NETWORK SECURITY SOLUTIONS



Similar documents
16+ PCI COMPLIANCE SOLUTIONS. Providing a High-Level Review of Your Company s PCI Obligations OVERVIEW. Our Team

Remote Management Services Portfolio Overview

Vulnerability Management

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Cisco Network Optimization Service

Cisco Security Optimization Service

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

Optimize Your Automation System and Engineering Investment

Cisco Remote Management Services for Financial Services

Requirements When Considering a Next- Generation Firewall

Information & Asset Protection with SIEM and DLP

The Benefits of an Integrated Approach to Security in the Cloud

Cisco Advanced Services for Network Security

Cloud Security Trust Cisco to Protect Your Data

COUNTERSNIPE

How To Protect Your Network From Attack From A Network Security Threat

Cisco Data Center Optimization Services

OPEN SOURCE SOFTWARE CUSTODIAN AS A SERVICE

Accelerate Your Enterprise Private Cloud Initiative

Application Inspection Triggers: Providing Right APM Data, to the Right People, at the Right Time

THE THREE Es OF MODERN SECURITY FOR PHISHING

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Security. Security consulting and Integration: Definition and Deliverables. Introduction

The Protection Mission a constant endeavor

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Alcatel-Lucent Services

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

IT Security & Compliance. On Time. On Budget. On Demand.

Effective Use of Assessments for Cyber Security Risk Mitigation

TURN YOUR COMPANY S GOALS INTO AN ACTIONABLE PLAN

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

FIVE PRACTICAL STEPS

CONNECTING DATA WITH BUSINESS

Symantec Consulting Services

2012 North American Managed Security Service Providers Growth Leadership Award

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Server Virtualization Cloud Partner Training Series

Strategies for assessing cloud security

Advanced Threats: The New World Order

North American Electric Reliability Corporation (NERC) Cyber Security Standard

I D C A N A L Y S T C O N N E C T I O N

ENABLING TODAY S WIRELESS ENTERPRISE

Business Case for Virtual Managed Services

Cisco RSA Announcement Update

The Importance of Cybersecurity Monitoring for Utilities

Introduction. Industry Changes

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Meru MobileFLEX Architecture

Monitoring & Measuring: Wi-Fi as a Service

Secure360. Measuring the Maturity of your Information Security Program Impossible? Presented by: Mark Carney, VP of Strategic Services

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

OVERVIEW. Enterprise Security Solutions

WHO ARE WE AND WHAT WE DO?

Der Weg, wie die Verantwortung getragen werden kann!

Emerging Trends in the Network Security Market in India, CY 2013

What is Security Intelligence?

Choosing the Right Project and Portfolio Management Solution

AL RAFEE ENTERPRISES Solutions & Expertise.

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Meru MobileFLEX Architecture

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Cisco Remote Management Services for Security

Best Practices for PCI DSS V3.0 Network Security Compliance

HP Application Security Center

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

BMC s Security Strategy for ITSM in the SaaS Environment

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The SIEM Evaluator s Guide

Five keys to a more secure data environment

Bridging the Gap Between IT and Facilities: Morgan Stanley Case Study

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.

NCR Wireless Solutions. A comprehensive wireless portfolio to empower your employees and customers

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

Customer FIRST Program Guide Industry Leading Software Maintenance, Support and Services

Network Security and Vulnerability Assessment Solutions

PCI DSS READINESS AND RESPONSE

PUB (MPI) 1-62 Reference: Gartner Scorecard

TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR

Decrease your HMI/SCADA risk

Virtualization Essentials

Cisco Secure BYOD Solution

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Transcription:

NETWORK SECURITY SOLUTIONS Protecting Your Environment While Maintaining Connectivity OVERVIEW Network security and design is significantly more complex than it was even just a few years ago, and the pace of rapidly evolving threats shows no sign of slowing. Managing network security can be extremely difficult when you layer in the additional complexities of compliance mandates, Bring Your Own Device (BYOD) and mobility, lack of visibility and the requirement to quickly solve problems. We provide a wide range of Network Security services and solutions to help you decipher new technology, understand which improvements are right for your infrastructure, and separate real threats from security noise. Our Team 50 + Consultants Dedicated to Network Security Identification and Selection Proof of Concept 150 + Integration Upgrade PLAN Design Resale Network Technology Health Check Certifications Optimization Managed Services RUN Quick Start Implementation 500+ BUILD Migration Network Security Projects in 2014 Technology Consulting Services: We help you assess your current infrastructure, plan for a technology purchase, determine your readiness for implementation and much more with our consulting offerings. Readiness Assessment Site Survey Technology Summit Network Mapping Technology Assessment Managed Security Services Architecture Review Training Services TECHNOLOGIES SUPPORTED Firewall DNS/DHCP/IPAM Network Access Control Network IPS Network Malware Detection and Prevention Mobile Device Management Route/Switch SSL VPN

