Managed Security Services
Now more than ever, security needs to be high on the corporate agenda. Advanced persistent threats continue to proliferate, originating from anywhere across the globe. Recent, high-profile data breaches and distributed denial of service attacks have shown the consequences of failing to adequately address security vulnerabilities. Regulations dictating the privacy, security, storage location and processing of data are expanding across the globe and non-compliance with legal and other standards can result in steep penalties. At the same time, recent revelations in the press regarding state-sponsored hacking have sparked a new wave of customer privacy and data protection fears. C-level executives have become concerned about advancing threats and are putting pressure on the IT department to step up their efforts to protect the business. Together, these forces create a number of challenges for IT leaders, including: Difficultly in improving compliance efficiency and establishing the compliance reporting requirements Inability to keep up to date with the latest security threats as they emerge Multiple security technologies and services from different providers, which leads to an internal administrative burden Lack of interoperability between disparate security systems and siloed reporting mechanisms, which leads to a lack of end-to-end visibility Difficulty in scaling the security infrastructure keep pace with expansion of the business Inadequate resources to mitigate the risks faced by the business The implications of these challenges include loss of faith on the part of business in IT, overworked IT teams and staff churn. At worst, inadequate security management could result in a breach, the financial and reputational consequences of which can be grave. There s no better time to take a proactive stance to enterprise security. As an IT leader you need to: Ensure that experts are watching over security systems in real time and on an ongoing basis, 24x7 Reduce costs and the burden on internal IT Manage your IT infrastructure while focusing on core business objectives Provide your executives with the confidence that security is being managed effectively Improve your security posture through more control, and increased confidentiality, integrity and availability of core business systems
Dimension Data s Managed Security Services Identifying and solving real-time security risks through a proven, continuous management process. Dimension Data has effective solutions for organisations seeking to outsource the management of their information security requirements. Our services give you peace of mind that experts are watching over your security systems in real time, 24x7. You can outsource the management of specific security activities and services so that you can achieve the business flexibility you need to manage your IT infrastructure while focusing on core business objectives. Our Managed Services for Security include: Managed Firewall Service Managed Intrusion Detection and Prevention Service Our Cloud Services for Security include: Real-time Threat Management-as-a- Service Web Security-as-a-Service Email Security-as-a-Service All our Managed Services for Security include: Maintenance 24x7 technical phone support Around-the-clock security monitoring and maintenance Comprehensive reporting Managed Firewall Service Protects key information assets across networks, hosts, applications and databases. A managed firewall service, built on commercially supported, industry-leading products from providers such as Cisco, Palo Alto, Juniper, Check Point, Fortinet, Industrial Defender and Sourcefire Firewall management, monitoring and maintenance by experienced security analysts 24x7 Firewall and security event monitoring, generating immediate alerts and responses for service outages and security threats and breaches associated with critical Internet access points Industry best practices to ensure a high level of network access and information availability, integrity and privacy access to highly trained security experts who act as an extension of your in-house IT team, providing analysis, configuration, set-up, alerts and 24x7 management of the firewall policy analysis and audit option that provides visibility of complex security policies, and streamlines and automates operations and ensures network security devices are properly configured A client security portal that provides the intelligence and analytics you need to easily understand your risks, demonstrate compliance and make better security decisions. The client security portal gives you full visibility into your security and compliance posture with advanced reporting functionality integrated across all of our Managed Security Services Custom firewall configurations: focused, cost-effective security solutions for your enterprise regardless of business size or market Guaranteed responsiveness: to security events detected or issues with system performance Daily management: with complete firewall system maintenance, including rule-based backup and restoration, software updates, patches and system configuration Reduced costs: associated with hiring, training, managing and retaining high quality