Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Similar documents
DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

How To Use Cautela Labs Cloud Agile.Com

CONTINUOUS LOG MANAGEMENT & MONITORING

Current IBAT Endorsed Services

Caretower s SIEM Managed Security Services

ALERT LOGIC LOG MANAGER & LOGREVIEW

CLOUD GUARD UNIFIED ENTERPRISE

TekCare Secure Service Agreement

Cloud and Data Center Security

IT Security & Compliance. On Time. On Budget. On Demand.

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

How To Protect Your Cloud From Attack

Vulnerability Management

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

PCI DSS Top 10 Reports March 2011

Clavister InSight TM. Protecting Values

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

QRadar SIEM 6.3 Datasheet

CloudCheck Compliance Certification Program

The SIEM Evaluator s Guide

PCI DSS Reporting WHITEPAPER

NEC Managed Security Services

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Enterprise Security Solutions

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

ALERT LOGIC FOR HIPAA COMPLIANCE

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI Requirements Coverage Summary Table

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

IBM EXAM QUESTIONS & ANSWERS

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

End-user Security Analytics Strengthens Protection with ArcSight

Extreme Networks Security Analytics G2 Vulnerability Manager

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Scalability in Log Management

Boosting enterprise security with integrated log management

Unified Threat Management, Managed Security, and the Cloud Services Model

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

PCI Requirements Coverage Summary Table

Swordfish

FIRN Secure Internet Bundled Services:

I D C A N A L Y S T C O N N E C T I O N

BlackStratus for Managed Service Providers

1 Introduction Product Description Strengths and Challenges Copyright... 5

Cautela Labs Cloud Agile. Secured.

IBM Security QRadar Vulnerability Manager

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Ovation Security Center Data Sheet

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Ovation Security Center Data Sheet

IBM Security QRadar SIEM Product Overview

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Vulnerability. Management

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Achieving SOX Compliance with Masergy Security Professional Services

The Education Fellowship Finance Centralisation IT Security Strategy

Cyberoam Perspective BFSI Security Guidelines. Overview

Vistara Lifecycle Management

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

MANAGED SECURITY SERVICES (MSS)

2012 North American Managed Security Service Providers Growth Leadership Award

How To Manage Security On A Networked Computer System

nfx One for Managed Service Providers

Intelligent. Data Sheet

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Log Management Solution for IT Big Data

Managed Security Services

LogRhythm and PCI Compliance

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

TRIPWIRE NERC SOLUTION SUITE

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Payment Card Industry Data Security Standard

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Client Security Risk Assessment Questionnaire

QRadar SIEM and Zscaler Nanolog Streaming Service

How To Buy Nitro Security

access convergence management performance security

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Keyword: Cloud computing, service model, deployment model, network layer security.

How To Protect Your Network From Attack From A Network Security Threat

IBM Global Technology Services Preemptive security products and services

IBM ISS Optimizacija Sigurnosti

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

What is Security Intelligence?

Leveraging security from the cloud

Meeting the Challenges of Virtualization Security

Transcription:

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture work must be done to balance both the internal as well as external security threads to an organization. Cautela Labs addresses this concern by offering a cloud base vulnerability assessment and intrusion detection. With Cautela Labs Threat Management, you cost-effectively defend and protect your network against internal and external threats via Intrusion Detection Service (IDS)/ Intrusion Prevention Service (IPS), Host IDS/IPS, Firewall Management. IDS/IPS Management Network Intrusion Detection and Prevention (IDS/IPS) devices can provide a highly effective layer of security designed to protect critical assets from cyber threats. Organizations can detect attempts by attackers to compromise systems, applications and data by deploying network IDS. However, keeping the devices tuned and up-todate so they are effective is a challenge for many organizations and requires specialized skills. The IDS/IPS devices are only effective if they are well tuned to the current threats and the network in which they are deployed. IDS devices can generate thousands of alerts each day and are very prone to false positives, making it difficult to identify true threats and take timely action to protect assets. Cautela Labs Security Engineers monitor IDS and IPS to analyze events and identify threats. All event information is analyzed, including full packet payloads. Events are correlated across all available information sources, including other IDS and IPS devices, firewall logs, network devices, host and application logs, vulnerability scan results, and asset information. This intelligence is fed back into our services to enhance Managed Network IDS/IPS monitoring and response capabilities. When a customer is at risk, our security professionals respond to counter the threat. Cautela Labs s Managed IDS/IPS service offers flexible support in the most complex environments, allowing our Cautela Labs to tailor services to each customer's individual needs. Appliances can be managed in a traditional managed services model, where customer personnel have limited or no administrative privileges for their IDS/ IPS devices. Cautela Labs also supports a joint support model, with this approach, our experts alleviate the management, maintenance and monitoring burdens without the customer being locked out of their infrastructure. 2

