Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

Similar documents
G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Keeping your data yours

Qualys Scanning for PCI Devices University of Minnesota

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

IT Security & Compliance. On Time. On Budget. On Demand.

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

PCI Compliance. Network Scanning. Getting Started Guide

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

PCI DSS Top 10 Reports March 2011

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Vulnerability Management

PCI DSS Reporting WHITEPAPER

SWAT PRODUCT BROCHURE

Security and Compliance Suite

Network Security and Vulnerability Assessment Solutions

ASV Scan Report Attestation of Scan Compliance

Improving Visibility into your Vulnerability Management Program

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

How To Write The Jab P-Ato Vulnerability Scan Requirements Guide

Continuous Penetration Testing

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

Integrated Threat & Security Management.

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

PCI DATA SECURITY STANDARD OVERVIEW

Trend Micro. Advanced Security Built for the Cloud

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

National Cybersecurity Assessment and Technical Services: Capability Brief. Presented by: Sean McAfee Updated: May 5, 2014

Checklist for Vulnerability Assessment

Current IBAT Endorsed Services

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

PCI Vulnerability Validation Report

Simplêfy Client Support and Information Services. PCI Compliance Guidebook

Continuous Network Monitoring

The Value of Vulnerability Management*

Sample Statement of Work

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

How To Protect Your Credit Card Information From Being Stolen

How To Use Qqsguard At The University Of Minneapolis

Secunia Vulnerability Intelligence Manager (VIM) 4.0

VULNERABILITY MANAGEMENT

STATE OF NEW JERSEY IT CIRCULAR

TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING

Cisco Security Optimization Service

Cyber Security RFP Template

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Lumension Endpoint Management and Security Suite

Sample Vulnerability Management Policy

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Cisco Advanced Services for Network Security

The Importance of Cybersecurity Monitoring for Utilities

rating of 5 out 5 stars

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

Copyright 11/1/2010 BMC Software, Inc 1

GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

Juniper Optimum Care. Service Description. Continuous Improvement. Your ideas. Connected. Data Sheet. Service Overview

PCI DSS v3.0 Vulnerability & Penetration Testing

Guided HIPAA Compliance

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

Payment Card Industry Data Security Standard

FAQ S: TRUSTWAVE TRUSTKEEPER PCI MANAGER

Cisco Network Optimization Service

Extreme Networks Security Analytics G2 Vulnerability Manager

Introduction. PCI DSS Overview

How To Get Your Computer To Comply With Pca

White Paper. Business Service Management Solution

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

The Top 10 Reports for Managing Vulnerabilities

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

PCI DSS Overview and Solutions. Anwar McEntee

What is Penetration Testing?

How To Create A Help Desk For A System Center System Manager

Spyders Managed Security Services

OFFERINGS & PRICING. Effective 8/2015 Prices are subject to change. v Act-On Software

Vulnerability management lifecycle: defining vulnerability management

E-SPIN PCI Compliancy Solution

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Sales Rep Frequently Asked Questions

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Transcription:

Managed Service Solutions Catalogue MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014 1

MANAGED SERVICES SOLUTIONS CATALOGUE Managed Services Solutions Catalogue

Managed Service Solutions Catalogue 12 Years of Expertise At Your Side Outpost24 offers a full service alternative to internal management of vulnerability assessments, reducing the costs and time needed to hire, train and manage an in-house IT security team. Regardless of business size, Outpost24 s Managed Services (MS) will seamlessly integrate the vulnerability management solution that meets the needs of your organization. Why Combine Managed Services with Outpost24 Tools? Managed Service allows you to quickly and easily adopt a vulnerability management program with constant support of vulnerability management experts, so that you can focus on your core business. Our team of highly experienced technical experts will partner with your organization throughout the initial implementation, scanning and remediation reporting, and provide the most secure, efficient and costeffective recommendations. As your organization establishes processes and adopts best practices, we maintain ultimate flexibility and allow you to oversee your vulnerability management program internally. Outpost24 offers four levels of managed service solutions: Basic Advanced Custom PCI 11.2 Includes basic set-up of Outpost24 tools, monitoring and automated reporting Includes basic set up of our tools, customized reporting, analysis, interpretation of results and follow up A customized service offering best suited for large organizations with complex networks or geographic distribution Outpost24 PCI certified vulnerability scanning reports All levels include implementation services, reporting on a scheduled monthly or quarterly basis. Additional adhoc reporting is also available, depending on organization s needs. 3

