ClearSkies. Re-Defining SIEM



Similar documents
ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

BlackStratus for Managed Service Providers

Continuous Network Monitoring

nfx One for Managed Service Providers

Caretower s SIEM Managed Security Services

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

How To Protect Your Network From Attack From A Network Security Threat

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Simply Sophisticated. Information Security and Compliance

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

NEC Managed Security Services

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

HP and netforensics Security Information Management solutions. Business blueprint

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Clavister InSight TM. Protecting Values

Boosting enterprise security with integrated log management

PIVOTAL CRM. CRM that does what you want it to do BROCHURE

The SIEM Evaluator s Guide

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

PCI DSS Top 10 Reports March 2011

IBM Global Technology Services Preemptive security products and services

Turn Your Business Vision into Reality with Microsoft Dynamics GP

2012 North American Managed Security Service Providers Growth Leadership Award

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Alcatel-Lucent Services

Payment Card Industry Data Security Standard

Reliable, Repeatable, Measurable, Affordable

Service Suite for Communications Mobile workforce management solutions

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

Cisco Security IntelliShield Alert Manager Service

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Professional Services for Cloud Management Solutions

How To Protect Your It Infrastructure

Safeguarding the cloud with IBM Dynamic Cloud Security

Compliance Guide: PCI DSS

North American Electric Reliability Corporation (NERC) Cyber Security Standard

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

CyberSecurity Solutions. Delivering

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

CyberArk Privileged Threat Analytics. Solution Brief

The Sumo Logic Solution: Security and Compliance

IBM QRadar Security Intelligence April 2013

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

How To Manage Security On A Networked Computer System

Turn Your Business Vision into Reality with Microsoft Dynamics GP

Agio Remote Monitoring and Management

IBM QRadar as a Service

Preemptive security solutions for healthcare

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

I D C A N A L Y S T C O N N E C T I O N

HP Fortify Software Security Center

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Turn Your Business Vision into Reality with Microsoft Dynamics GP

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Vulnerability Management

Attack Intelligence: Why It Matters

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Comprehensive real-time protection against Advanced Threats and data theft

IBM Security Intelligence Strategy

Banking on Business Intelligence (BI)

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

PCI DSS Reporting WHITEPAPER

Strengthen security with intelligent identity and access management

High End Information Security Services

Turn Your Business Vision into Reality with Microsoft Dynamics GP

AssurX Makes Quality & Compliance a Given Not Just a Goal

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

CLOUD GUARD UNIFIED ENTERPRISE

Made to Fit Your Needs. SAP Solution Overview SAP Solutions for Small Businesses and Midsize Companies

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Remote Management Services Portfolio Overview

How To Manage Log Management

MANAGED SECURITY SERVICES (MSS)

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Transcription:

ClearSkies Re-Defining SIEM

Re-Defining SIEM You are required to collect and archive log data generated from diverse systems and applications for forensics and regulatory compliance purposes. You need to appropriately analyze, investigate and report on log data collected for Security Threats and Vulnerabilities that might affect the Confidentiality, Integrity and Availability of your mission - critical systems and communication links. You need access to dependable and up to date, in-depth Threat Intelligence information so that you can become more proactive and focused in minimizing and managing your information security risk. In essence, what you need is a robust, intelligent, cost effective, easy to deploy, SIEM solution. Efficient and effective Security Information and (SIEM) is no longer an expensive information security tool that can be afforded only by large and resource-rich organizations. Odyssey s ClearSkies Security-as-a-Service (SECaaS) SIEM platform addresses the need of organizations of any size or industry, to manage the wealth of log data generated from security devices, systems, applications, network infrastructures and communication links. It does so, in a holistic manner, enabling organizations to effectively and cost efficiently, enhance their information security and compliance operations across the board with virtually zero upfront investment. Challenges faced by Organizations today The ever increasing frequency, complexity and sophistication of threats and attacks on organizational security devices, systems, applications, network infrastructures and communication links, imposes a greater pressure on organizations towards enhancing their information security arsenal and becoming more proactive in facing such risks. This reality however, creates an operational oxymoron; the more extensive and complex the organizational information security arsenal becomes, the greatest the cost and difficulty in monitoring it to efficiently and timely identify and respond to threats and attacks on the organizational resources. This challenge is further compounded by the fact that legal and regulatory frameworks exert an even stronger pressure on organizations to comply with, and report on stringent information security control measures. To overcome these challenges, larger organizations have been internally investing in Security Information and (SIEM) capabilities. However, economic pressures, as well as the fast pace at which information security trends and threats are emerging, make the administration and maintenance of an in-house SIEM capability, both expensive as well as highly specialized and thus, outside the core competency sphere of most organizations. How Odyssey helps you in addressing these challenges As a regional leader in the provision of information security and managed security services for over a decade, with hundreds of clients in security sensitive industries such as banking, insurance, energy and healthcare, we have been exposed to these challenges and have heavily invested in addressing them in a manner that not only meets current needs but is also flexible enough to evolve into accommodating emerging trends. With ClearSkies Security-as-a-Service (SECaaS) SIEM you can: Achieve UP TO 80% reduction in the Number of False-Positive Alerts Noise, allowing you to focus your efforts on combating Real Threats. Minimize incident response times and maximize response success rates by integrating with the Threat Intelligence and Vulnerability service part of this service portfolio. Gain access to our BigData platform which provides Smarter Statistical & Behavioral, including User Behavior UBA capabilities. Have a clear, real-time view of important information security incidents, metrics and indicators literally at your fingertips through smart, fully customizable SIEM dashboards. Tailor your SIEM service to your needs and budget through our flexible service delivery model. Deploy a valuable tool which will immediately improve your information security baseline without long deployment learning curves and no upfront investment. ClearSkies Security-as-a-Service (SECaaS) SIEM, successfully tackles these challenges by helping you achieve pivotal information security and business objectives including: Functional Log and with clear view of your overall information security posture at any time. Instant transformation of log data into information security intelligence, useful in making informed decisions. Early identification of suspected or actual malicious events and the ability to analyze, address and follow up on them through a structured process. Effortless preparation of both specialized as well as ad-hoc reports in no time, vastly enhancing your compliance and business decision support processes. Enhanced knowledge of latest information security threats and trends by tapping into a unique Information Security and Threat Intelligence knowledge pool Odyssey IthacaLabs. Accessing your service anywhere, anytime with ClearSkies mobile application available for Windows, ios and Android smart-phones and tablets.

