A HELPING HAND TO PROTECT YOUR REPUTATION

Similar documents
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Seven Things To Consider When Evaluating Privileged Account Security Solutions

NNIT Cybersecurity. A new threat landscape requires a new approach

Jort Kollerie SonicWALL

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

How To Protect Your Data From Being Hacked

Five keys to a more secure data environment

Reference Architecture: Enterprise Security For The Cloud

Cisco Security Optimization Service

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Information Technology Security Review April 16, 2012

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Nine Steps to Smart Security for Small Businesses

Preemptive security solutions for healthcare

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

External Supplier Control Requirements

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

PCI Solution for Retail: Addressing Compliance and Security Best Practices

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Critical Security Controls

Protecting Your Organisation from Targeted Cyber Intrusion

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

FIVE PRACTICAL STEPS

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Managing IT Security with Penetration Testing

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Unknown threats in Sweden. Study publication August 27, 2014

Managed Security Services for Data

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

NASCIO 2015 State IT Recognition Awards

Mobile Device Strategy

Cisco Advanced Services for Network Security

Cyber Security on the Offense: A Study of IT Security Experts

e2e Secure Cloud Connect Service - Service Definition Document

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Cyber Situational Awareness for Enterprise Security

Avoiding the Top 5 Vulnerability Management Mistakes

The Cloud App Visibility Blindspot

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

AB 1149 Compliance: Data Security Best Practices

Payment Card Industry Data Security Standard

How To Protect Your Network From Attack From A Network Security Threat

IBM Security QRadar Vulnerability Manager

Current IBAT Endorsed Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Securing the mobile enterprise with IBM Security solutions

White Paper: Librestream Security Overview

Does your Citrix or Terminal Server environment have an Achilles heel?

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Secure SSL, Fast SSL

Network & Information Security Policy

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Symantec DLP Overview. Jonathan Jesse ITS Partners

Protecting against cyber threats and security breaches

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Enterprise Data Protection

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Chapter 1 The Principles of Auditing 1

Guideline on Safe BYOD Management

Readiness Assessments: Vital to Secure Mobility

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Adobe Systems Software Ireland Ltd

Reaping the Full Benefits of a Hybrid Network

BlackRidge Technology Transport Access Control: Overview

Injazat s Managed Services Portfolio

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Security Controls for the Autodesk 360 Managed Services

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

The State of Application Delivery in 2015

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

G-Cloud Definition of Services Security Penetration Testing

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CompTIA Security+ (Exam SY0-410)

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

How To Secure Your Store Data With Fortinet

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Transcription:

OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION

CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION 06 WE WANT TO HELP YOU EVERY STEP OF THE WAY 08 CHECKOUT OUR ONLINE VIDEOS 09

INFORMATION SECURITY MATTERS Emerging technologies have helped organisations, particularly SMEs, to work smarter and to create new business opportunities. But these technologies have also created new risks. There is now increased potential for IT security breaches and misuse of customer data with the associated risk of to your company s reputation and brand. The Optus Future of Business Report 2013 revealed that organisations are expanding the way they connect with customers. Social networks and devices such as tablets and smartphones are driving greater social and digital integration. This highlights the need to have up-to-date, context-aware firewalls and endpoint security. Security is a core part of any conversation about cloud, social media, mobility and data centre transformation. Given the high profile of these market trends, security should be at the forefront of CIO s minds. Also, organisations have obligations under the Privacy Act 1988 to put in place reasonable security safeguards and to take reasonable steps to protect the personal information that they hold. In June 2013, a new mandatory data breach notification bill was tabled in the Senate. It requires organisations to notify the Privacy Commissioner and affected consumers when a data breach occurs. Fines could be imposed on organisations and individuals. This would make the need to adopt a robust IT security architecture even more important. 60% RESPONDED THAT DEVELOPING A STRATEGY FOR IMPROVING SECURITY AND RISK MITIGATION WAS HIGH TO CRITICAL PRIORITY. THE AUSTRALIAN STATE OF THE CIO STUDY 2013

SECURITY SOLUTIONS TAKE NOTE! A RECENT DATA BREACH INVESTIGATION REPORT HIGHLIGHTS SOME STARTLING FINDINGS: 69% OF BREACHES WERE SPOTTED BY AN EXTERNAL PARTY 9% WERE SPOTTED BY CUSTOMERS 66% OF BREACHES TOOK MONTHS OR EVEN YEARS TO DISCOVER (62% MONTHS, 4% YEARS) SOCIAL TACTICS USING EMAIL, PHONE CALLS AND SOCIAL NETWORKS TO GAIN INFORMATION ON INDIVIDUALS ARE OFTEN IGNORED, BUT CONTRIBUTED TO 29% OF ATTACKS 29% Source: 2013 DATA BREACH INVESTIGATIONS REPORTverizonenterprise.com/DBIR/2013

03 76% OF NETWORK INTRUSIONS EXPLOITED WEAK OR STOLEN CREDENTIALS. STRICT POLICIES ARE REQUIRED TO REDUCE THIS EASILY PREVENTABLE RISK. TOP OF MIND CONCERNS CYBER THREATS More than ever before, businesses are facing external threats that can compromise their business. Security threats are not only growing but are more complex and sophisticated. OVER HALF OF THE INSIDERS COMMITTING SABOTAGE WERE FORMER EMPLOYEES TAKING ADVANTAGE OF OLD ACCOUNTS OR BACKDOORS THAT WEREN T DISABLED MIXED USE BYOD The bring-your-own-device (BYOD) trend is increasing exposure to vulnerabilities, because many organisations are adopting a mixed personal and business-use device policy. CUSTOMER DATA AND IP These factors are coupled with the imperative to protect data privacy, data security and intellectual property.

