Managed Security Services for Data



Similar documents
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Payment Card Industry Data Security Standard

How To Protect Your Network From Attack From A Network Security Threat

Injazat s Managed Services Portfolio

IBM Global Technology Services Preemptive security products and services

IBM Internet Security Systems products and services

Cisco Advanced Services for Network Security

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Contact Center Technology Outsourcing

Simplify Your Network Security with All-In-One Unified Threat Management

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Proven LANDesk Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

PCI Requirements Coverage Summary Table

Alcatel-Lucent Services

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

PCI Requirements Coverage Summary Table

Managed Services. Business Intelligence Solutions

Advantages of Managed Security Services

Der Weg, wie die Verantwortung getragen werden kann!

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

How to Choose a Managed Network Services Provider

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

VMware vcloud Air Security TECHNICAL WHITE PAPER

BMC s Security Strategy for ITSM in the SaaS Environment

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

ACI ON DEMAND DELIVERS PEACE OF MIND

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Conquering PCI DSS Compliance

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Security Controls for the Autodesk 360 Managed Services

Overcoming PCI Compliance Challenges

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Securing the Service Desk in the Cloud

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

University of Pittsburgh Security Assessment Questionnaire (v1.5)

The Cisco ASA 5500 as a Superior Firewall Solution

Sygate Secure Enterprise and Alcatel

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Advantages of Managed Security Services

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Unified Threat Management, Managed Security, and the Cloud Services Model

CLOUD GUARD UNIFIED ENTERPRISE

Cisco Remote Management Services for Financial Services

MITEL. NetSolutions. Flat Rate MPLS VPN

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

solution brief NEC Remote Managed Services Prevent Costly Communications Downtime with Proactive Network Monitoring and Management from NEC

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

A Global IT Managed Service Provider

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

NetDefend Firewall UTM Services

Managed Protection Services for Networks - Standard

Company Overview. Enterprise Cloud Solutions

Managed Security Services

MANAGED SECURITY SERVICES

Secure Cloud-Ready Data Centers Juniper Networks

How To Manage Security On A Networked Computer System

Network Performance + Security Monitoring

The Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It

Current IBAT Endorsed Services

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

V1.4. Spambrella Continuity SaaS. August 2

NetDefend Firewall UTM Services

Preemptive security solutions for healthcare

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The SIEM Evaluator s Guide

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy.

Information Security: A Perspective for Higher Education

Tenzing Security Services and Best Practices

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

BlackStratus for Managed Service Providers

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Transcription:

A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified Communication Services

I n a n a g e w h e n s e c u r i t y i s f o r e m o s t i n t h e p u b l i c c o n s c i o u s n e s s, i t i s n o s u r p r i s e t h a t s e c u r i t y i s a c r i t i c a l i s s u e w i t h b u s i n e s s l e a d e r s h i p. F o r e x a m p l e, a r e c e n t W e b s u r v e y b y C I O m a g a z i n e s h o w e d t h a t 9 6 % o f C I O s r a n k e d s e c u r i t y a s a t o p 5 p r i o r i t y 1. I n a d d i t i o n, t e c h n o l o g i e s s u c h a s c o n v e r g e n c e a n d I P t e l e p h o n y a r e e n h a n c i n g b u s i n e s s e f f i c i e n c i e s, g i v i n g e n t e r p r i s e s n e w w a y s t o w o r k a n d o f f e r i n g g r e a t e r a c c e s s, f l e x i b i l i t y, a n d c o s t - e f f e c t i v e n e s s. H o w e v e r, t h e s e t e c h n o l o g i e s c a n c r e a t e a n e w r i s k : s e c u r i t y b r e a c h e s t h a t c a n j e o p a r d i z e t h e p r i v a c y o f t h e d a t a n e t w o r k a n d i n c r e a s e t h e t h r e a t o f d i s r u p t i o n t o o n g o i n g o p e r a t i o n s. A t t h e s a m e t i m e, b u s i n e s s l e a d e r s f a c e a h o s t o f o t h e r c r i t i c a l c h a l l e n g e s, s u c h a s t h e n e e d t o s t r e a m l i n e o p e r a t i o n s, m a n a g e c o s t s, a n d i m p r o v e b u s i n e s s p r o c e s s e s a l l w h i l e m a i n t a i n i n g a f o c u s o n t h e b u s i n e s s s t r a t e g y a n d g o a l s. 1 IDC, U.S. CEO LOB Survey, February 2003 IP Telephony Contact Centers Unified Communication Services