Incorporates predefined reports designed to meet the requirements of regulatory frameworks such as the PCI, but also allows you to easily create additional reports based on your needs and business requirements. The module s scheduling capabilities further simplify the reporting process. BigData Helps you by intelligently processing and analyzing large volumes of structured and unstructured data, identifying threats, which would go unnoticed by traditional analysis tools and techniques. Fully configurable dashboards can be customized to meet users needs and work habits. With smart drill down capabilities, the module allows users to have pertinent information right at their fingertips. Allows you to efficiently and effectively monitor, classify and manage events according to their severity, permitting security staff to delegate actions and responsibilities internally. Compliance Provides you with the framework for understanding compliance behavior since Information Security rules and regulations of the organization are the key to strengthening information security. Threat Intelligence by IthacaLabs Continuously enriched with evidence-based knowledge for existing and/or emerging Cyber Threats and Vulnerabilities. This outcome is fed into the Analysis and Correlation processes, thus minimizing False-Positive Alerts; also improving your decision making process when strategically planning your internal defenses against similar future threats. Performance & Availability Helps you proactively monitor the performance and availability of your mission-critical systems and communication links. Vulnerability Provides you with the ability to import results from different vulnerability tools and use them during the Analysis and Correlation process in order to further minimize False-Positive Alerts. ClearSkies SECaaS SIEM line of Service Modules & Architecture The ClearSkies Security-as-a-Service (SECaaS) SIEM is a cloud-based line of services, which combines a unique set of features, while its architecture is based on our proven security event management methodology. Together, they formulate a service, which places Odyssey at the forefront of the global SIEM SECaaS provider market. In addition, it is Integrated with BigData, intelligent security capabilities, thus bringing unparalleled performance capabilities to the platform s Investigation, Remediation, Statistical and User Behavioral (UBA) features; vital aspects for any organization that is serious about its information security capability. Copyright 2015 Odyssey Consultants LTD. All rights Reserved