security engineering personnel Improved agility: by freeing up your internal resources to focus on your core business outcomes and requirements Flexible financial terms: an opportunity to consume the service as an operational expense, negating the need to purchase hardware and software Streamline firewall operations: and improve firewall performance Firewall audit: reduce preparation time and costs Tighter security policy: for improved protection against cyber-attacks Access to Security Operations Centre (SOC): 24x7 support and escalated engineering protected classification level and PCI DSS Access to critical security data: including detailed analysis, summary overviews and customised query reports Business intelligence: the client security portal features integrated business intelligence and analytics tools to help you gain the meaningful insights and new perspectives you need to answer these questions and make better security decisions. Highly customisable data visualisations and reports give you point-in-time snapshots as well as historical trending perspectives across multiple security metrics Security reporting: To help demonstrate security effectiveness and reduce the burden of compliance reporting client security portal provides you with an extensive set of pre-built reports for security and compliance. Reporting has been specifically designed to help clients demonstrate adherence to regulatory requirements and provide enterprise-wide visibility into the performance of security controls
Managed Intrusion Detection and Prevention Service Enables you to implement intrusion detection and prevention systems without devoting costly internal resources to managing, maintaining and monitoring the systems. Around-the-clock protection: true continuity of process and constant vigilance Support for solutions from marketleading vendors: Cisco, McAfee, Juniper, Sourcefire, Tipping Point, Palo Alto, IBM, Fortinet, Industrial Defender and Snort Daily management: including finetuning of filters, software updates and patches, and system configuration Rapid intrusion identification, escalation and response using proven processes that ensure security events are responded to and escalated quickly Client security portal: that provides the intelligence and analytics you need to easily understand your risks, demonstrate compliance and make better security decisions. The client security portal gives you full visibility into your security and compliance posture with advanced reporting functionality integrated across all of our Managed Security Services Improved security posture, delivering a stronger return on investment than you d achieve by managing the system internally Reduced costs associated with hiring, training, managing and retaining high quality security engineering personnel Improved agility by freeing up your internal resources to focus on your core business outcomes and requirements Access to Security Operations Centre (SOC): 24x7 support and escalated engineering protected classification level and PCI DSS Access to critical security data: including detailed analysis, summary overviews and customised query reports Business intelligence: the client security portal features integrated business intelligence and analytics tools to help you gain the meaningful insights and new perspectives you need to answer these questions and make better security decisions. Highly customisable data visualisations and reports give you point-in-time snapshots as well as historical trending perspectives across multiple security metrics Security reporting: to help demonstrate security effectiveness and reduce the burden of compliance reporting client security portal provides you with an extensive set of pre-built reports for security and compliance. Reporting has been specifically designed to help clients demonstrate adherence to regulatory requirements and provide enterprise-wide visibility into the performance of security controls Real-Time Threat Managementas a Service Enables you to effectively monitor, detect, analyse and respond to the security data your network produces, all in real time. The service combines collection, correlation, management, early warning and detection, with 24x7 expert security analysis and incident response to keep your network ahead of today s evolving risks. Real-time security event management: security device monitoring for security events 24x7x365 Powerful correlation: global and predictive intelligence, content- and context-aware monitoring Threat analysis and incident response: support during the process of incident identification, investigation, response and containment, rectification, restart and monitoring Risk and threat assessment: proactive risk assessment to understand the overall vulnerability of any particular asset within the organisation Visibility and reporting: detailed security dashboards including powerful search and reporting tools available 24x7 via a client security portal Optional services include network behavioural anomaly detection, complianceaware monitoring, identity and role correlation, and insider threat monitoring. Safeguard your business: by gaining complete visibility of activity across your IT infrastructure Better