Under these circumstances, how can you maximize your data network security and protect your technology investments without diverting personnel and other resources from other critical everyday tasks that keep your business on track? Avaya Global Services has the answer, in a powerful solution designed to provide your business with the expertise of security professionals who will proactively monitor and manage vulnerabilities so you can focus on your key business imperatives. N e t w o r k S e c u r i t y T h a t D e l i v e r s t h e B u s i n e s s B e n e f i t s Y o u N e e d Managed Security Services for Data provides maximum protection and optimal security levels for your multi-vendor data network. The solution offers 24x7 proactive monitoring and security management Security devices such as firewalls, intrusion detection systems, and VPNs are more effective because they are managed and monitored by skilled security professionals around-the-clock. Avaya expertise in the latest advancements in network security provides optimum security levels in a changing world. A Single Point of Contact Avaya has a full array of end-to-end network management and security capabilities to provide a single source of support for all your network security needs. Services include Security Assessment, Security Policy Development, and Security Architecture & Design as well as ongoing security management and consulting. support from the experts at Avaya Global Services plus cutting-edge intrusion detection, anti-virus protection, and security event correlation capabilities, from security industry leaders VeriSign and McAfee Security. Benefits to your business includes: Lower Risk Migration to new technology is seamless thanks to Avaya s knowledge in emerging platforms as well as our more than 23 years of experience in implementing, maintaining, and managing multivendor data equipment. Proactive 24x7 monitoring increases uptime and reliability by detecting and eliminating security threats before they are a problem to your business. 1 a higher plane of communication

Utilize a designated telephone number to speak to an Avaya expert regarding the security of your network for real-time security support. Strategic Focus By outsourcing security monitoring and management to Avaya, you can focus your internal resources on more critical business initiatives. Cost Savings Avaya enables you to secure your network without incurring the expense of acquiring, training, and maintaining an in-house staff to support evolving network technologies. This services includes security expertise, hardware, software, and tools at little-to-no upfront cost. You get predictable billing with no surprises, for more precise expense forecasting and P&L management. Avaya expertise helps to reduce ramp-up time and speeds your time-to-market for new applications and services. Y o u r S i n g l e S o u r c e f o r A d v a n c e d S e c u r i t y M a n a g e m e n t With Managed Security Services for Data, Avaya becomes your single source for an array of security management services designed to block intrusions, eradicates viruses, and notify you of on going security breaches. Access to Security Expertise If you have limited resources and/or lack the skills to manage your network security in-house, Avaya can provide all the expertise you need. Avaya offers you access to full-time, qualified data security personnel who receive ongoing training in changing technologies and, who have broad exposure to and experience handling virtually every type of security issue, across companies of all types and sizes. Avaya gives you the flexibility to fill a void in a specific function while self-managing other aspects of your network. Avaya experts hold multi-vendor certifications and have a broad scope of experience in technologies, Available in a choice of packages, Managed Security Services for Data gives you access to Avaya advanced processes, tools, and methodologies. In addition, Avaya delivers this service at a level that matches your needs establishing Service Level Agreements (SLAs) that define interval targets and provide reports to track activity. Managed Security Services for Data is delivered to you via one of several Security Operation Centers (SOCs) located in various parts of the country. Each SOC is a physically hardened site with state-of-theart infrastructure, managed by trained personnel. Reporting real-time results 24 hours a day, 7 days a week, 365 days a year, the SOC gives you the confidence that Avaya is always at work to secure your data network. infrastructure, and applications.

