Managed Security Services Als je het doet moet je het goed doen.



Similar documents
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Spyders Managed Security Services

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

SANS Top 20 Critical Controls for Effective Cyber Defense

IT Security Strategy and Priorities. Stefan Lager CTO Services

Managed Security Services for Data

SIEM AND THE ART OF LOG MANAGEMENT Trustwave Holdings, Inc.

Caretower s SIEM Managed Security Services

Click to edit Master title style. How To Choose The Right MSSP

End-user Security Analytics Strengthens Protection with ArcSight

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Splunk: Using Big Data for Cybersecurity

Der Weg, wie die Verantwortung getragen werden kann!

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Met je hoofd in de wolken. Ard-Jan Glas

Security Analytics for Smart Grid

Clavister InSight TM. Protecting Values

RAVEN, Network Security and Health for the Enterprise

Unified Security, ATP and more

Network Management and Monitoring Software

QRadar SIEM and FireEye MPS Integration

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Find the needle in the security haystack

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Modern Approach to Incident Response: Automated Response Architecture

STEALTHWATCH MANAGEMENT CONSOLE

Enhancing Your Network Security

Infoblox vnios Software for CISCO AXP

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CLOUD GUARD UNIFIED ENTERPRISE

Payment Card Industry Data Security Standard

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Hoe ontwerp en realiseer je een digitale wasstraat?

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

SourceFireNext-Generation IPS

How To Manage Your Information Systems At Aerosoft.Com

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Combating a new generation of cybercriminal with in-depth security monitoring

SapphireIMS 4.0 BSM Feature Specification

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The SIEM Evaluator s Guide

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

A Case for Managed Security

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

SDN van start naar finish

Concierge SIEM Reporting Overview

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

THE TOP 4 CONTROLS.

How To Create Situational Awareness

Alcatel-lucent emergency notification server INCREASE RESPONSIVENESS INSIDE THE ENTERPRISE TO ENHANCE EVERYDAY SAFETY

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Securing Remote Vendor Access with Privileged Account Security

SapphireIMS Business Service Monitoring Feature Specification

Best Practices to Improve Breach Readiness

MSP Service Matrix. Servers

What s New in Security Analytics Be the Hunter.. Not the Hunted

PC Proactive Solutions Technical View

Enabling Security Operations with RSA envision. August, 2009

Speed Up Incident Response with Actionable Forensic Analytics

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Cybersecurity: What CFO s Need to Know

A FAULT MANAGEMENT WHITEPAPER

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Managed Security Services Portfolio

Lot 1 Service Specification MANAGED SECURITY SERVICES

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Vulnerability Management

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Symantec Cyber Security Services: DeepSight Intelligence

Information Technology Solutions

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

PacketTrap One Resource for Managed Services

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Integrating MSS, SEP and NGFW to catch targeted APTs

Testing the Security of your Applications

Unified Threat Management, Managed Security, and the Cloud Services Model

Security Information & Event Manager (SIEM)

Protection Against Advanced Persistent Threats

Cursusrooster Technology NEDERLAND. Nederland maart juni Learn Oracle From Oracle

State of Security Monitoring of Public Cloud

Transcription:

Managed Security Services Als je het doet moet je het goed doen. Peter Mesker CTO IT SECURITY IS TOPSPORT!

SecurePROTECT Managed Security Services security is een proces, geen product

De uitdaging Don t miss events No false positives No false negatives Under reacting Target, which last year was hit with a major data breach that exposed to hackers data on some 40 million credit and debit cards and personal data on another 70 million customers. The retailer acknowledged that it could have mitigated or even avoided the breach had it paid closer attention to alerts generated by the security monitoring tools. Computerworld, 14 march 2014 Over reacting US Agency Baffled by Modern Technology, Destroys Mice to Get Rid of Viruses In December 2011, the Department of Homeland Security notified the EDA that there was a possible malware infection within the agency s systems. The EDA destroyed not only (uninfected) desktop computers but also printers, cameras, keyboards, and even mice. The destruction only stopped sparing $3 million of equipment because the agency had run out of money to pay for destroying the hardware. www.arstechnica.com, 8 july 2013