protection: of information assets to minimise any impact on business operations and reduce overall security risk Rapid identification, prioritisation and response: to policy breaches, cybersecurity attacks and insider threats Enhanced risk management: through effective incident management, incident escalation and rapid response to outbreaks by dedicated security engineers, using advanced query and analysis tools Improved agility: by freeing up your internal resources to focus on your core business outcomes and requirements Complete visibility: of security activity on your network Access to Security Operations Centre (SOC): 24x7 support and escalated engineering protected classification level and PCI DSS Regulations dictating the privacy, security, storage location and processing of data are expanding across the globe and non-compliance with legal and other standards can result in steep penalties
Web Security-as-a-Service Allows you to embrace cloud and social media technologies as a means to deliver and exchange information, while gaining the advanced protection from accidental data loss, malicious attacks and emerging threats. Integration of web and mobile security: one policy, one console, and one global security platform. Ensures gap-free protection against advanced threats, zero-day attacks, and data theft with one seamless solution Cloud application and social media control: to fully leverage the power of cloud applications and social media without compromising productivity or security Antivirus and anti-spyware: for complete, inline protection from viruses and spyware because the technology sits between the user and the Internet, your policy and protection are consistent across devices and locations Dynamic URL filtering: with flexible and granular URL categories, organised in a hierarchy that enables better analysis and control Behavioral analysis: provides nonsignature based protection against zero day exploits. By executing suspicious binary files in a sandbox, malicious content can be identified even if the sample has never been previously observed. The cloud model ensures that when a file is identified, users across the entire network are immediately protected Bandwidth control: easily and efficiently allocate bandwidth to prioritise business-critical web applications over recreational usage Gap-free security: instant protection against threats and vulnerabilities without the need to patch. Safeguards against advanced persistent threats (APTs) by leveraging sophisticated techniques like behavioural analysis. Easily secure all smartphones and tablets without an agent Cost savings: no appliances, software or clients to deploy and manage. Just pay as you go no patching, no updates and no backhauling! No buying excess capacity cloud scales as you need capacity Simplicity and efficiency: eliminate complexity and point products nothing to deploy and manage. Global policy management one policy follows users all around the world Compliance and real-time analytics: helps meet regulatory and industry compliance HIPAA, PCI, FISMA, etc. View any transaction, by any user, from any location in seconds. Comprehensive DLP across all devices Global cloud coverage: world s largest global security cloud; 100+ data centers. Five 9s availability local, regional and multi-continent redundancy Access to Security Operations Centre (SOC): 24x7 client support and escalated engineering in Australia protected classification level and PCI DSS. Guaranteed log retention: within Australia
Email Security-as-a-Service Enables a consistent, always-on email experience for your users, while guarding against email threats including viruses, phishing, spam, spyware, data theft and blended threats Perimeter IP filtering: to block threats before they reach your network, together with email attack protection Anti-spam: advanced spam, graymail and fraud protection Antivirus and anti-spyware: layered virus and worm scanning to block known viruses Unified policy administration: creating and managing consistent email security policies across devices, users, groups and more defined once, with changes instantly reflected across the entire cloud Real-time reporting and analysis: message audit, message tracking and disposition tool Real-time DLP (optional): by scanning all data in emails leaving your organisation, including email message body and attachments Boundary encryption (optional): secure delivery of email messages and allowing IT to easily enforce delivery of emails over an encrypted channel based on the combination of sender, receiver and content of emails Messaging continuity (optional): seamless email continuity service to protect your organisation s reputation, operations and productivity Email archiving (optional): to ensure safe, simple, cost-effective retention of inbound, outbound, internal and historical email Get email protection from the security experts: obtain comprehensive email protection and availability as a turnkey service. All detection, filtering, quarantine, backup, and recovery functions are located and managed at our secure facilities Block threats before they reach your network: email Security-as-a-Service works in the cloud, using in-memory filtering, to block