SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information security for global organizations, using its unique position in the North American marketplace to offer low-cost yet world-class services to its select group of some of the world s leading companies. Over the last fourteen years SecureOps has been offering its clients a way to save 50% and more on operational security costs, for a superior and more flexible service, when compared to large outsourcers. Top Ranked Security Outsourcer Classed as one of the top outsourcers in any category for Motorola for the past five years, SecureOps consistently earns top ranks from its client list that includes Deutsche Telecom (T-Mobile subsidiary), Freescale Semiconductor, Motorola and some of the world s largest consumer goods companies. Our dedicated team supports our clients globally, on a 24/7/365 basis, using a specialized SLA-driven business model and deep pool of subject matter experts. Cost Optimization using Best of Breed Our specialty is working with large organizations to find ways to optimize and reduce operational information security costs while maintaining the highest levels of compliance and performance using a range of Gartner magic quadrant tools that include Palo Alto, Checkpoint, Juniper, Cisco, Arcsight, Q1, Splunk, Foundstone, Qualys, ISS (IBM), McAffee, and Symantec. We have the flexibility to offer any of these products and services as either capital or operational costs depending on budgetary requirements and restrictions. Expertise and View into Market SecureOps has been an active and organizing member of the Information Security Forum (ISF) for the past decade, a global organization that brings many of the world s leaders in this field together. We also regularly organize our own events on both the East and West coasts, bringing together the heads of information security for a large cross-section of F500-class companies in each area to share their experiences.
Overview of Services While organizations work extremely hard to keep focus on their core business strategy, their security infrastructure can sometimes be overlooked or even worse, come as an afterthought. Infrastructure Firewalls SecureOps currently manages client firewalls using Palo Alto, Checkpoint, Juniper, Cisco and Fortinet. We manage equipment worldwide and have a wide experience installing, maintaining and managing firewalls for large organizations. We have unique skill sets for designing and adapting firewalls and related technologies for demanding and unusual situations, on large scales, and in particular to protect far-flung supply chain deployments. Network Monitoring SecureOps currently handles network monitoring and incident detection for a range of global organizations. We have deployments working with clients that include Security Incident and Event Management (SIEM) tools including Arcsight, RSA, Q1, and Alienvault. We are a significant user of Splunk, either as a secondary SIEM tool, for logging, or as a data management and analysis tool. Vulnerability Management Programs Designing and managing vulnerability management programs for large organizations is another of SecureOps specialties, using industry-leading tools such as Foundstone, Qualys, ncircle, ISS, Nessus and CoreImpact. Intrusion Detection SecureOps also currently installs and maintains Intrusion Detection Systems (IDS) from Palo Alto, McAffee, Symantec, and SourceFire. Endpoint Protection and More SecureOps manages security on several hundred thousand endpoints for its clients, employing tools such as PointSec, WinMagic, Vertisys and Safeboot. We also deploy a range of more esoteric tools, such as Bit9 whitelisting. A range of other security related service are offered, including Internet Point-of-Presence (ipop), database encryption, VPN management, load balancing, authentication and more.
Case Studies Outsourcing of your critical security operations to a focused team of security professionals can mean the difference between cleaning up after a security incident, and preventing it from ever happening in the first place. Log Monitoring and Incident Handling SecureOps was asked to provide a bid to help an F100 company to reduce their security monitoring costs and re-segment their network. This was a turnkey project that involved analysis, technology selection, deployment, management and maintenance as well as monitoring and incident handling services over a 3 year period. SecureOps won this business with a bid that was 65% less than competitive offers from large network outsourcing providers. Incident Management and Triage SecureOps was asked to assist one of the top-four US telecom providers with challenges involved in getting their security events investigated and under control. Their security monitoring service was overwhelming their incident handling staff with events to investigate. SecureOps provided pricing that was about half of the cost of their internal staff in order to handle the work properly. In addition to this, SecureOps is now putting in place tweaking and tuning processes (for both the monitoring outsourcer and the internal IDS team) that will gradually reduce the number of events of interest, and thus the overall cost, being reported over time. Internet Point of Presence SecureOps was asked to provide pricing for a new Internet point of presence to support over 20,000 Internet users for an F100 technology company that was moving many of their internal services to the cloud. SecureOps avoided an RFP with a quote that was more than 50% lower than the previous network supplier and other outsourcers. SecureOps has just finished the successful deployment of the new hardware and integration work around this. SecureOps is in charge of managing the data center, switching, routers, firewalls and other types of "bolt-on" Internet services.
Staying on top of the security technology curve is a resource-intensive activity. Secure- Ops has the dedicated resources to assist you in the evaluation, deployment and management of emerging technologies. Full Menu of Services Offered Data Protection (End-point and Network) Encryption DLP Anti-Malware/Virus Mobile Security Infrastructure Protection Firewall IPS/IDS VPN Proxying Secure Networking (e.g. Internet point of presence) Other Security Management (e.g. Netwitness, Dambella, etc) Verification & Monitoring Services Log Monitoring Log Aggregation Correlation Services Pen Testing Vulnerability Scanning Controls Verification and Control Tests Vulnerability Management Services Security Assessments
Other Services Offered In a mission-critical infrastructure, lax security equivocates to single point of failure. Service-on-Demand SecureOps assists its clients by understanding their business case requirements, and providing proven technologies for secure remote access to corporate data. - Engages with its customers to assist in defining the security needs - Management processes to help mitigate the security risks - Streamlined security technologies and vendor neutral positioning - Development & deployment as well as management services across the value chain of the enterprise security lifecycle - Turnkey risk based services Global Specialists Assess & Discover Proven technology skills and certification, as well as deep domain expertise in assisting customers achieve their information risk management goalswe help you apply proven encryption methods, password standards, and infrastructure design, using industry best practices and technologies. Our Professional Services Group Performs security assessments and audits on a wide range of systems, architectures and technologies, using industry standard methodologies and references. This results in a good understanding of the risks inherent to a specific system, and the appropriate mitigation measures.
Managing world-class information security processes, SecureOps can help you lower your total cost of ownership while improving your security posture. Enterprise Security Awareness Enterprise security has a profound impact on the end user experience. User risk factors are highly impacted by the user awareness to a Web 2.0 environment. SecureOps educational methodologies assist in reducing the curve towards a responsible on-line workplace. Flexible Solutions Tailored to Specific Needs Our service platform allows the dynamic provisioning of managed services in a manner that can be individually tailored to meet your unique security and budgetary requirements. Our flexible service-delivery monthly payment program will lower capital expenditures, reduced operating expense, improved security posture with open or fixed payment structure. Helping Business Focus on their Core We help develop realistic and standards-based information security policies addressing the whole range of information domains. Cutting edge technologies require cutting edge security, and SecureOps has developed an expertise in designing custom security services for a wide range of emerging technologies, thus allowing its customers to secure their infrastructure, way before they become mainstream. This includes the initial risk analysis, elaboration of the security solution, evaluation and selection of the products to be included, writing of the policies and processes related to the service and training of the personnel.
ITs WORLD Matthew Mather Director, Security Strategies matthew.mather@secureops.com tel: 514 622 6625 Head Office 1550 Metcalfe Street, Suite 502 Montreal, Quebec, Canada Tel.: 514-982-0678