OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION
CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION 06 WE WANT TO HELP YOU EVERY STEP OF THE WAY 08 CHECKOUT OUR ONLINE VIDEOS 09
INFORMATION SECURITY MATTERS Emerging technologies have helped organisations, particularly SMEs, to work smarter and to create new business opportunities. But these technologies have also created new risks. There is now increased potential for IT security breaches and misuse of customer data with the associated risk of to your company s reputation and brand. The Optus Future of Business Report 2013 revealed that organisations are expanding the way they connect with customers. Social networks and devices such as tablets and smartphones are driving greater social and digital integration. This highlights the need to have up-to-date, context-aware firewalls and endpoint security. Security is a core part of any conversation about cloud, social media, mobility and data centre transformation. Given the high profile of these market trends, security should be at the forefront of CIO s minds. Also, organisations have obligations under the Privacy Act 1988 to put in place reasonable security safeguards and to take reasonable steps to protect the personal information that they hold. In June 2013, a new mandatory data breach notification bill was tabled in the Senate. It requires organisations to notify the Privacy Commissioner and affected consumers when a data breach occurs. Fines could be imposed on organisations and individuals. This would make the need to adopt a robust IT security architecture even more important. 60% RESPONDED THAT DEVELOPING A STRATEGY FOR IMPROVING SECURITY AND RISK MITIGATION WAS HIGH TO CRITICAL PRIORITY. THE AUSTRALIAN STATE OF THE CIO STUDY 2013
SECURITY SOLUTIONS TAKE NOTE! A RECENT DATA BREACH INVESTIGATION REPORT HIGHLIGHTS SOME STARTLING FINDINGS: 69% OF BREACHES WERE SPOTTED BY AN EXTERNAL PARTY 9% WERE SPOTTED BY CUSTOMERS 66% OF BREACHES TOOK MONTHS OR EVEN YEARS TO DISCOVER (62% MONTHS, 4% YEARS) SOCIAL TACTICS USING EMAIL, PHONE CALLS AND SOCIAL NETWORKS TO GAIN INFORMATION ON INDIVIDUALS ARE OFTEN IGNORED, BUT CONTRIBUTED TO 29% OF ATTACKS 29% Source: 2013 DATA BREACH INVESTIGATIONS REPORTverizonenterprise.com/DBIR/2013
03 76% OF NETWORK INTRUSIONS EXPLOITED WEAK OR STOLEN CREDENTIALS. STRICT POLICIES ARE REQUIRED TO REDUCE THIS EASILY PREVENTABLE RISK. TOP OF MIND CONCERNS CYBER THREATS More than ever before, businesses are facing external threats that can compromise their business. Security threats are not only growing but are more complex and sophisticated. OVER HALF OF THE INSIDERS COMMITTING SABOTAGE WERE FORMER EMPLOYEES TAKING ADVANTAGE OF OLD ACCOUNTS OR BACKDOORS THAT WEREN T DISABLED MIXED USE BYOD The bring-your-own-device (BYOD) trend is increasing exposure to vulnerabilities, because many organisations are adopting a mixed personal and business-use device policy. CUSTOMER DATA AND IP These factors are coupled with the imperative to protect data privacy, data security and intellectual property.
