GB of traffic flow. DDoS Detection and Mitigation Service as described in Section 7.2.1.3 for 3-4 GB of traffic flow DDoS Detection and Mitigation Service as described in Section 7.2.1.3 for 5-6 GB of traffic flow Feature Restrictions, Limitations and Additional Information Non- Charge per Monthly Charge/ per unit Unit of Measure Charge per change per Delegation Needed (/No) / Discretionary $ - $2,123.80 Per Network N/A $ - $2,410.80 Per Network N/A $ - $2,927.40 Per Network N/A Category 7 Network Based Managed Security Updated 6/3/2014 Page 1 of 9

7.2.2.3 Email Monitoring Service Features Contractor s Summary description of service: AT&T Secure E-Mail Gateway (SEG) is a network-based Security as a Service (SecaaS) offering. SEG protects customers from internal and external email threats that can include: commercial spam, malicious attachments, direct email server connections from spammers and botnet-controlled endpoints, and email embedded URL-based attacks. SEG provides features and tools that enable customers to comply with data privacy and retention regulations, meet legal discovery requirements, and implement data loss prevention strategies. SEG customers retain responsibility and control over much of the configuration and settings for the service. SEG Advanced The Secure E-Mail Gateway (SEG) Advanced service helps protect customer networks from inbound messages containing spam, viruses, and malware. The Service provides features that enable customer to manage and enforce its security policy on outbound email content. The Service provides disaster recovery protection against lost email data in the event of a customer email server outage and provides end-user continuity functionality if the customer email server becomes unavailable. SEG is administered by the customer through a self-service web console and provides a suite of reports. SEG requires that the Customer own and manage their own Simple Mail Transfer Protocol (SMTP) email server or servers. The customer must also own and manage their own internet domain(s) in order to direct email to the Service for filtering. Geographic Availability: Domestic United States Service Limitations and Restrictions None Change Charge Applicability: N/A (except as noted below in Feature Restrictions, Limitations and Additional Information) A B C D E F G H I J K Line # Feature Name 1 Email Monitoring Service, 1-49 Contractor s Product Identifier SEGA01 Feature Description Feature Restrictions, Limitations and Additional Information Non- Charge per Monthly Charge/ per unit Unit of Measure Charge per change per Delegation Needed (/No) / Discretionary $ - $5.11 Seat N/A 2 Email Monitoring Service, 50-74 SEGA50 $ - $2.90 Seat N/A 3 Email Monitoring Service, 75-99 SEGA75 $ - $1.96 Seat N/A 4 Email Monitoring Service, 100-500 SEGA100 $ - $1.46 Seat N/A 5 Email Monitoring Service, 501-1000 SEGA501 $ - $0.90 Seat N/A 6 Email Monitoring Service, 1001 and above SEGA1001 $ - $0.69 Seat N/A Category 7 Network Based Managed Security Updated 6/3/2014 Page 2 of 9

7.2.3.2 Web Security and Filtering Service Features Contractor s Summary description of service: AT&T Web Security service helps create a protected and productive Internet environment for your organization. The service is designed to keep malware off your organizations network and allow you to control the use of the Web by employing Web Filtering, Web Malware Scanning and Anywhere+ Control features. As a fully managed service, AT&T Web Security Service requires no additional hardware, upfront equipment costs or ongoing system maintenance. Implementation is completed via conference calls with the customer. AT&T will direct the customer to perform certain software configurations onsite. In addition to predefined reports, custom reports and analysis through the drill down tool is available to gather specific information regarding web usage. Active Directory Integration: AT&T Web Security integrates into your active directory service with a Connector Software, provided as part of the service. Firewall Redirection: The Proxy Settings are pushed to browsers via an Active Directory GPO, browsers connect through Firewall on port 8080 to the Connector which receives client information and queries the Active Directory Server for Group Information, it then proxies to AWS upstream. The Firewall blocks all other GET requests this provides End User/Group granularity for applying rules and reporting. Archiving: Archiving of historical data is 90 days for allowed traffic and 1 year for blocked. Custom reports can be created to export CSV data dumps on a monthly basis for customer archiving of historical periods longer than provided. Geographic Availability: Domestic United States Service Limitations and Restrictions None Change Charge Applicability: N/A (except as noted below in Feature Restrictions, Limitations and Additional Information) A B C D E F G H I J K Line # Feature Name 1 Web Security and Filtering Service Contractor s Product Identifier WSSBND Feature Description Web Security and Filtering service as described Section 7.2.3. Feature Restrictions, Limitations and Additional Information Non- Charge per Monthly Charge/ per unit Unit of Measure Charge per change per Delegation Needed (/No) / Discretionary $ - $0.66 Per User Category 7 Network Based Managed Security Updated 6/3/2014 Page 3 of 9

