MANAGED SECURITY SERVICES (MSS)

Similar documents
MANAGED SECURITY SERVICES (MSS)

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

2012 North American Managed Security Service Providers Growth Leadership Award

Managed Security Service Providers vs. SIEM Product Solutions

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT

Ecom Infotech. Page 1 of 6

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

North American Electric Reliability Corporation (NERC) Cyber Security Standard

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Unified Security Management and Open Threat Exchange

Caretower s SIEM Managed Security Services

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

RETHINKING CYBER SECURITY Changing the Business Conversation

The Importance of Cybersecurity Monitoring for Utilities

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Symantec Cyber Security Services: DeepSight Intelligence

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Managed Security Services for Data

PCI DSS Top 10 Reports March 2011

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Achieving SOX Compliance with Masergy Security Professional Services

CONTINUOUS LOG MANAGEMENT & MONITORING

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

A Case for Managed Security

Clavister InSight TM. Protecting Values

World Security Information and Event Management (SIEM) and Log Management Products Market

1 Introduction Product Description Strengths and Challenges Copyright... 5

The Business Case for Security Information Management

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

ALERT LOGIC FOR HIPAA COMPLIANCE

Click to edit Master title style. How To Choose The Right MSSP

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Unified Threat Management, Managed Security, and the Cloud Services Model

How To Protect Your Cloud From Attack

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Payment Card Industry Data Security Standard

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your It Infrastructure

Microsoft s cybersecurity commitment

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Continuous Network Monitoring

Advantages of Managed Security Services

PCI DSS Reporting WHITEPAPER

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Building a Business Case:

SOC & HIPAA Compliance

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

IBM Internet Security Systems products and services

Current IBAT Endorsed Services

INSIDE. Demystifying the Managed Security Service Provider Market. Symantec Enterprise Security

End-user Security Analytics Strengthens Protection with ArcSight

Student Tech Security Training. ITS Security Office

NEC Managed Security Services

CLOUD GUARD UNIFIED ENTERPRISE

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Extreme Networks Security Analytics G2 Vulnerability Manager

Uncover security risks on your enterprise network

Scalability in Log Management

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Conquering PCI DSS Compliance

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

IBM Global Technology Services Preemptive security products and services

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

SANS Top 20 Critical Controls for Effective Cyber Defense

Preemptive security solutions for healthcare

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

SIEM AND THE ART OF LOG MANAGEMENT Trustwave Holdings, Inc.

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e

Transcription:

MANAGED SECURITY SERVICES (MSS) THE CYBER SECURITY INITIATIVE. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The current cyber security threat landscape is getting more and more complex and the decision of buying and implementing solutions to defend against cybercrime can be quite challenging. $35,514 Phishing, Social Engineering $4,781 Virus, Worms, Trojans, Botent, Malware Costs to Business from Cyber Crime $143,209 Web Attacks $100,300 Malicious Insiders $124,083 Malicious Code Source: Ponemon Institute First Annual Cost of Cyber Crime Study. 2010 In many cases security requirements have become part of compliance requirements, such as the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), and others. Additionally, the cost of cybercrime to businesses is on the rise with the majority of this cost coming from web attacks and malicious code. Motivations can vary, but cyber security readiness is becoming a must for most organizations regardless of their size or vertical. ABOVE SECURITY S MANAGED SECURITY SERVICE OFFERING HELPS ORGANIZATIONS Detect and prevent cyber attacks Manage network and applications vulnerabilities Comply with regulations Work with security specialists Get the best protection possible at a fraction of the cost 1

THE CASE FOR MANAGED SECURITY SERVICES The threat landscape is an ever-changing one. Hackers are continuously coming up with new tactics and exploring new vulnerabilities in today s fluid IT environments. While on-premise Security Information and Event Management (SIEM) systems provide a certain level of protection through log collection and management, they require significant in-house expertise and continuous training and education. Staffing can also be challenging, as monitoring critical IT assets on a 24/7 basis requires a high level of specialized staff. $1,600,000 $1,200,000 $800,000 $400,000 Cyber Security Monitoring Costs for a Medium-Sized Business $544,300 $1,040,750 $396,000 $1,593,000 $648,000 In-House Cyber Security Cost Above Security Cost $0 $144,000 1 Year 3 Years 5 Years Outsourcing your security can be a tough decision to make, but for many organizations it makes business sense. Here are a few reasons why you should consider it: Staying up to date on the latest security threats can be mission impossible if you don t have dedicated staff for it. Monitoring and protecting your IT assets from cyber attacks is the core expertise offered by Managed Security Service Providers (MSSPs). MSSP security expert teams will vet all the alerts produced by the various devices that you may have in your infrastructure to the handful of events that your team needs to deal with, thus reducing cost while increasing efficiency. The initial and continuous infrastructure and staffing investment in a security solution can be daunting to some businesses. But even if you can afford that, outsourcing your security services can slash your investment by a significant margin depending on the size of your infrastructure. That should allow you to get the best protection possible and still have the budget to invest in your core business. 2