A C h o i c e o f S e r v i c e s t o F i t Y o u r N e t w o r k L i k e a G l o v e The Avaya portfolio allows you to select the security management services that best meet your network requirements. This flexibility enables you to customize the services to your security needs and your budget. Options provided in our suite of Managed Security Services for Data include: Managed Firewall Services Managed Firewall Services provides protection of your key information assets across networks, hosts, applications, and databases. This customized service helps to ensure a high level of network access and information availability, integrity, and privacy. Aroundthe-clock firewall monitoring generates immediate alerts and responses for service outages and security breaches associated with critical Internet access points. Available as a basic monitoring-only option or an enhanced management and monitoring option, this service comes in a choice of packages based on the number of devices and service levels required. In addition, upgrade options such as high availability configurations, site-to-site VPN connections, and client-to-site VPN connections are available. service acts as an alarm, setting off necessary alerts when a potential attack is recognized. Avaya certified security engineers actively monitor these alerts from the SOC to proactively provide protection of security breaches. The Managed Intrusion Detection Services includes: System Tuning Device Uptime Monitoring Security Event Monitoring and Response Ongoing Signature Maintenance and System Tuning Upgrade and Patch Maintenance One month of data stored on Client Portal This service also offers add-ons such as support for host-based intrusion detection systems and high availability options. Managed Intrusion Detection Services Managed Intrusion Detection offers 24x7 monitoring of all your network traffic for events recognized by network-based intrusion detection systems. This Managed Vulnerability Protection Service This service provides customized, cost-effective, and continuous protection against exploited vulnerabilities. Its building blocks include an up-front risk assessment 3 a higher plane of communication

and vulnerability scan. Scheduled vulnerability testing allows you to proactively detect and control security risks. This service offers the following options: External Scanning Internal Scanning Network Vulnerability Testing Web Application Testing Modem Testing Network Penetration Testing Basic Vulnerability Alert Service Correlated Vulnerability Alert Service Managed Incident Response & Forensics Services By intelligently placing intrusion detection sensors on a network, an Avaya team of security experts can monitor data devices around-the-clock, monitoring for security violations or misuse that originates from inside or outside the network. The Avaya Managed Intrusion Detection Service (IDS) enhances your organization s firewall protection by providing a comprehensive, realtime warning system that proactively identifies and isolates real security attacks helping to prevent costly downtime and potential loss of revenue. The Avaya Managed IDS offers 24x7 monitoring of all network traffic. Based on the five cornerstones of effective incident management and response detection, assessment, forensics, containment, and recovery this service leverages industry-best practices to provide a complete and measured response to any security breach. The service acts as an alarm for an organization s network, setting off necessary alerts when a potential attack is recognized. These alerts, based on the specific customer requirements, are actively monitored and managed by Avaya certified security engineers at Avaya s Security Operations Centers (SOC) and real security events are quickly identified and acted upon. All intrusion attempts, regardless of severity, are logged and well-defined customer notification and resolution procedures are executed for all security events. Host Log Monitoring Services This service handles the collection, analysis, and reporting of relevant log data from your managed network and security devices. It includes: Log Collection Event Normalization and Prioritization