more than 99% of spam, viruses, worms, phishing scams, and fraudulent emails outside your network. Triple virus and worm scanning block malware with industry-leading low false-positive rates Filter emails in real time with a proxy-based approach: get intelligent email processing that virtually eliminates risk of loss associated with system outages, message interception, or corruption from an infected email base Keep users from clicking on malicious links within emails: eliminate the phishing and malware threats from embedded URLs within an email message Encrypt sensitive company data to maintain compliance with privacy and security regulations: protect your confidential outbound email with Transport Layer Security (TLS), a feature that provides gateway-to-gateway encryption without disrupting the dayto-day workflow of your employees Guarantee business continuity: activate a secure, easy-to-use web interface for your users and administrators to compose, send, receive, and manage emails during any mail server outage or disaster with uninterrupted protection for all inbound and outbound messages Access to Security Operations Centre (SOC): 24x7 support and escalated engineering protected classification level and PCI DSS
to you: Dimension Data provides you with peace of mind that all your critical information assets are secured while lowering the total cost of ownership of your security infrastructure You gain a security service that combines intelligent technology with the sharpest security minds. Automated tools enable our analysts to quickly evaluate, correlate and prioritise events coming from different managed components. Once we detect a definitive irregularity, we act to stop hackers in their tracks By using industry-leading data mining and correlation technology, we transform network-monitoring data into powerful information, enabling you to confidently compete in your marketplace With us taking care of your security, your IT employees can focus on what they do best: growing your business You can easily scale your IT security as your organisation grows You can reap the benefits of utilising the collective knowledge gained through our engagements with hundreds of managed services clients Why Dimension Data? Broad technical and integration expertise across a variety of IT disciplines, including: networking, security, unified communications and collaboration, data centres, virtualisation, Microsoft and contact centres Strategic partnerships with leading security technology vendors, including Cisco, Check Point, Blue Coat, RSA, McAfee, Zscaler, Juniper, Sourcefire, Imperva, Palo Alto, Fortinet and ArcSight Proven track record: over 6,000 security clients across all industry sectors, including financial services, telecommunications, health care, manufacturing, government and education Global footprint, local delivery: with over 15,000 employees and operations in 52 countries across five continents, Dimension Data manages more than USD12.5 billion of network infrastructure through five Global Service Centres on a 24x7 basis, in more than 15 languages Real-time security information and event management architecture: an enterprise-wide risk management solution enabling our SOC analysts to centrally manage attacks, threats and exposures by correlating security information from firewalls, intrusion detectors, virus scanners, VPNs, operating systems, authentication solutions, vulnerability scanning tools and other security checkpoints. The solution enables our analysts to eliminate clutter such as false-positives, while quickly identifying the real security threats to help them respond with adaptive security measures Security Operations Centres: our SOCs maintain multiple, redundant connections to the Internet, each communicating with separate Tier-1 ISPs Security experts: our team of certified security experts bring a century of combined cyber security experience with such organisations as CERT, Department of Defence, IBM and Cisco, to augment the knowledge base of your IT organisation and provide peace of mind that skilled technicians are there to help you respond to and mitigate threats Certifications: ISO9001, ISO 27001 Australian Signals Directorate (ASD) Protected Gateway, PCI DSS, Cisco MSCP, Information Security Manual (ISM) and ASIO T4. Contact us For more information, please contact your nearest Dimension Data office or visit http://www.dimensiondata.com. DDCC-1437 / 11/13 Copyright Dimension Data 2013 For further information visit: www.dimensiondata.com
Middle East & Africa Asia Australia Europe Americas Algeria Angola Botswana Congo Burundi Democratic Republic of the Congo Gabon Ghana Kenya Malawi Mauritius Morocco Mozambique Namibia Nigeria Oman Rwanda Saudi Arabia South Africa Tanzania Uganda United Arab Emirates Zambia China Hong Kong India Indonesia Japan Korea Malaysia New Zealand Philippines Singapore Taiwan Thailand Vietnam Australian Capital Territory New South Wales Queensland South Australia Victoria Western Australia Belgium Czech Republic France Germany Italy Luxembourg Netherlands Spain Switzerland United Kingdom Brazil Canada Chile Mexico United States For contact details in your region please visit www.dimensiondata.com/globalpresence