How To Make Money On Security For A Large Organization



Similar documents
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

McAfee Security Architectures for the Public Sector

Q1 Labs Corporate Overview

Cisco Advanced Services for Network Security

Current IBAT Endorsed Services

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

The Cisco ASA 5500 as a Superior Firewall Solution

Managed Security Services Portfolio

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Payment Card Industry Data Security Standard

Requirements When Considering a Next- Generation Firewall

INCIDENT RESPONSE CHECKLIST

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Response to Questions CML Managed Information Security

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

How To Protect Your Network From Attack From A Network Security Threat

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Security Services. 30 years of experience in IT business

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Preemptive security solutions for healthcare

What is Security Intelligence?

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

PANTHER TRANSPORTATION MANAGEMENT SOLUTIONS. Low cost. Quick start. Big improvement.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Discover Security That s Highly Intelligent.

How To Buy Nitro Security

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Splunk: Using Big Data for Cybersecurity

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

Braindumps QA

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

How to Define SIEM Strategy, Management and Success in the Enterprise

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

SANS Top 20 Critical Controls for Effective Cyber Defense

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Cisco Security Optimization Service

IBM Security Strategy

Vulnerability. Management

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Information security controls. Briefing for clients on Experian information security controls

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Safeguarding the cloud with IBM Dynamic Cloud Security

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Symantec Consulting Services

Vulnerability management lifecycle: defining vulnerability management

TECHNOLOGY INTEGRATION GUIDE

TCS Managed Security Services

Corporate Overview. Who We Are: What We Do: Quick Facts: Products. Services. Training. Support. Monitored and Managed Services

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

RFP # ADDENDUM #1 & ACKNOWLEDGMENT OF RECEIPT

Proof of Concept service. Professional and Managed Services. Installation services. First Looks

Security Information & Event Management (SIEM)

Solutions for admission control and data loss prevention in a modern corporate network

Modular Network Security. Tyler Carter, McAfee Network Security

Digital War in e-business

VMware Integrated Partner Solutions for Networking and Security

Symantec Security Information Manager Version 4.7

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Guardian365. Managed IT Support Services Suite

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

CYBER SECURITY Audit, Test & Compliance

Simplifying Human Resource Management

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Four Top Emagined Security Services

VMware Hybrid Cloud. Accelerate Your Time to Value

Beyond passwords: Protect the mobile enterprise with smarter security solutions

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Remote Services. Managing Open Systems with Remote Services

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Services. Hospital Solutions: Integrated Healthcare IT and Business Process Solutions that Achieve Breakthrough Results

Deloitte Cyber Risk Services Providing trust in a digital world

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar Vulnerability Manager

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.

Transcription:

SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information security for global organizations, using its unique position in the North American marketplace to offer low-cost yet world-class services to its select group of some of the world s leading companies. Over the last fourteen years SecureOps has been offering its clients a way to save 50% and more on operational security costs, for a superior and more flexible service, when compared to large outsourcers. Top Ranked Security Outsourcer Classed as one of the top outsourcers in any category for Motorola for the past five years, SecureOps consistently earns top ranks from its client list that includes Deutsche Telecom (T-Mobile subsidiary), Freescale Semiconductor, Motorola and some of the world s largest consumer goods companies. Our dedicated team supports our clients globally, on a 24/7/365 basis, using a specialized SLA-driven business model and deep pool of subject matter experts. Cost Optimization using Best of Breed Our specialty is working with large organizations to find ways to optimize and reduce operational information security costs while maintaining the highest levels of compliance and performance using a range of Gartner magic quadrant tools that include Palo Alto, Checkpoint, Juniper, Cisco, Arcsight, Q1, Splunk, Foundstone, Qualys, ISS (IBM), McAffee, and Symantec. We have the flexibility to offer any of these products and services as either capital or operational costs depending on budgetary requirements and restrictions. Expertise and View into Market SecureOps has been an active and organizing member of the Information Security Forum (ISF) for the past decade, a global organization that brings many of the world s leaders in this field together. We also regularly organize our own events on both the East and West coasts, bringing together the heads of information security for a large cross-section of F500-class companies in each area to share their experiences.

Overview of Services While organizations work extremely hard to keep focus on their core business strategy, their security infrastructure can sometimes be overlooked or even worse, come as an afterthought. Infrastructure Firewalls SecureOps currently manages client firewalls using Palo Alto, Checkpoint, Juniper, Cisco and Fortinet. We manage equipment worldwide and have a wide experience installing, maintaining and managing firewalls for large organizations. We have unique skill sets for designing and adapting firewalls and related technologies for demanding and unusual situations, on large scales, and in particular to protect far-flung supply chain deployments. Network Monitoring SecureOps currently handles network monitoring and incident detection for a range of global organizations. We have deployments working with clients that include Security Incident and Event Management (SIEM) tools including Arcsight, RSA, Q1, and Alienvault. We are a significant user of Splunk, either as a secondary SIEM tool, for logging, or as a data management and analysis tool. Vulnerability Management Programs Designing and managing vulnerability management programs for large organizations is another of SecureOps specialties, using industry-leading tools such as Foundstone, Qualys, ncircle, ISS, Nessus and CoreImpact. Intrusion Detection SecureOps also currently installs and maintains Intrusion Detection Systems (IDS) from Palo Alto, McAffee, Symantec, and SourceFire. Endpoint Protection and More SecureOps manages security on several hundred thousand endpoints for its clients, employing tools such as PointSec, WinMagic, Vertisys and Safeboot. We also deploy a range of more esoteric tools, such as Bit9 whitelisting. A range of other security related service are offered, including Internet Point-of-Presence (ipop), database encryption, VPN management, load balancing, authentication and more.