CYBER SECURITY MONITORING COSTS FOR A MEDIUM-SIZED BUSINESS MONITORING 1 YEAR 3 YEARS 5 YEARS In-house HUMAN RESOURCES Recruitment fees for specialized resources $22,500 $22,500 $22,500 2 full-time employees $150,000 $450,000 $750,000 Staff management (15% annual salary of the manager) $15,000 $45,000 $75,000 Specialized training ($3,000/year/employee) $6,000 $12,000 $18,000 Subtotal (HR) $193,500 $529,500 $865,500 HARDWARE** 3 IDS/IPS sensors and management console $154,000 $154,000 $154,000 IDS/IPS annual maintenance $30,800 $115,500 $231,000 Vulnerability scanner (software and server) $3,500 $10,500 $17,500 Log aggregation (SIEM appliance) $125,000 $125,000 $125,000 SIEM deployment (10% minimum) $12,500 $12,500 $12,500 SIEM annual maintenance $25,000 $93,750 $187,500 Total (HR & Hardware) $544,300 $1,040,750 $1,593,000 Outsourced (executed by Above Security) Implementation fees (3 sensors) $18,000 $18,000 $18,000 3 IDS/IPS sensors (3,500$/sensor/month) $126,000 $378,000 $630,000 Annual maintenance $0 $0 $0 Vulnerability scanner $0 $0 $0 Log aggregation $0 $0 $0 Total (Above Security) $144,000 $396,000 $648,000 * The details of these calculations can be provided upon request. Minimum Savings Calculations for 2 employees providing support from 9 to 5 with 24/7 pager $400,300 $644,750 $945,000 Savings vs. 24/7 Operations Calculation for 5 employees providing 24/7 monitoring** $678,550 $1,439,000 $2,243,250 ** A two full-time employee security team with 24/7 pager still exposes an organization to a significant security gap. A minimum of 5 employees is required to provide a real 24/7 monitoring coverage. 3

COMPLIANCE As an independent service provider, an MSSP can oversee change control procedures to make sure that compliance with internal and external rules and regulations is maintained at all times. CONSTANT UPDATES An MSSP can also help maintain all security devices up to date with the latest frame ware updates, thus reducing your exposure to possible vulnerabilities in your network. INDUSTRY EXPERIENCE MSSPs are set up to manage large infrastructures of many clients. Choosing a MSSP can provide a future-proof solution as they can match your business growth requirements seamlessly. ARKANGEL COMPREHENSIVE THREAT MANAGEMENT PLATFORM SECURITY EXPERTISE By selecting to work with an MSSP, your team will have a specialized security team extension that has well documented procedures to deal with security threats. This will help your IT staff respond to security events in the most efficient manner. 4

STANDARD FEATURES OF ABOVE SECURITY MANAGED SECURITY SERVICE (MSS) INCLUDE: THREAT MONITORING 24x7 monitoring, management and notification of internal and external threats to your organization s network environment insuring optimal protection from cyber attacks at all time. INTRUSION DETECTION & PREVENTION SYSTEMS (IDS/IPS) Networks are monitored for malicious activity and policy violations, triggered alerts are analyzed in real time, security incident reports are prepared and security incidents are escalated according to the conditions established in the escalation procedure. EVENT CORRELATION Information from a variety of sources, e.g. security logs, vulnerability scans, and IDS alerts, is evaluated to recognize event patterns that may have a bearing on the organization s security posture. LOG MANAGEMENT Security-related log data is captured and analyzed in order to identify security incidents, fraudulent activity, and operational problems. INCIDENT RESPONSE MANAGEMENT As soon as a security alert is detected, a certified security analyst investigates the alert based on his or her expertise and understanding of the customer s infrastructure. If the alert is determined to be a threat to the customer s network, it will be escalated according to the parameters established in conjunction with the customer. VULNERABILITY ASSESSMENTS Vulnerabilities and weaknesses in the network are identified and managed. A variety of network devices, e.g. servers, appliances, applications and workstations, can be scanned for vulnerabilities. REPORTING Regularly provided reports are a valuable method to provide customers with more insights on the monitoring service, their security posture, incidents which have been handled since the last report publication, actionable recommendations and general observations and trends about their network. 5

ABOUT ABOVE SECURITY Founded in 1999, Above Security A Hitachi Group Company is a Global IT Security Service Provider who builds and delivers customized services for monitoring and protecting the most critical and sensitive IT assets in our customers infrastructures 24/7. With a relentless focus on risk management, and continuous improvement of our technology and incident response processes, our clients count on us to provide the right solutions for their businesses - quickly, effectively and with expertise beyond the industry standards. Our mission is to make the Internet a safer place for all, to harness the full potential of connecting people and businesses together to build trust relationships that can be the catalyst of worry-free collaboration and limitless innovation. In 2015, Above Security was acquired by Hitachi Systems Ltd. and now operates under the name Above Security A Hitachi Group Company. For a more comprehensive assessment of your security needs and to find out how Above Security can help you secure your data and most critical assets at a fraction of the cost of internal monitoring, call our toll-free number at: +1 (866) 430-8166. Sales Offices Canada (World Headquarters) Mexico Switzerland United Arab Emirates United States Security Operations Centers Montreal, Canada Sierre, Switzerland Winnipeg, Canada Mexico City, Mexico Telephone. +1-450-430-8166 Toll Free. +1-866-430-8166 Email. info@abovesecurity.com Web. www.abovesecurity.com 6