SECURITY SOLUTIONS LAYERS OF PROTECTION Organisations need to adopt a multi-layered, holistic approach to manage today s threat landscape. You need to identify the critical assets that need protecting, and the levels of protection required. This helps you understand the level of security necessary across different parts of the organisation. PROCESS Application and Process Security Security Policy and Information Event Management Monitoring and Reporting Optus believes that a proactive security posture is necessary to prevent data loss this strategy should encompass people, processes and technology. PEOPLE People and Identity Security DATA Data and Information Security TECHNOLOGY Network and Infrastructure Vulnerability Assessment and Penetration Testing Application & Web Application Security Identity Authentication Email, Web and Data security Distributed Denial of Service Mitigation (DDoS) Intrusion Detection and Prevention Firewall / Secure remote access Network
05 ON GUARD WITH OPTUS OPTUS SECURITY SERVICES ENCOMPASS FIREWALLS INTRUSION PREVENTION WEB, EMAIL AND INFORMATION CONTENT SECURITY ENDPOINT PROTECTION DISTRIBUTED DENIAL-OF-SERVICE PREVENTION VULNERABILITY ASSESSMENTS SECURITY EVENT MANAGEMENT. Our monitoring services provide rapid detection of security incidents and vulnerabilities for proactive remediation. NETWORK SECURITY HOW DO I CONNECT SAFELY TO THE WEB? Firewall/intrusion prevention/ssl VPN Remote SSL VPN Authentication./access management CONTENT SECURITY HOW DO I DEAL WITH THE SOCIAL MEDIA TREND? Email, web and data content security Secure web gateway Application security ENDPOINT SECURITY HOW DO I DEAL WITH THE BYOD TREND? Mobile device security Data loss prevention and protection Data encryption Anti-malware/SPAM protection
SECURITY SOLUTIONS A BUNDLE FOR SECURITY PROTECTION We can help you on your security journey to protect your brand and reputation. ASSESS YOUR RISK WITH A VULNERABILITY ASSESSMENT Automatic vulnerability scanning of online traffic coming into and leaving the customer internet gateway. Using a network connected appliance, this is a non-intrusive span TAP/ mirror port on the network Customers can expect: Vulnerability assessment report Risks and recommendations report At NO charge* * Vulnerability Assessment is based on Optus Introductory Online Cyber Threat Vulnerability Assessment Service. UTILISE LOW COST AND RELIABLE OPTUS UECOMM INTERNET FOR CONNECTIVITY Fast, secure internet service is essential to modern business: Permanent, reliable internet connection with static IP addresses Supported by Optus Uecomm Ethernet VPN service Choice of bandwidth you want from a range of access services Bandwidth scalable as your business grows Detailed reporting capability to manage growth. PROTECT YOUR BUSINESS WITH A MANAGED SECURITY SERVICE Choose from a variety of managed security solutions including: Firewall/intrusion prevention/ SSL VPN Remote access security/ssl VPN Authentication and access management (IAM) Email, web and data; hybrid secure gateway and cloud Mobile device security/ endpoint security Application security management/ load-balancing Security event management/ monitoring and logging SECURITY PROTECTION
07 A RISK AND VULNERABILITY ASSESSMENT CAN HELP YOU UNDERSTAND YOUR CURRENT SECURITY POSTURE AND GUIDE YOU TO A SECURITY IMPROVEMENT PLAN THAT HAS THE RIGHT BALANCE BETWEEN EXPENDITURE AND RISK EXPOSURE. We can help you start your journey towards greater protection if: Your lines of defence are compromised Your existing security measures aren t addressing current risks or There are weaknesses in your IT security defences Early detection enables you to proactively reduce risk exposure. Optus security assessment services include: Security policy review; roles and responsibilities Network vulnerability assessment (external and internal) Penetration testing Report and remediation proposal On-going periodic automated monitoring and reporting
SECURITY SOLUTIONS WE WANT TO HELP YOU EVERY STEP OF THE WAY CONSULTING SERVICES We ll help to identify critical ICT security risks and recommend appropriate controls to better protect your people, customers, information, processes and technology. ARCHITECTURE DESIGN SERVICES We design and architect networks to secure and protect the confidentiality, integrity and availability of information that traverses the network and systems infrastructure. SOLUTION DEPLOYMENT We ll ensure the scope of the project meets your ICT environment and seamlessly integrates your critical functions to meet the configurations required. Solutions can be applied with varied levels of control to help you find the mix that is right for your environment, risk appetite and security strategy. ONGOING MANAGEMENT We ll maintain vigilance over your defences around the clock with our 24 x 7 monitoring and response capability. From our Network Operations Centre we monitor your network within response times that meet your requirements.
09 WE OFFER PROFESSIONAL SERVICES TO GIVE YOU PEACE OF MIND WHEN ADOPTING A SECURITY NETWORK. CHECKOUT OUR ONLINE VIDEOS FROM UPDATING FIREWALLS TO ASSESSING YOUR ORGANISATIONS VULNERABILITY EXPOSURE. Reducing security complexity yesopt.us/reducingcomplexity Updating firewalls yesopt.us/updatingfirewalls Securing your online presence yesopt.us/onlinepresence Remote access to corporate networks yesopt.us/accessnetworks 4 steps you should take yesopt.us/4steps
GIVE US A CALL To discuss how Optus can help you through innovative communications solutions; contact your Optus Account Manager or call the Optus Business hotline on 1800 555 937 JOIN THE CONVERSATION Web Twitter Blog optus.com.au/business @optusbusiness yesopt.us/blog 2013 SingTel Optus Pty Limited. OBN0174 1213KD