Managed Service Solutions Catalogue Basic Implementation and Automation Description Key Benefits Solution Includes This solution is best suited for small to medium sized organizations looking to get basic parameters for a vulnerability management program in place. Twelve years of VM experience combined with our team will ensure best practices set-up and configuration of the Outpost24 tools.! Gain support in defining VM goals, establishing risk acceptance levels for your organization, and maintaining acceptable risk levels! Ensures best practice set-up, customized to specific needs and existing business processes! Organizations can maintain their business operations, while Outpost24 helps maintain their VM program efforts! Sign-off on VM efforts can be delivered at once, organizations can be up and running with tools properly from week 1 Vulnerability Management Program Outpost24 designs a program to meet organizational requirements such as remediation contacts, assessment schedules, asset management, alerting, etc. Statement of Work Outpost24 provides assessment activities, deliverables and a timeline for the organization s VM program upfront. Scanning Templates Configuration Outpost24 will configure the scanning templates based on organizational requirements and adjust them based on the assets in scope. Asset Management (Discovery, Groups) Assets will be managed according to organizational setup allowing the organization to track them using customizable attributes and allocate them into groups. Proactive Alerting Using Scanning-less Scanning When scanning is at least monthly, the organization s assets will be monitored for new vulnerabilities using Outpost24 s SLS technology. Alerting (Rogue Systems, Vulnerabilities) Outpost24 can configure alerts organizations to be notified when a new device is discovered on an IP range, or when a specific level of risk is found on an asset. Automated Vulnerability Assessment Reports Outpost24 will set up automated reporting according to organization s needs, ensuring that after each assessment, the right contact will receive the right information. Full Year Executive Report At the end of each contracted year, Outpost24 will provide a full report to showcase the current risk posture of the organization, and what was achieved based on established goals of the VM program. 4

Managed Services Solutions Catalogue Advanced Reporting & Analysis Description This solution combines best practices set-up, configuration and implementation of Outpost24 technology, with expert analysis of scan results on a monthly or quarterly basis. The Advanced offering is perfect for an organization looking for a firm understanding and analysis of their scanning results, in relation to organizational goals and objectives. Key Benefits Package Includes In addition to the Basic Solution benefits, organizations with Outpost24 s Advanced MS offering will also benefit from:! Combined expertise in analysis and interpretation of results! Expert Feedback and tracking ensures effectiveness of vulnerability remediation! Help in visualizing strategic, high-level results to identify and illustrate the effectiveness and value of investment Includes all Basic Offerings: Vulnerability Management Program Statement of Work Scanning Templates Configuration Asset Management (Discovery, Groups) Proactive Alerting Using Scanning-less Scanning Alerting (Rogue Systems, Vulnerabilities) Automated Vulnerability Assessment Reports Full Year Executive Report Plus: Custom Reporting The organization can define what information they need to see in their quarterly or monthly reports. This could be a customized report for Management or for Technical teams and can be delivered in various formats including Powerpoint, PDF and Excel. High Risk Verifications Outpost24 will verify new High Risks found in the organization s systems, verify that they are not a false positive, then send a notification upon discovery. False Positives Review Outpost24 s team of experts will analyse false positives reported in scanning results to ensure the quality of findings and to help guide remediation efforts. Follow-up Calls Outpost24 will schedule follow-up calls to discuss results of the report findings, and to guide remediation efforts, and to gauge the impact of remediation activities. Expert Analysis & Interpretation Outpost24 s team will analyse and interpret scan results to help organizations focus and prioritize their remediation efforts, and to illustrate success and impact over time. 5

