Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw



Similar documents
Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

How to manage IT Risks and IT Compliance as a Service

IT Security & Compliance. On Time. On Budget. On Demand.

Bringing Continuous Security to the Global Enterprise

NE T GENERATION CLOUD SECURITY PLATFORM

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Vulnerability Management

BEST PRACTICES RESEARCH

Delivering IT Security and Compliance as a Service

Market Share Leadership of the Year, Vulnerability Assessment Global, 2010

Delivering IT Security and Compliance as a Service

PCI DSS Overview and Solutions. Anwar McEntee

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Criticial Need for Stronger Network Security. QualysGuard SaaS-based Vulnerability Management for Stronger Security and Verification of Compliance

"Advanced Vulnerability Management new approach to solve critical controls. Andrzej Kleśnicki Technical Account Manager Central Eastern Europe

IBM Endpoint Manager Product Introduction and Overview

Symantec Control Compliance Suite Standards Manager

VULNERABILITY MANAGEMENT

SECURITY & COMPLIANCE IN THE CLOUD AGE

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Buy Nitro Security

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Cloud and Data Center Security

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Network Security and Vulnerability Assessment Solutions

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

Report Book: Retina Network Security Scanner Unlimited

Review: McAfee Vulnerability Manager

STREAM Cyber Security

PCI DSS Reporting WHITEPAPER

PCI Compliance for Cloud Applications

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

McAfee Database Security. Dan Sarel, VP Database Security Products

NEC Managed Security Services

How to Grow and Transform your Security Program into the Cloud

Extreme Networks Security Analytics G2 Vulnerability Manager

Keeping your data yours

PCI Compliance. Network Scanning. Getting Started Guide

1 Introduction Product Description Strengths and Challenges Copyright... 5

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

QualysGuard Asset Management

Secure Cloud Computing

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Current IBAT Endorsed Services

Delivering Security & Compliance On Demand

Secret Server Qualys Integration Guide

PCI DSS Top 10 Reports March 2011

Cyber Security RFP Template

On Demand Penetration Testing Applications Networks Compliance.

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Scalability in Log Management

Cenzic Product Guide. Cloud, Mobile and Web Application Security

BIG SHIFT TO CLOUD-BASED SECURITY

2015 Enterprise Vulnerability Management Trends Report

Total Protection for Compliance: Unified IT Policy Auditing

Symantec Consulting Services

IBM Rational AppScan: Application security and risk management

IBM Security IBM Corporation IBM Corporation

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Keeping your data yours

Resolving the Top Three Patch Management Challenges

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Integrated Threat & Security Management.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

Security and Compliance Suite

I. Overview. II. Vulnerability Management Improves Security. III. Automating Vulnerability Workflow is Crucial

PCI-DSS Penetration Testing

Complete Patch Management

2015 Enterprise Vulnerability Management Trends Report

Trend Micro Solutions for PCI DSS Compliance

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Securing the Service Desk in the Cloud

Speed Up Incident Response with Actionable Forensic Analytics

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

rating of 5 out 5 stars

Managed Services. Business Intelligence Solutions

NEXT GENERATION APPLICATION SECURITY

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Vulnerability Management Buyer s Checklist Key Questions to Ask Before You Select a VM Solution

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Fortify. Securing Your Entire Software Portfolio

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

HP Application Security Center

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Transcription:

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw Andrzej Kleśnicki, CISM Technical Account Manager for Central Eastern Europe!!

