Click to edit Master title style. How To Choose The Right MSSP



Similar documents
Caretower s SIEM Managed Security Services

Clavister InSight TM. Protecting Values

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

NEC Managed Security Services

Managed Security Service Providers vs. SIEM Product Solutions

IT Security Strategy and Priorities. Stefan Lager CTO Services

SECURITY 2.0 LUNCHEON

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Vulnerability. Management

MANAGED SECURITY SERVICES (MSS)

Injazat s Managed Services Portfolio

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

COMPLIANT CLOUD INFRASTRUCTURE FOR THE PUBLIC SECTOR SERVING STATE, LOCAL GOVERNMENT AND EDUCATION ORGANIZATIONS

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Maximizing Configuration Management IT Security Benefits with Puppet

SANS Top 20 Critical Controls for Effective Cyber Defense

SOC & HIPAA Compliance

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Unified Threat Management, Managed Security, and the Cloud Services Model

MANAGED SECURITY SERVICES (MSS)

QRadar SIEM 6.3 Datasheet

How to Choose the Right Security Information and Event Management (SIEM) Solution

EARTHLINK BUSINESS. Simplify the Complex

VMware vcloud Air Security TECHNICAL WHITE PAPER

Ecom Infotech. Page 1 of 6

Lot 1 Service Specification MANAGED SECURITY SERVICES

Global ediscovery Client Data Security. Managed technology for the global legal profession

Log management & SIEM: QRadar Security Intelligence Platform

The Case for Managed Security Services for Log Monitoring and Management

Payment Card Industry Data Security Standard

Cloud Vendor Evaluation

Current IBAT Endorsed Services

Firewall Administration and Management

North American Electric Reliability Corporation (NERC) Cyber Security Standard

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Department of Management Services. Request for Information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Q1 Labs Corporate Overview

Best Practices to Improve Breach Readiness

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

RFP Attachment C Classifications

Virtualization Essentials

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

2012 North American Managed Security Service Providers Growth Leadership Award

Dell Cloud Services. Services

What is Security Intelligence?

Cloud Computing Trends, Examples & What s Ahead

Conquering PCI DSS Compliance

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

SecureVue Product Brochure

High End Information Security Services

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

CONTINUOUS LOG MANAGEMENT & MONITORING

Cloud Security and Managing Use Risks

Advanced Threats: The New World Order

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

IBM Global Technology Services Preemptive security products and services

Chapter 1 The Principles of Auditing 1

IBM Security IBM Corporation IBM Corporation

PCI Compliance for Cloud Applications

The Protection Mission a constant endeavor

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

SIEM Implementation Approach Discussion. April 2012

IBM Internet Security Systems products and services

Security aspects of e-tailing. Chapter 7

The SIEM Evaluator s Guide

Security Event and Log Management Service:

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Colocation Dedicated Servers Private Clouds. Copyright 2011 Online Tech. All rights reserved

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

KeyLock Solutions Security and Privacy Protection Practices

The Evolution of Application Monitoring

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

STREAM Cyber Security

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

INCIDENT RESPONSE CHECKLIST

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Security Controls What Works. Southside Virginia Community College: Security Awareness

Detect & Investigate Threats. OVERVIEW

Transcription:

How To Choose The Right MSSP

Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield https://www.linkedin.com/in/ericdevansky edevansky@trushieldinc.com

Meet TruShield We are a global cyber security company based in the Washington DC metro area. Provider of the following high-quality, concierge security services: Managed Security Services Risk Assessment Services Penetration Testing Vulnerability Assessments Threat Protection Incident Management Security Consulting Security Architecture

What is an MSSP?

Why Do You Need an MSSP? Security Benefits Access to high-quality experts Continuous Threat Intelligence Budgetary Benefits No need to hire additional people A 24/7 staff would be required

The Right MSSP What is the Right MSSP? One that can meet the current and future needs of your organization, on time and on budget.

The Decision Process Self-Evaluation Identify Providers Evaluate Providers Select Provider

Self-Evaluation Needs Analysis What is your objective? What drives you? Internal Assessment Timeline Requirements Do you have a specific deadline you need to meet? Budgetary Limitations How much can you afford?

Self-Evaluation The Key is Prioritize!

Identify Providers Industry Research Gartner & Forrester Get a good start and cut down on time Peer Group Feedback Talk to other companies in your industry who have already hired an MSSP Selecting A Pool We recommend 3-5 of your top choices

Evaluate Providers Corporate Profile Approach Threat Analytics Specialization Ability to Execute Deployment Team Makeup Other Services Cookie Cutter vs. Customer Centric Technical Architecture Scalability 24/7 vs. On Call Technologies Supported Cost/Value Ratio

Evaluate Providers Corporate Profile Company Size Experience in the field Experience with similar companies Get References! Location Technology Partnerships

Evaluate Providers Cost/Value Ratio Consider Scalability You want a company that understands budget constraints

Select Provider Implement Communication is Key, both internally and with the provider Plan ahead Operate and Maintain The early days are the most important, be on high alert! Continuously look for ways to improve Scale Versatility Constantly reexamine bandwidth and capacity capabilities

TruShield vs. Other MSSPs Continuous Security Monitoring Feature Monitors, collects, and stores event logs Custom web-based portal with direct client access Unified Threat Management aka Next Generation Firewall Predictable Fixed Cost Helps attain a variety of compliances including PCI, SOX, FISMA, HIPAA, ISO Flexible Service Delivery 24/7/365 Unlimited Analysis and Incident Response Custom reports on any schedule (dailyannually) Bring Your Own SIEM TruShield Other MSSPs

TruShield vs. Other MSSPs Cont d Continuous Security Monitoring Feature Unified Security Management Platform IDS/IPS Custom Endpoint Security including Real- Time Management Web Gateway Mail Gateway (Includes quarantine, reverse malware, 24/7 incident response, and continuous configuration) Multi-Factor Authentication Stores logs off-site in forensically sound, SSAE16 certified facility Security Threat Intelligence and Expertise Included TruShield Other MSSPs

TruShield vs. Other MSSPs Cont d Continuous Security Monitoring Feature Advanced digital forensic/reverse malware engineering Built-in Disaster Recovery and Business Continuity Planning Periodic application of patches, security updates, upgrades, hotfixes, and firmware Require additional infrastructure (server, network devices, storage, etc.) TruShield Other MSSPs

Q & A

Thank You! 877.583.2841 www.trushieldinc.com