De echte uitdaging Serendipity! Sifting through a lot of warnings underscores the need for protocols that help to figure out when and how to respond.! It becomes like the car alarms going off in a parking lot no one takes them seriously because generally there are too many false car alarms. And even if it was a real alarm, most people wouldn t know what to do about it, says Avivah Litan, vice president and distinguished analyst at Gartner Inc. She said she was aware of one bank that received an average of 135,000 alerts a day.! What are you supposed to do with that? You need to make security systems more intelligent with contextual data, Ms. Litan said. That way you can prioritize the alerts. The bank reduced its alerts to 5,000 a day by using Big Data, she said. Of those remaining alerts, the bank might look at the top 100.

Van reactief naar proactief

Quickscan Stappenplan! Incident Management Reactief! Vulenerability Management Detectief! Threat Management Proactief

NOC services Security Center Advanced SOC services 7x24 monitoring en alarmering Security announcements Signalering/monitoring Security analytics Device backup én restore Persoonlijke contacten Incident response Root cause analysis Customer dashboard Skilled Service Desk Malware analyse Penetration testing Firmware- en softwarebeheer Escalatieprocedure (email, SMS, telefoon) Intelligence feeds Virtuele security officer Configuratie- en versiebeheer SecureDAP & SecureSLA Log collectie en correlatie Support en changes Rapportage Vulnerability scanning Livescan Security Center rapportage 7x24 service expertise SecureSLA SecureDAP SDM

SecureLink services architectuur Klanten Klanten Klanten Omgeving klant A Omgeving klant B Events Events SecurePROTECT MSS Monitoring Error events Critical events Services portal Tickets Service Desk & Security Center Bugs RFEs RMAs Vendoren Vendoren Vendoren Omgeving klant C Events CMDB SLA (SN)

SecurePROTECT architectuur Error critical SecureLink Service Desk Offsite backup Master Primary Redundant Master Secondary Dashboard Centrale monitoring Critical SMS callcenter Lokale monitoring en rapportage & dashboard Lokale SMVA (+USM) Klant A Lokale SMVA (+USM) Klant B Lokale SMVA (+USM) Klant C SMVA = SecureLink Managed Virtual Appliance Infrastructuur klant

Lokale monitoring & alerting Security gateways IDS/IPS Web Proxy Load balancers Servers & endpoints DNS, DHCP, IPAM Ping SNMP polling SNMP traps Syslog Configs SMVA monitoring server Master Primary Master Secondary OS & apps Switches en routers Voorbeeld F5 SNMP trap DoS attack detected by Application Security Module Syslog/events/flows Severity: critical Syslogs USM Unified Security Management [SIEM, Vulnerability scanning, malware scanning, analyse, forensics] Use cases Alerts (human interpretation) Rapportage & dashboard

Wat bieden wij u?! Account team! Service Delivery Manager! Skilled Service Desk! Changes < 5 werkdagen! Spoedchanges < 4 werkuren! Incidenten Reactietijd <30 CTF <4u! Overeenkomst! SecureDAP! SecureSLA! Rapportage! Root cause en forensische analyse

De voordelen van SecurePROTECT! NOC en Advanced SOC diensten 7x24x365 monitoring, alerting & security analytics van uw volledige infrastructuur! Direct een hoger security niveau! Persoonlijke contacten Naast security analisten bestaat ons Incident Response Team ook uit security engineers die bekend zijn met uw infrastructuur Overzichtelijke en inhoudelijke rapportage! Lagere kosten! Altijd een up-to-date configuratie (lifecycle management)! SecureDAP en SecureSLA! Modulaire services! Customer portal en customer dashboard! Periodieke rapportage

Bedankt voor uw tijd. IT SECURITY IS TOPSPORT!