7.2.4.2 Security Information and Event (SIEM) Contractor s Summary description of service: Correlated Log Services (CLMS) utilizes AT&T s expertise in security analysis and operations within the AT&T Security Operations Center (SOC) to correlate information from multiple s and types, both on premises and network based in the AT&T network. Provides AT&T an overview of your network by correlating alerts from multiple s and types across the entire enterprise. AT&T prioritizes security events based on threat and risk management methodologies generated from AT&T standards and customer defined standards. AT&T provides rapid notification to the customer when security events are detected and are identified as critical by AT&T SOC Includes customer access to weekly and monthly security summary analysis reports The Correlated Log service includes standard reports, threat analysis reports, log storage, Implementation assistance and initial policy tuning. AT&T collects the security relevant log and event information from firewalls, intrusion prevention sensors and other network s using agent-less Parser/Aggregator technology deployed in your network. Event collection is provided for a wide variety of security and network s which may be located within the AT&T network or on your premises. A diverse set of feeds from security s and services is recommended in order to get a better view of identified threats to your systems and take full advantage of the CLMS system s correlation capabilities. The intelligence produced is used by AT&T s security analysis team to make security recommendations to you. Security recommendations, in the form of an email or a phone call, may vary in detail depending on type of incident, granularity of visibility within the network and breadth of the view. The response will be both verbal (phone call) and written (e-mailed) for severe and high incidents, and written only (e-mailed) for others as appropriate. Geographic Availability: Domestic United States Service Limitations and Restrictions None Change Charge Applicability: N/A (except as noted below in Feature Restrictions, Limitations and Additional Information) A B C D E F G H I J K Line # Feature Name 1 SIEM, 1 15 Devices Contractor s Product Identifier CLMSSV1 Feature Description Feature Restrictions, Limitations and Additional Information Non- Charge per Monthly Charge/ per unit Unit of Measure $10,000.00 $1,260.75 Initial Charge per change per Delegation Needed (/No) / Discretionary N/A 2 Each additional CLMSSV1A 15. $100.00 $101.48 Device N/A 3 SIEM, 16-40 Devices CLMSSV2 $14,000.00 $3,034.00 Initial N/A 4 Each additional CLMSSV2A 40. $100.00 $91.23 Device N/A 5 SIEM, 41-100 Devices CLMSSV3 $16,000.00 $4,704.75 Initial N/A 6 Each additional CLMSSV3A 100. $100.00 $57.40 Device N/A 7 SIEM, 101 250 Devices CLMSSV4 $19,000.00 $10,793.25 Initial N/A 8 Each additional CLMSSV4A 250. $100.00 $52.28 Device N/A 9 SIEM, 251-1000 Devices CLMSSV5 $25,000.00 $23,739.00 Initial N/A 10 Each additional CLMSSV5A 1000. $100.00 $28.70 Device N/A Category 7 Network Based Managed Security Updated 6/3/2014 Page 4 of 9

11 SIEM, 1001-2500 Devices CLMSSV6 $29,000.00 $34,850.00 Initial N/A 12 Each additional CLMSSV6A 2500. $100.00 $17.43 Device N/A 13 Correlated Log Tier 1 Per 14 Correlated Log Tier 2 Per 15 Correlated Log Tier 3 Per 16 Correlated Log Tier 4 Per 17 Correlated Log Tier 5 Per 18 Correlated Log Tier 6 Per CLMSSV1AS CLMSSV2AS CLMSSV3AS CLMSSV4AS CLMSSV5AS CLMSSV6AS fee applies Monthly fee applies Monthly fee applies Monthly fee applies Monthly fee applies Monthly fee applies Monthly $ - $239.85 Per $ - $546.33 Per $ - $799.50 Per $ - $1,295.60 Per $ - $2,373.90 Per $ - $3,485.00 Per Category 7 Network Based Managed Security Updated 6/3/2014 Page 5 of 9

19 Correlated Log Custom (Nonstandard) Device Interface CLMSCDI Correlated Log Custom (Non-standard) Device Interface Devices not included in the Supported Devices List incur a One-Time charge per each unique (or group of s). If a customer has multiple s of the same type with the same operating environment, one fee will be levied. Development time may vary, and will be identified at time of request. Check with your AT&T Account Team to determine if your is supported. $250.00 $ - Per Device 20 Correlated Log Custom (Nonstandard) Report CLMSRPT Correlated Log Custom (Non-standard) Report Customers requiring special reports not listed in the SETA REPORTS List will incur a One-Time charge per each report. Development time may vary. $250.00 $ - Per Report 21 Custom Log Sources Tier 1 22 Custom Log Sources Tier 2 23 Custom Log Sources Tier 3 24 Custom Log Sources Tier 4 CLMSCLS1 Custom Log Sources custom log source). Tier 1 is a threshold of 15 s. CLMSCLS2 Custom Log Sources custom log source). Tier 2 is a threshold of 40 s. CLMSCLS3 Custom Log Sources custom log source). Tier 3 is a threshold of 100 s. CLMSCLS4 Custom Log Sources custom log source). Tier 4 is a threshold of 250 s. $250.00 $126.08 Per Device $250.00 $113.78 Per Device $250.00 $70.73 Per Device $250.00 $64.58 Per Device Category 7 Network Based Managed Security Updated 6/3/2014 Page 6 of 9