Case Studies Outsourcing of your critical security operations to a focused team of security professionals can mean the difference between cleaning up after a security incident, and preventing it from ever happening in the first place. Log Monitoring and Incident Handling SecureOps was asked to provide a bid to help an F100 company to reduce their security monitoring costs and re-segment their network. This was a turnkey project that involved analysis, technology selection, deployment, management and maintenance as well as monitoring and incident handling services over a 3 year period. SecureOps won this business with a bid that was 65% less than competitive offers from large network outsourcing providers. Incident Management and Triage SecureOps was asked to assist one of the top-four US telecom providers with challenges involved in getting their security events investigated and under control. Their security monitoring service was overwhelming their incident handling staff with events to investigate. SecureOps provided pricing that was about half of the cost of their internal staff in order to handle the work properly. In addition to this, SecureOps is now putting in place tweaking and tuning processes (for both the monitoring outsourcer and the internal IDS team) that will gradually reduce the number of events of interest, and thus the overall cost, being reported over time. Internet Point of Presence SecureOps was asked to provide pricing for a new Internet point of presence to support over 20,000 Internet users for an F100 technology company that was moving many of their internal services to the cloud. SecureOps avoided an RFP with a quote that was more than 50% lower than the previous network supplier and other outsourcers. SecureOps has just finished the successful deployment of the new hardware and integration work around this. SecureOps is in charge of managing the data center, switching, routers, firewalls and other types of "bolt-on" Internet services.

Staying on top of the security technology curve is a resource-intensive activity. Secure- Ops has the dedicated resources to assist you in the evaluation, deployment and management of emerging technologies. Full Menu of Services Offered Data Protection (End-point and Network) Encryption DLP Anti-Malware/Virus Mobile Security Infrastructure Protection Firewall IPS/IDS VPN Proxying Secure Networking (e.g. Internet point of presence) Other Security Management (e.g. Netwitness, Dambella, etc) Verification & Monitoring Services Log Monitoring Log Aggregation Correlation Services Pen Testing Vulnerability Scanning Controls Verification and Control Tests Vulnerability Management Services Security Assessments

Other Services Offered In a mission-critical infrastructure, lax security equivocates to single point of failure. Service-on-Demand SecureOps assists its clients by understanding their business case requirements, and providing proven technologies for secure remote access to corporate data. - Engages with its customers to assist in defining the security needs - Management processes to help mitigate the security risks - Streamlined security technologies and vendor neutral positioning - Development & deployment as well as management services across the value chain of the enterprise security lifecycle - Turnkey risk based services Global Specialists Assess & Discover Proven technology skills and certification, as well as deep domain expertise in assisting customers achieve their information risk management goalswe help you apply proven encryption methods, password standards, and infrastructure design, using industry best practices and technologies. Our Professional Services Group Performs security assessments and audits on a wide range of systems, architectures and technologies, using industry standard methodologies and references. This results in a good understanding of the risks inherent to a specific system, and the appropriate mitigation measures.

Managing world-class information security processes, SecureOps can help you lower your total cost of ownership while improving your security posture. Enterprise Security Awareness Enterprise security has a profound impact on the end user experience. User risk factors are highly impacted by the user awareness to a Web 2.0 environment. SecureOps educational methodologies assist in reducing the curve towards a responsible on-line workplace. Flexible Solutions Tailored to Specific Needs Our service platform allows the dynamic provisioning of managed services in a manner that can be individually tailored to meet your unique security and budgetary requirements. Our flexible service-delivery monthly payment program will lower capital expenditures, reduced operating expense, improved security posture with open or fixed payment structure. Helping Business Focus on their Core We help develop realistic and standards-based information security policies addressing the whole range of information domains. Cutting edge technologies require cutting edge security, and SecureOps has developed an expertise in designing custom security services for a wide range of emerging technologies, thus allowing its customers to secure their infrastructure, way before they become mainstream. This includes the initial risk analysis, elaboration of the security solution, evaluation and selection of the products to be included, writing of the policies and processes related to the service and training of the personnel.

ITs WORLD Matthew Mather Director, Security Strategies matthew.mather@secureops.com tel: 514 622 6625 Head Office 1550 Metcalfe Street, Suite 502 Montreal, Quebec, Canada Tel.: 514-982-0678