SECURITY SOLUTIONS LAYERS OF PROTECTION Organisations need to adopt a multi-layered, holistic approach to manage today s threat landscape. You need to identify the critical assets that need protecting, and the levels of protection required. This helps you understand the level of security necessary across different parts of the organisation. PROCESS Application and Process Security Security Policy and Information Event Management Monitoring and Reporting Optus believes that a proactive security posture is necessary to prevent data loss this strategy should encompass people, processes and technology. PEOPLE People and Identity Security DATA Data and Information Security TECHNOLOGY Network and Infrastructure Vulnerability Assessment and Penetration Testing Application & Web Application Security Identity Authentication Email, Web and Data security Distributed Denial of Service Mitigation (DDoS) Intrusion Detection and Prevention Firewall / Secure remote access Network

05 ON GUARD WITH OPTUS OPTUS SECURITY SERVICES ENCOMPASS FIREWALLS INTRUSION PREVENTION WEB, EMAIL AND INFORMATION CONTENT SECURITY ENDPOINT PROTECTION DISTRIBUTED DENIAL-OF-SERVICE PREVENTION VULNERABILITY ASSESSMENTS SECURITY EVENT MANAGEMENT. Our monitoring services provide rapid detection of security incidents and vulnerabilities for proactive remediation. NETWORK SECURITY HOW DO I CONNECT SAFELY TO THE WEB? Firewall/intrusion prevention/ssl VPN Remote SSL VPN Authentication./access management CONTENT SECURITY HOW DO I DEAL WITH THE SOCIAL MEDIA TREND? Email, web and data content security Secure web gateway Application security ENDPOINT SECURITY HOW DO I DEAL WITH THE BYOD TREND? Mobile device security Data loss prevention and protection Data encryption Anti-malware/SPAM protection

SECURITY SOLUTIONS A BUNDLE FOR SECURITY PROTECTION We can help you on your security journey to protect your brand and reputation. ASSESS YOUR RISK WITH A VULNERABILITY ASSESSMENT Automatic vulnerability scanning of online traffic coming into and leaving the customer internet gateway. Using a network connected appliance, this is a non-intrusive span TAP/ mirror port on the network Customers can expect: Vulnerability assessment report Risks and recommendations report At NO charge* * Vulnerability Assessment is based on Optus Introductory Online Cyber Threat Vulnerability Assessment Service. UTILISE LOW COST AND RELIABLE OPTUS UECOMM INTERNET FOR CONNECTIVITY Fast, secure internet service is essential to modern business: Permanent, reliable internet connection with static IP addresses Supported by Optus Uecomm Ethernet VPN service Choice of bandwidth you want from a range of access services Bandwidth scalable as your business grows Detailed reporting capability to manage growth. PROTECT YOUR BUSINESS WITH A MANAGED SECURITY SERVICE Choose from a variety of managed security solutions including: Firewall/intrusion prevention/ SSL VPN Remote access security/ssl VPN Authentication and access management (IAM) Email, web and data; hybrid secure gateway and cloud Mobile device security/ endpoint security Application security management/ load-balancing Security event management/ monitoring and logging SECURITY PROTECTION

07 A RISK AND VULNERABILITY ASSESSMENT CAN HELP YOU UNDERSTAND YOUR CURRENT SECURITY POSTURE AND GUIDE YOU TO A SECURITY IMPROVEMENT PLAN THAT HAS THE RIGHT BALANCE BETWEEN EXPENDITURE AND RISK EXPOSURE. We can help you start your journey towards greater protection if: Your lines of defence are compromised Your existing security measures aren t addressing current risks or There are weaknesses in your IT security defences Early detection enables you to proactively reduce risk exposure. Optus security assessment services include: Security policy review; roles and responsibilities Network vulnerability assessment (external and internal) Penetration testing Report and remediation proposal On-going periodic automated monitoring and reporting

SECURITY SOLUTIONS WE WANT TO HELP YOU EVERY STEP OF THE WAY CONSULTING SERVICES We ll help to identify critical ICT security risks and recommend appropriate controls to better protect your people, customers, information, processes and technology. ARCHITECTURE DESIGN SERVICES We design and architect networks to secure and protect the confidentiality, integrity and availability of information that traverses the network and systems infrastructure. SOLUTION DEPLOYMENT We ll ensure the scope of the project meets your ICT environment and seamlessly integrates your critical functions to meet the configurations required. Solutions can be applied with varied levels of control to help you find the mix that is right for your environment, risk appetite and security strategy. ONGOING MANAGEMENT We ll maintain vigilance over your defences around the clock with our 24 x 7 monitoring and response capability. From our Network Operations Centre we monitor your network within response times that meet your requirements.

09 WE OFFER PROFESSIONAL SERVICES TO GIVE YOU PEACE OF MIND WHEN ADOPTING A SECURITY NETWORK. CHECKOUT OUR ONLINE VIDEOS FROM UPDATING FIREWALLS TO ASSESSING YOUR ORGANISATIONS VULNERABILITY EXPOSURE. Reducing security complexity yesopt.us/reducingcomplexity Updating firewalls yesopt.us/updatingfirewalls Securing your online presence yesopt.us/onlinepresence Remote access to corporate networks yesopt.us/accessnetworks 4 steps you should take yesopt.us/4steps

GIVE US A CALL To discuss how Optus can help you through innovative communications solutions; contact your Optus Account Manager or call the Optus Business hotline on 1800 555 937 JOIN THE CONVERSATION Web Twitter Blog optus.com.au/business @optusbusiness yesopt.us/blog 2013 SingTel Optus Pty Limited. OBN0174 1213KD