1. Readiness Assessment Assess your readiness to deploy, support and derive value from a given technology. A holistic approach to assessing an organization s current architecture, technology investments, people, processes and goals to determine capability to successfully support and derive value from a technology investment. Types of Assessments Offered Network Access Control Analysis Typically two weeks An executive summary of the engagement including a detailed report of the current readiness status, findings and recommendations. 2. Technology Summit Narrow the technology buying decision and provide a base of knowledge and sample processes for all stakeholders. On-site workshop between our technology experts and your key security stakeholders to create an understanding of the technology and a unified perspective across security, compliance, IT and audit leadership. Types of Summits Offered Mobility Alignment Deep Dive Technology Typically two day on-site workshop High level plan that describes essential technology requirements, system architecture, roadmap and recommendations.

3. Technology Assessment Validate technology decisions and help discover the best fit for the organization. Workshop between a technology expert and key security stakeholders to understand technology needs and requirements. Whether to confirm the validity of a single-point product or differentiate between competing solutions, we evaluate each technology in a thorough, methodical and unbiased manner. Types of Assessments Offered Firewall Mobility Network Access Control Network IPS Analysis, Scoring and Validation Depends on technical requirements Report detailing requirements, test procedures and a scorecard comparing each product evaluated against the requirements set during planning. 4. Architecture Review Ensure the network infrastructure aligns with and supports the business requirements of the organization. A comprehensive evaluation of the client s network and security environment, a gap analysis against both industry best practices and regulatory requirements, proposals to address the identified issues, a road map to identify the recommendations, documentation, and client calls to discuss the above findings and recommendations. Types of Architecture Reviews Offered Network Analysis with Roadmap Typically two to three weeks An executive brief outlining the findings discovered during the engagement, their associated risk, a road map for implementation, in-depth technical analysis of the identified issues and the recommendation for the client s technical team.

5. Site Survey Access Point placement design to optimize a WLAN deployment. A WLAN design and troubleshooting service around best practices. This offering uses standards and guidelines set by both CWNP and AirMagnet and helps ensure that the design of the WLAN performs well for the applications and devices using it. WLAN Environment Evaluation Health Check Survey Objectives Predictive Design Objectives Physical and Outdoor Survey Objectives Typically one week The results of the AP design, placement and heat maps showing coverage areas and recommendations. 6. Network Mapping Identify and map unknown parts of the network, giving the network team visibility into the complete network. To manage a network, accurate device inventory and network diagrams must exist. With the help of our advanced network management tools, automated mapping can occur to provide the necessary diagrams and inventory to support the network. Setup Network Mapping Documentation Typically one to two weeks Upon completion, you will receive the documented network maps and network

7. Managed Security Services Our Managed Security Services are designed to serve as a remote extension of your security staff. Our experienced security professionals provide the essential knowledge and security procedures your organization needs to effectively monitor the health and security of your environment and quickly identify, analyze and respond to potential security threats. TYPES OF MSS OFFERINGS: Authorized Support Platform Management 8. Training Services We offer training services that address the technical and human elements of your organization to help ensure you re operating securely. Our range of course topics help you meet compliance, maximize data security, manage vendor technologies and incorporate industry best practices. With instructor-led, on-site, remote live and computer-based training options, it s an easy and cost effective way to equip your staff with just-in-time learning. TYPES OF TRAINING SERVICES OFFERED Classroom Remote Live On-site 1125 17th Street, Suite 1700 Denver, CO 80202 800.574.0896 optiv.com Optiv is the largest holistic pure-play cyber security solutions provider in North America. The company s diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security. Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv is a Blackstone (NYSE: BX) portfolio company that has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers. For more information, please visit www.optiv.com.