Qualys at a Glance Software-as-a-Service (SaaS) Founded in 1999 to deliver a SaaS VM Expanded the service as suite of SaaS! Security and Compliance offerings Last round of funding in 2004, IPO in 2012 350 employees (50% R&D and Operations) 6000+ global customers 50% of Fortune 100 35% of Fortune 500 20% Forbes Global 2000 US 65%, EMEA 30%, Asia 5% 9,000+ scanner appliances in 85 countries 600+ million IP scans in 2011 10+ million WAS scans in 2011 Highest possible rating of Strong Positive Largest market share Highest possible rating of Leader The leading vendor Market Share Leadership

Global Market Adoption By Forbes and Fortune Rankings Forbes 100 51 % Fortune 100 50% Fortune 500 35 % Forbes 2000 20 % 8 out of the top 10 Biotech 6 out of the top 10 Banks 5 out of the top 10 Insurance 8 out of the top 10 Software & Services 6 out of the top 10 Business Services 5 out of the top 10 Retailers 8 out of the top 10 Technology Hardware 6 out of the top 10 Media 4 out of the top 10 Auto Manufacturers 7 out of the top 10 Chemical 6 out of the top 10 Telecom 4 out of the top 10 Oil & Gas

Global Market Adoption Insurance Financial Services Chemical Internet Retail Technology Consulting

Global Market Adoption continued Media Energy Consumer Healthcare Manufacturing Education Transportation Public Sector

ICT Security is problem of Scale & Complexity and ALL constantly changes in time

Qualys Cloud Approach to ICT Security continuous view on ICT Security Risks and Compliance

QualysGuard ICT Security Management Integrated Suite of ICT Security and Compliance SaaS services ICT SECURITY INTELLIGENCE & MANAGEMENT PLATFORM ICT RISK MANAGEMENT Devices & Applications Risk Assessment Vulnerabilities Exploits, Malware Patches, Workarounds, Virtual IDS/IDP Patches Threats Protection ICT ASSET MANAGEMENT Devices & Applications Discovery and Tagging Business Value Responsibility Ownership Continuous Auditing ICT COMPLIANCE MANAGEMENT Devices & Applications Configurations Audits Internal Policies External Regulations ICT Technological controls checks Non-technological Questionnaires INTEGRATED DASHBOARDS AND REPORTS 8

QualysGuard Suite of Security & Compliance Applications VM PC PCI WAS MDS Vulnerability Management Policy Compliance PCI Compliance Web Application Scanning Malware Detection Service SECURE Seal

Qualys Global Clouds Deployments Security Operations Center (SOC) Private Clouds (PC) Future SOC and PC US SOC PC PC PC PC US SOC PC PC EU SOC EU SOC PC PC PC PC SOC PC PC

QualysGuard Global Infrastructure Virtual vscanner and Virtual Private SOC QualysGuard SW Virtual Scanner QualysGuard SW Virtual Private SOC World s Largest global Vulnerability Management deployment at Daimler! - 293 scanner appliances scanning over a million IPs in 80 locations Performing 600+ Million IP scans and maps per year 11!

Qualys Asset Management (Patent-pending Asset Tagging engine) Powerful ability to manage, search and tag assets Organizing ICT Assets using Tags - Static and Dynamic asset tagging - Hierarchical asset tagging Uses existing VM scan data Integrated with existing QG apps. Asset Tagging/Searching/Reporting based on - platforms, applications, services - IT responsibility - Based on locality - Based on Business Processes FREE OF CHARGE for every QG Customer - Part of every QG Subscription - Unlimited Network Scope

Qualys Vulnerability Management 12 years on market Market leader since 2008 Gartner, IDC, Forrester, Frost & Sullivan SC Magazine best Vulnerability Mgt solution 6 years in a row Full VM Cycle Free and unlimited network discovery Discover, group, & prioritize network assets Identify vulnerabilities, exploits, malware, patches, & unsupported technologies Prioritize, execute & audit remediation Automate reporting, trending, & alerting 13,000+ signatures covering 55K+ vulnerabilities, updated daily

Zero-Day Analyzer for VM Add-on feature for VM service Zero-Day Analyzer for VM Allows customers to analyze zero-day threats and estimate their impact on their assets and critical systems based on information collected from previous scan results. Benefits Latest signatures for idefense exclusive zero-day threats Customizable alerting and email notifications Actionable data with estimates about what systems are at risk http://www.qualys.com/zero-day