25 Custom Log Sources Tier 5 26 Custom Log Sources Tier 6 27 Advanced 1 28 Advanced 2 29 Advanced 3 30 Advanced 4 31 Advanced 5 CLMSCLS5 Custom Log Sources custom log source). Tier 5 is a threshold of 1000 s. CLMSCLS6 Custom Log Sources custom log source). Tier 6 is a threshold of 2500 s. CLMSTIER1ADVC Advanced Correlation s within the tier). Tier 1 is a threshold of 15 s. CLMSTIER2ADVC Advanced Correlation s within the tier). Tier 2 is a threshold of 40 s. CLMSTIER3ADVC Advanced Correlation s within the tier). Tier 3 is a threshold of 100 s. CLMSTIER4ADVC Advanced Correlation s within the tier). Tier 4 is a threshold of 250 s. CLMSTIER5ADVC Advanced Correlation s within the tier). Tier 5 is a threshold of 1000 s. $250.00 $35.88 Per Device $250.00 $20.50 Per Device $750.00 $239.85 Per Device $1,500.00 $546.33 Per Device $2,000.00 $799.50 Per Device $3,000.00 $1,295.60 Per Device $4,000.00 $2,373.90 Per Device Category 7 Network Based Managed Security Updated 6/3/2014 Page 7 of 9

32 Advanced 6 33 AT&T VSS-PRO (Vulnerability Scanning Service) 34 VSS PRO Reconnaissance Network Appliance (RNA) Set UP - Desktop CLMSTIER6ADVC Advanced Correlation s within the tier). Tier 6 is a threshold of 1000 s. VSSPRODRNA Desktop RNA Installation and Set Up $5,000.00 $3,485.00 Per Device $1,800.00 $ - Per 35 VSS PRO Reconnaissance Network Appliance (RNA) Set UP - Rackmount 36 VSS-PRO Scanning 130 VSSPRORRNA Rackmount RNA Installation and Set Up $3,600.00 $ - Per VSSPROQ130 Up to 130 s $ - $248.31 Per 37 VSS-PRO Scanning 250 VSSPROQ250 Up to 250 s $ - $335.94 Per 38 VSS-PRO Scanning 500 VSSPROQ500 Up to 500 s $ - $438.19 Per 39 VSS-PRO Scanning 1000 VSSPROQ1K Up to 1000 s $ - $584.25 Per 40 VSS-PRO Scanning 2000 VSSPROQ2K Up to 2000 s $ - $934.80 Per 41 VSS-PRO Scanning 3000 VSSPROQ3K Up to 3000 s $ - $1,226.93 Per 42 VSS-PRO Scanning 3000+ per 1K incremental VSSPROQ3K+ Each added 1K above 3K $ - $262.91 Per Category 7 Network Based Managed Security Updated 6/3/2014 Page 8 of 9

43 VSS-PRO 130 VSSPROM130 Up to 130 s $ - $372.95 Per 44 VSS-PRO 250 VSSPROM250 Up to 250 s $ - $504.40 Per 45 VSS-PRO 500 VSSPROM500 Up to 500 s $ - $657.28 Per 46 VSS-PRO 1000 VSSPROM1K Up to 1000 s $ - $876.38 Per 47 VSS-PRO 2000 VSSPROM2K Up to 2000 s $ - $1,402.20 Per 48 VSS-PRO 3000 VSSPROM3K Up to 3000 s $ - $1,840.39 Per 49 VSS-PRO 3000+ per 1K incremental VSSPROM3K+ Each added 1K above 3K $ - $394.37 Per 50 VSS-PRO On Dem 130 VSSPROD130 Up to 130 s $ - $496.61 Per 51 VSS-PRO On Dem 250 VSSPROD250 Up to 250 s $ - $671.89 Per 52 VSS-PRO On Dem 500 VSSPROD500 Up to 500 s $ - $876.38 Per 53 VSS-PRO On Dem 1000 VSSPROD1K Up to 1000 s $ - $1,168.50 Per 54 VSS-PRO On Dem 2000 VSSPROD2K Up to 2000 s $ - $1,869.60 Per Category 7 Network Based Managed Security Updated 6/3/2014 Page 9 of 9