Case Study: Security Implementation for a Convenience Store Retailer



Similar documents
Case Study: Security Implementation for a Non-Profit Hospital

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Keeping your data yours.

Kim Decarolis Compliance and Security Specialist (248) Mark Wayne Vice President Compliance and Security Specialist

Tier3 Remote Monitoring System. Peace of Mind for Less Than a Cup of Coffee a Day

Overcoming PCI Compliance Challenges

Implementing Managed Services in the Data Center and Cloud Space

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Call us today Managed IT Services. Proactive, flexible and affordable

Company Profile. First Page. Previous Page. Next Page. Last Page. A Member of Harel Mallac Group

Continuous Penetration Testing

How To Improve The Shared Services Partnership Business Continuity Plan

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

PCI Compliance. Top 10 Questions & Answers

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Current IBAT Endorsed Services

Frequently Asked Questions

Autodesk PLM 360 Security Whitepaper

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

PCI Compliance Top 10 Questions and Answers

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

IBX Business Network Platform Information Security Controls Document Classification [Public]

Penetration testing & Ethical Hacking. Security Week 2014

BMC s Security Strategy for ITSM in the SaaS Environment

Secure networks are crucial for IT systems and their

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives

TECHNOLOGY SECURITY AUDIT

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

ADEC GROUP INFORMaTiON SecURiTY AND CONTROLS

NEC Managed Security Services

Are You Ready for PCI 3.1?

Nine Steps to Smart Security for Small Businesses

MANAGED SECURITY SERVICES (MSS)

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

PCI Deadline Are you Complying? Mark Cuneo. CardConnect

Securing the Service Desk in the Cloud

CLOUD GUARD UNIFIED ENTERPRISE

Firewall Administration and Management

Network Security and Vulnerability Assessment Solutions

Cisco Comprehensive Payments Solution

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

Leveraging security from the cloud

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Cloud Computing for SCADA

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION

The Value of Automated Penetration Testing White Paper

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

ASX SETTLEMENT OPERATING RULES Guidance Note 10

PCI Compliance: How to ensure customer cardholder data is handled with care

PCI DSS: An Evolving Standard

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

Security Testing for Web Applications and Network Resources. (Banking).

Zone Labs Integrity Smarter Enterprise Security

AVAILABILITY SERVICES MANAGED SERVICES

Caretower s SIEM Managed Security Services

Security Controls What Works. Southside Virginia Community College: Security Awareness

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Projectplace: A Secure Project Collaboration Solution

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Client Security Risk Assessment Questionnaire

Cloud Computing Governance & Security. Security Risks in the Cloud

Company Overview. Enterprise Cloud Solutions

Cyber Risks and Insurance Solutions Malaysia, November 2013

How To Protect Your Cloud Computing Resources From Attack

KeyLock Solutions Security and Privacy Protection Practices

BSNL IDC Hosted Firewall Service. Total Network Security

How To Reset A University Password Online On A Computer Or Cell Phone

Why You Need to Test All Your Cloud, Mobile and Web Applications

Digi Device Cloud: Security You Can Trust

MANAGED SERVICES. SCHEDULE M Date: 9/12/2014 CAROUSEL INDUSTRIES PRICELIST - STATE OF NJ YEAR 1 PRICING WITH 5% DISCOUNT

Privacy + Security + Integrity

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Diebold Security. for Every Aspect of Your Business

TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING

PCI DSS 3.1 and the Impact on Wi-Fi Security

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Stephen Coty Director, Threat Research

Your Compliance Classification Level and What it Means

security in the cloud White Paper Series

Frequently Asked Questions

Securing Cloud Infrastructures with Elastic Security

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

MK Certified Penetration Testing Specialist (CPTS) Exam.

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Understanding Financial Cloud Services

PCI Compliance 3.1. About Us

2012 North American Managed Security Service Providers Growth Leadership Award

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

Server Management & Monitoring Quick Guide

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Transcription:

Case Study: Security Implementation for a Convenience Store Retailer The Story Security Challenges and Analysis The Case The Clone Solution The Results

The Story About the Retailer A premier convenience store chain in the New Jersey / New York area with hundreds of standalone retail and gas stations needed to evaluate how it secured its network. Quick Facts - 3500 team members - 130 stores from New Jersey to New York - Numerous services including - Fresh coffee and food delivered daily - No-Fee ATMs - Money orders - Lottery - Gasoline - Pharmacy - Cash and gift cards

Security Challenge Analysis External Security and Protection - Their internal security team was spending 90% of their time on maintenance. - They wanted their security team to focus more on projects critical to the business. - They wanted an external security team that could detect threats, analyze them, and protect against future threats. High Availability - Needed backup in case their system crashed. - Wanted a failsafe to ensure they never lost important and sensitive data. - Needed a reporting system to analyze what went wrong if their system did crash due to an external attack. Data Center and Store Protection - Needed perimeter protection to ensure each store could protect their own network from hackers. - Wanted data center protection to ensure all the logs and other information flowing through their network were secure. Compliance - Needed a solution that ensured they maintained their PCI compliance. - Required to provide the necessary reports and analyses to prove PCI compliance. - Lacked a team of security specialists monitoring their data 24/7 to ensure compliance and protection.

Clone Security Solution Clone Guard Cloud - Private Cloud Data Center: Insulates all of their data operations into Clone s facilities. Certified security specialists monitor their cloud 24/7 to ensure it is secure and up-todate. - Cloud Security Service: This service meets CSA standards to ensure their security complies with industry security standards. - High Availability Cloud: Should their network infrastructure fail, Clone s high availability cloud will ensure they still have access to their files, applications, and critical data, so that their daily business is not interrupted. - Disaster Recovery Cloud: Creates a virtual snapshot of their system, applications, and files so they can access them even after a network disaster.

Clone Security Solution Clone Security Specialists and NOC - Utilizes data across all clients to enhance security, collect more data on threats, and eliminate them faster than internal security teams can. - Gathers data from a variety of sources including vulnerabilities, assets, geographical IPs, malicious hosts, and users. This data ensures Clone can detect more threats and eliminate false positives. - Reduces operational costs for customers. - Allows customers to focus on critical IT projects instead of systematic maintenance. PCI Certified Service Provider Ensures the retailer always meets PCI standards by: - Securing their network - Protecting credit card data used on premises - Maintaining their vulnerability management program - Controlling who has access to their network and other applications - Monitoring and testing all networks - Monitoring and securing their information in a secure portal

Clone Security Solution Clone Guard OneView - Monitors all security threats and attacks - Creates logs for those events - Protects against all attacks and threats - Generates aggregate security reports that provide analysis and conclusions on threats and attacks - Initiates on-demand actions like PCI and vulnerability scans and penetration tests

Results Enabled retailer to outsource 90% of its rote tasks to Clone Systems. Allowed retailer s internal security team to spend 95% of its time on projects critical to company. Saved retailer $1 million per year by: Utilizing Clone Systems data center. Using a cost-focused bundling plan for their solutions. Preventing over 1 billion threats from turning into costly attacks.

Summary When a convenience store needed a security system to protect the large amounts of customer data they process a day, they partnered with Clone Systems. Clone guaranteed that the customer s security would always - Be in compliance with PCI standards - Have backup and access to all their information if their internal network failed - Have a central portal where they could access all their information - Have Clone s 24/7 security team monitoring their systems and ensuring their safety