Qualys Policy Compliance Management Audits and documents compliance against external regulations & company internal policies Supports major security frameworks & regulations Controls library pre-mapped to frameworks such as CIS, COBIT, ISO27001:2005, HIPAA, ITIL, etc. Agent-less 100% SaaS 2600+ controls over 50 platforms User defined controls for Win/ Unix

Qualys PCI-DSS Compliance PCI Council ASV certified Used by 65% of ASVs and 49% of QSAs certified companies Automates PCI Compliance Periodic network discovery scans Periodic external scans for vulnerabilities Complete annual Self-Assessment Questionnaire Generates proof of PCI Compliance & attestation to submit to acquiring banks Delivers full ASV service ASV certified quarterly reports ASV support and insurance False-negative priority handling

Qualys Web Application Scanning Vulnerability Scanning inside Web Apps : Authenticated Scanning OWASP TOP 10 support Web services Discovery Web services Catalog Certificate auth. support Selenium auth. Support Java, Ajax, Flash support

Qualys Malware Detection for Web Apps Malware Detection inside Web App source code: Static signature Analysis Behavioral Analysis Dashboard and centralized reporting Sharing WAS module settings and Web Apps authentication

Customizable Questionnaires for PC Beta available Custom Questionnaires Enables customers to easily build questionnaires using the Unified Compliance Framework (UCF), as well as leverage existing business process workflows to evaluate controls, gather documents and evidence and validate compliance. Benefits Automation of manual assessments Ability to define/customize audit work flow Industry leading policy repository of nearly 1000 standards and regulations via UCF http://www.qualys.com/forms/questionnaires/

Qualys Web Application Firewall Beta available WAF Provides protection against known and emerging web application threats, and helps increase web site performance through caching, compression and content optimization, with no equipment needed. Benefits Zero-footprint, low cost deployment Ease of use, ease of maintenance Real-time attack prevention Virtual patching and application hardening http://www.qualys.com/waf

Why customers selected QualysGuard? Key functionalities and benefits Automated ICT Network and Application Discovery Automated ICT Asset Management based on Tagging and Rules Automated ICZ Vulnerability Scanning and ICT Risk Management Automated ICT Configuration Audit and Compliance tool Most accurate and secure Vulnerability Scanning Engine on market Economical and TCO benefits Try and Buy model = YOU pay for what you see is working for YOU Fully Scalable and flexible licensing = YOU pay for what YOU need NO HW and SW purchase, installation, maintenance and updates! NO CAPEX and HUMAN resources needed for implementation / run

4 defects (bugs) cover: False-negative, False-positive, Service-crashed, Host-crashed reported to Qualys Support Qualys Scanning Quality Metrics Six Sigma Scanning Accuracy Qualys Six Sigma Accuracy Scanned IPs (M) Reported Cases Actual Bugs 21 000 000 100.00000000 20 000 000 99.99990000 Number of Scans 19 000 000 18 000 000 17 000 000 16 000 000 SIX SIGMA 99.99980000 99.99970000 99.99960000 99.99950000 QG Scan Accuracy (%) 15 000 000 SCANNING ACTIVITY 99.99940000 14 000 000 99.99930000 Six Sigma Accuracy = Less then 4 defects for each 1 mil IP scanning!

Quality Metrics Customer Contact Ratio Customer Contact Ratio* Number of Calls per Month 1.20 1.00 0.80 0.60 0.40 0.20 0.00 QG-Enterprise QG-Express QG-PCI gru.10 sty.11 lut.11 mar.11 kwi.11 maj.11 cze.11 lip.11 sie.11 wrz.11 paź.11 lis.11 gru.11 sty.12 * Number of phone calls and e-mail per customer/month

Global Technology Partners / Integrations

Free Services at your Fingertips www.qualys.com/secure 25

Thank You aklesnicki@qualys.com!