Managed Services Solutions Catalogue Custom Description For organizations with a complex network set up, widespread geographic distribution, or unique organizational goals, Outpost24 is able to offer a fully customizable solution tailored specifically to the organization s needs. Key Benefits In addition to the Basic & Advanced benefits, customers also benefit from:! The ability to have Outpost24 experts serve as an extension of their team toward their VM efforts! Moulding a fully customizable solution to their existing business processes! Complete support in clarifying, presenting, and reporting to upper level management (depending on scope) Package Includes Includes all Basic and Advanced Offerings: Vulnerability Management Program Statement of Work Scanning Templates Configuration Asset Management (Discovery, Groups) Proactive alerting using Scan-less Scanning Alerting (Rogue Systems, Vulnerabilities) Automated Vulnerability Assessment Reports Full Year Executive Report Custom Reporting False Positives Review Follow-up Calls Expert Analysis & Interpretation Additional offerings are entirely customizable to customers needs. This can include, but is not limited to: Management level comparisons between business units Trend analysis to find process errors in change and problem management Reporting to different business units, IT teams, management or various other levels Strategic reporting on progress of VM efforts Analysis of effectiveness of VM efforts and investments 6

Managed Services Solutions Catalogue PCI 11.2 Description For organizations looking for the fastest, most reliable way to achieve PCI compliance, Outpost24 s PCI ASV managed services are a great solution. PCI 11.2 guidance dictates that there are three types of vulnerability scanning required: Internal quarterly scanning, External quarterly scanning, and as needed after significant changes. Outpost24 can support in all three of these areas. Key Benefits! This is the fastest way to achieve compliance for external vulnerability scanning! Organizations can maintain their business operations, while Outpost24 guides them to PCI ASV compliance! Assistance in navigating false positives related to PCI ASV requirements! Outpost24 identifies controls necessary to compensate on PCI ASV requirement failures! Adhoc assessment after any significant network changes Package Includes Vulnerability Management Program for PCI ASV Perimeter Scans Outpost24 works with the organization to establish a VM program and create a workflow for PCI ASV scanning requirements Asset Discovery to Scope Active IP Addresses for PCI ASV Scans Outpost24 will launch an asset discovery in order to assess the Live IP addresses on organization s networks. Asset CMDB for Reporting Purposes Outpost24 will help customer understand assets in scope and formulate solutions. Quarterly Assessments Quarterly assessments are scheduled according to Requirement 11.2 & 11.2.2 (NOTE: to fulfill 11.2, both HIAB Internal and External scanning are required) Reporting - Quarterly Trackers Outpost24 provides Quarterly Trackers allowing our customers to concentrate on issues that require attention in order to be compliant. False Positives Review Outpost24 s expert VM team will help separate potential vulnerabilities from real ones. Quarterly Follow-up Calls to Review Findings Outpost24 will conduct follow-up calls to discuss results, solutions and next steps toward ongoing compliance. Unlimited Rescans Allows organizations to rescan their assets in scope in order to verify remediation activities. Disputes and Special Notes Handling Outpost24 will provide these as proof of mitigation by uploading screenshots, configuration files and false positives information. Reporting - Attestation of Compliance for 11.2 After all findings that failed PCI ASC Program Guide Requirements have been resolved or disputed, we will provide an Attestation Report. 7

Managed Service Solutions Catalogue Methodology Much like our technology, our team uses a proven methodology to help organizations achieve vulnerability management success. DEFINE THE PROGRAM We work with you to establish roles, responsibilities and goals, then define a security policy and suggest the best tool for your organization based on factors like risk aversion, threat exposure and costs. DISCOVER ASSETS We use our smart technology to quickly and accurately discover and take inventory of the assets in your network, enabling you to group assets by business unit, environment, location, etc. ASSESS THE NETWORK We schedule scanning based on your organizational processes, industry best practices and security policies. Then, you can scan or create templates based on your organization s needs. PRIORITIZE REMEDIATION Our format of reporting includes descriptions of vulnerabilities on your network and recommendations for mitigation and remediation that are rated by threat-level and prioritized for impact and efficiency. TRACK PROGRESS Our system also allows you to view trending data and graphs to show statistics about risk exposure and vulnerabilities in your network over time and create reports to demonstrate improvement. Getting Started To get started one of our account managers accompanied by a security consultant will work with your organization to explore the offering that is best suited to your needs by following these 5 steps: Once the SOW is agreed upon and finalized, an Outpost24 Security Consultant will begin our onboarding process to begin managed services as quickly and smooth as possible. 8