Service Architecture The entire architecture of the ClearSkies Security-as-a-Service (SECaaS) SIEM service is based on our proven Methodology developed through our decades long experience and expertise in the challenging sector of information security. Basically, this architecture is based on the following process, which demonstrates how effective and efficient of Security threats is achieved. Collect: Log data generated from a number of diverse security devices, systems, applications, network infrastructures and communication links, are collected. Archive: Log data collected are compressed at a ratio of up to 85%, digitally signed and optionally encrypted before archived. This way collected logs are maintained at a state which allows them to be also utilized for forensic investigation or legal evidence should the need arise. Normalize/Mask: Log data from different network, systems, applications and vendors are formatted in different ways, even if these events are semantically equivalent. Copy of the log data collected are normalized and stored into a common schema at the time of data collection for further processing, Analysis and Correlation, and ad hoc search and reporting. Optionally, sensitive information found within the log data, such as user credentials, could be masked before leaving your premises for further Statistical and Behavioral Analysis. Analyze: Analysis of normalized log data is performed for identifying Real-Threats, thus minimizing False-Positive Alerts, by utilizing IthacaLabs Threat Intelligence feed and Vulnerability Information that might exist on your missioncritical systems. Based on these characteristics the Severity, Exploitability and Impact Factors for Real-Threats are calculated and fed into the Correlation process. Correlation: The Correlation of Real-Threats utilizes not only a number of statistical and behavioral heuristics models but also a number of intelligent correlation rules which are developed on an ongoing basis by taking into consideration the Threat Analysis & Security Intelligence provided through IthacaLabs. This process facilitates the early identification of Real-Threats and/ or misuse attempts that might affect the Confidentially, Integrity and Availability of your information. Incident : You can escalate events which have been determined to impose a Real-Threat to your mission-critical systems and communication links to incident status and assign them internally for further investigation and resolution using the built-in incident management process workflow through Incident Escalation communication channels such as: Sending email, Push-Notifications* and/or SMS to those people that this incident is assigned to, accompanied with a brief summary of the incident including its severity level. Updating the built-in incident management dashboard with details regarding the raised incident, including course of action. Email notifications Push notifications smart-phones & tablets Clearskies Secure Web Portal *For receiving Push-Notifications on smart-phones and tablets you should have installed ClearSkies mobile application, which is available for Windows, ios and Android operating systems. Flexible Service Delivery Model SMS notifications Understanding the varying sizes, needs, internal capabilities and information security management maturity levels of different organizations, we have structured the ClearSkies Security-as-a-Service (SECaaS) SIEM line of services in a modular manner and in different deployment options including virtual and physical appliances. While each module can operate on its own, the addition of service modules based on clients changing needs and budget, can be a swift and transparent process. Part or the entire ClearSkies Security-as-a-Service (SECaaS) SIEM services could be upgraded at any given time to Managed Security & Protection Services and/or to Outsourcing Services. This scenario is ideal for organizations with the need of 24/7/365 Asset Monitoring, Log Review, Analysis, for their critical assets, but at the same time wish to perform their own log review and analysis for non critical assets. Standard Plus Premium Managed Security & protection services Outsourcing Services Collection Archiving Normalization Analysis Correlation process minimizes further False-Positive Alerts thus allows you to focus only on those events that require your attention. Vulnerability Threat Intelligence Vulnerability Performance & Availability Threat Intelligence Compliance Intelligent Correlation Service by Odyssey IthacaLabs

Company Overview Odyssey Consultants is an ISO 27001 certified, Information Security, Infrastructure and Risk Solutions integrator and a Managed Security & Outsourcing Services Provider. Odyssey is accredited by the Payment Card Industry Security Standards Council (PCI SSC) as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV). Our services and solutions span the whole spectrum of People, Process and Technology. Odyssey was founded in 2002 with the main objective of providing High-Quality, Cutting- Edge, Information Security, Infrastructure and Risk Services to organizations that value their information assets. Since then, and in keeping with market trends, we have evolved and pride ourselves for becoming a regional leader in the Managed Security & Outsourcing Services sector as well. Our Vision and Mission Our vision is to be the leading organization in the wider region in the areas of Information Security, Infrastructure and Risk Services and related Managed Security & Outsourcing Services, creating real and sustainable value to our clients, employees and shareholders. Our Mission is to be the recognized leader in the regional Information Security, Infrastructure, Risk and Managed Security & Outsourcing Services market, projecting trust in our experience and skills, and consistently delivering a high quality experience to our clients. Our Principles We Are Centered Around You Underlying our business mission is the unconditional requirement that our services fulfill our clients needs and exceed their expectations. Having this in mind, our business approach places the client in the center of our business equation. Building Value For Our Customers This statement underpins our philosophy in servicing our clients needs through robust cost - benefit analysis and approaches, which take a pragmatic and practical approach in balancing risks and controls. Our Values + Innovation We transform innovative ideas into progressive products and solutions that proactively address information security trends and challenges. + Passion for Perfection We strive for perfection by inspiring into our people the sense of leadership, ownership and perseverance that is supported by a culture of teamwork, mutual respect and professionalism. + Customer Focus Underlying our business mission is the unconditional commitment to be ahead of our customers needs and exceed their expectations, by delivering high quality, adaptive and robust solutions. For Sales Enquiries: sales@odysseyc.com For General Enquiries: info@odysseyc.com Headquarters Cyprus: 1 Lefkos Anastasiades str. 2012 Strovolos, Nicosia, tel.: +357 22463600, fax: +357 22463563 Offices Greece: 7 Anastaseos str., 2nd floor, Holargos 155 61, Athens, tel.: +30 210 6565200, fax: +30 210 6565219 Serbia: 38-40 Vladimira Popovica, 1st floor, 119 11000, Belgrade, tel.: +381 117 156956, fax: +381 117 156900 Dubai: Ground Floor #07, Building 16, Dubai Internet City, PO Box 73030 Dubai, UAE tel.: +971 559357590, fax: +357 22463563