Event Correlation Reporting This service provides a centralized footprint for collecting, processing and transmitting device log data. In addition, the Avaya Client Portal is an integral element of the unique IT architecture and a primary point of contact for customer service and trouble ticketing. The portal provides you with access to near-real-time security event reporting, security intelligence updates, and a customized vulnerability management platform. Managed Anti-Virus & Desktop Firewall Protection Service Avaya combines its security management expertise with McAfee Security anti-virus products to safeguard your desktops and file servers with complete proactive protection. Identifying and capturing the latest deadly viruses, worms, and trojans, this service helps you protect system data against tampering and hacking. This service includes: Policy Management & Enforcement Tier II Help Desk Support Current Software Updates Configuration Changes A n A r c h i t e c t u r e T h a t M a k e s S e n s e f o r Y o u r D a t a N e t w o r k Managed Security Services for Data utilizes a unique architecture that takes a wide range of disparate data sources and formats them from security and network devices, and converts them into a single, normalized stream of security-related events. It then analyzes and prioritizes these events using a multi-tiered correlation process. This Security Event Correlation capability enables Avaya to sift through a vast number of security alerts and quickly identify those that require attention helping to provide a fast and meaningful security Based on second-generation architecture, the Client Portal employs SSL encryption and two-factor authentication for the secure access and protection of sensitive data. The portal offers a wide range of reports, from executive summaries to in-depth technical commentary, regarding the state of each security device. Some of its key features include: A management dashboard with seven-day vulnerability and security event information Sophisticated reporting that includes real-time security events, vulnerability testing results, device configuration reports, and device usage reports A summary of vulnerability alert information S e c u r i n g t h e C o n n e c t i v i t y B e t w e e n Y o u r N e t w o r k a n d A v a y a All of these Managed Security Services for Data are delivered via a secure connection using the Security Defense Appliance a proprietary device that provides fault-tolerant communications and management connectivity between your site and the Avaya SOC. The Security Defense Appliance works with your existing infrastructure and combines the functions of a firewall, a network intrusion detection sensor, response for your business. 5 a higher plane of communication

a vulnerability scanner, and a secure remote management access point in a single compact appliance. Creating secure access policies based on your business needs, this appliance allows compliant traffic to traverse the network gateway in either direction. Any event that conflicts with your policies will trigger an alert that is transmitted in real time to the SOC for immediate analysis and response. The Security Defense Appliance connects via a secure encrypted tunnel and cannot be seen or accessed from the Internet, delivering powerful benefits including: Communications secured via industry-standard VPN encryption algorithms and technologies such as IPSec and Triple DES encryption Data collection on all managed multi-vendor devices Out-of-band connectivity via a serial device for backup in the event of a VPN connectivity failure Scalability to support large capacity or complex network segmentations Proactive updates to scanning tools to help ensure state-of-the-art detection Detailed logs that are incorporated into reports and proactively scanned by an SOC agent 24x7 access to information The Security Defense Appliance is provided in conjunction with VeriSign a recognized leader in the managed security industry and recent acquirer of Guardent, the leading 2003 Managed Security Service Provider recognized by Gartner Consulting and Network Magazine. E n j o y t h e A v a y a A d v a n t a g e Managed Security Services for Data is an integral component of Avaya Global Services. Avaya integrates world-class services with leading-edge security technologies to deliver a complete Managed Solution taking the worry, risk, and expense out of network security management. With a history of experience in data as well as voice, Avaya today is a world leader in network convergence services, with more than 7,000 professionals on the Avaya Global Services team. From planning, design, and implementation, to day-to-day management, network optimization, and security, Avaya has the fieldtested skills to help you manage your total network environment. L e a r n M o r e To learn more about Managed Security Services for Data, please contact your Avaya Client Executive or Authorized Avaya BusinessPartner. For more information about Avaya Global Services, visit us on our Web site: avaya.com/avayaglobalservices

About Avaya Avaya enables businesses to achieve superior results by designing, building and managing their communications networks. Over one million businesses worldwide, including more than 90 percent of the FORTUNE 500, rely on Avaya solutions and services to enhance value, improve productivity and gain competitive advantage. Focused on enterprises large to small, Avaya is a world leader in secure and reliable IP telephony systems, communications software applications and full life-cycle services. Driving the convergence of voice and data communications with business applications and distinguished by comprehensive worldwide services Avaya helps customers leverage existing and new networks to unlock value and enhance business performance. reach a higher plane of communication IP Telephony Contact Centers Unified Communication Services 2004 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. and may be registered in certain jurisdictions. All trademarks identified by or are registered trademarks or trademarks, respectively, of Avaya Inc. except FORTUNE 500, which is a registered trademark of Time, Inc and McAfee Security which is a registered mark of McAfee Security. All other trademarks are the property of their respective owners. 05/04 EF-SVC2390 avaya.com