Firewall Management Firewall management is a challenging part of security operations because of the level of resource needed as well as expertise required. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest threats. Security policies and configurations must be updated to ensure appropriate access controls are consistent with changing business environments. Network traffic must be monitored continuously to identify and respond to threats before damage is done. Cautela Labs Firewall Management service provides 24x7x365 firewall administration, log monitoring, and response to security and device health events. Host IDS/IPS The Cautela Labs Host IDS/IPS Service serves as an application firewall for your servers to ensure that an application is doing only what it is supposed to be doing. When encrypted traffic is received and decrypted by the operating system on the host machine, the agents intercepts instructions prior to reaching the application to prevent malicious activity. Your servers are even protected from new threats. Host agents are deployed on critical servers with customizable policies providing more precise control over access and usage. A host agent resides between the applications and the operating system, enabling maximum application visibility with minimal impact to the performance of the underlying operating systems. The software's architecture intercepts all operating system calls to file, network and registry sources as well as to dynamic run-time resources such as memory pages, shared library modules and COM objects. 3

THREAT MANAGER & ACTIVE WATCH FEATURES Threat Signatures & Rules Rule Set Consolidated from Multiple Sources Cautela Labs Security Research Team Emerging Threats Open Source, Third-Party Collaboration Real-time Signature Updates to Cautela Labs Expert System Custom Rule Creation and Editing Integrated Managed Security Services GIAC-Certified Security Analysts and Researchers 24x7 State-of-the-Art Security Operations Center Trained Experts in Cautela Labs Solutions Monitoring, Analysis and Expert Guidance Capabilities Customized Alerting and Escalation Procedures Vulnerability Assessment & Intrusion Detection Unlimited Internal and External Scans Broad Scanning and Detection Visibility Network Infrastructure Server Infrastructure Business-Critical Applications Web Technologies SSL-Based Intrusion Traffic Signature and Activity-Based Correlation Patented 7-Factor Threat Scenario Modeling Compliance Support PCI Approved Scanning Vendor (ASV) PCI Level 2 Audited Vendor Support for Multiple Compliance Mandates PCI DSS 2.0, HIPAA, SOX, GLBA, CoBIT, etc 6-Month Storage of All Raw IDS Event Data SSAE 16 Type II Verified Data Centers Indefinite Storage and Archival of Incident Analysis and Cases Analysis & Reporting Dozens of Dashboards and Reports Available Out-of-the-Box Custom Reporting Capabilities Common Vulnerability Scoring System (CVSS) to Assess Risks Audit-Ready Reports Single Web-Based Console for Entire Environment User Management and Administration Dashboards and Drilldown Analysis Report Scheduling, Creation and Review Scan Scheduling and Results Review Security-as -a- Service Delivery Detailed Vulnerability Reports Rapidly Deploy and Scale as Needed Pay-as-You-Go; Minimal Capital Expenditure Always Utilize Latest Software and Signature Database No Hidden Costs Subscription Includes: Software and Hardware Up grades, Maintenance and Patches Architected for Multi-Tenant Support Easily Deploy in On-Premise, Off- Premise or Hybrid Environments Detailed vulnerability and host reports are produced to provide detailed descriptions and lists of impacted hosts, risk levels and remediation tips. 4

The Cautela Labs Thread Management Services Benefits 24x7 security event and log monitoring and analysis. Real-time security event response to known and emerging threats. Customized escalation procedures. Log analysis and compliance reporting. Collection from multiple sources, including: network devices, security devices, servers, databases, applications, desktops, to name a few. Enables regulatory compliance with automated log data collection and due diligence review as well as immutable, redundant, and secure archival. Improves incident response and resolution for security, performance, and availability incidents via quick and easy browser-based access to all historical log data. Stores and archives data according to business and security data retention policies in our SSAE16 Type II audited, redundant data centers Easy to buy, deploy, use, and own with no software or hardware to purchase or maintain, no upfront investment required, everything included in one convenient monthly fee. Cautela Labs, Inc. 5080 N. 40th Street, Suite 300 Phoenix, AZ 85018 Phone: 800-997-8132 Fax: 714-862-2177 Email: Support@Cautelalabs.com 5