SlideShare a Scribd company logo
1 of 30
Services Description
August 2014
AGENDA
● Cloud:
○ Own v/s Lease
○ Decentralization of IT
● Security:
○ Threats
○ Impact and Urgency
○ Cost of Breach
○ Log Monitoring
● Solution
○ Overview
○ Architecture
○ Packages
● Backup Slides
CLOUD
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud : Own versus Lease
● Own the asset: you
can modify it as you
please
● You can sell it
whenever you want
● More economical on
the long run
● High Investment -
Depreciation
● Lower down payment
● Lower monthly payments
● Lower maintenance costs
● Ability to modify the
offering at any time
● Ability to change asset
every year or two
● Faster time to install
● No need for in-house
expertise
● No rent space
● Increase or decrease
capacity at will
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud Services
Decrease budget and avoid vendor
lock-in
Save on technology upgrades and
maintenance
Lower footprint on your network
Ensure compliance to regulatory
mandates.
Deploy faster and easier
Gartner defines cloud
computing as “...a style of
computing in which
scalable and elastic IT-
enabled capabilities are
delivered as a service
using Internet
technologies.”
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud: The Decentralization of IT
Hardware
On-Premises
OS
Network
Database
Tools
Application
Data
Users
Hardware
IaaS
OS
Network
Database
Tools
Application
Data
Users
Hardware
PaaS
OS
Network
Database
Tools
Application
Data
Users
Hardware
SaaS
OS
Network
Database
Tools
Application
Data
Users
SECURITY
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Network Security: Malware, Vulnerabilities, Theft
Trojan Horse
File infection
Spam email
zero-day attacks
Software vulnerabilities
OS vulnerabilities
Identify theft
Mobile Loss
Phishing
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Impact and Urgency
112
3 2
4 3 2
1
Business Process
affected.
Workaround
available.
Business Process
stopped. Can bare
minimal delay. Very
hard workaround
Business Process
stopped. No work
around
Urgency
Impact
Any system minor
degradation non-
business critical.
<50% of users
impacted
Any system
degraded or partially
unavailable. >50% of
users impacted
Any system
unavailable.
100% of users
impacted
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cost of Breach
IBM Data Breach Statistics 2014
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Logs
ODBC
WMI
SDEE
CPMI
SNMP
syslog
netflow
ssh
native FIM
Registry
Monitor
custom XML-
based
log /lôg läg/ - noun
"a record of performance, events, or day-to-day activities"
synonyms: record, register, logbook, journal, diary, chronicle, daybook,
record book, ledger;
RDEP Forensics
Network
Behaviour
Analysis
Performance
Monitoring
Asset Analytics
Configuration
Management
Vulnerability
Scanner
Log Management
One Solution
SOLUTION
SIEM as a Service
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Solution Overview
MSS is a Unified Security Management service that
combines multiple security functions in a single console:
● SIEM (security incident and event management)
● Secure Configuration Auditing
● Compliance Automation
● Contextual Forensic Analysis
Network state and event data is collected continuously.
The system deploys alert correlations schemes to identify
suspicious activity that can develop into threats affecting
your business.
Network data collected is compressed and encrypted to
avoid network congestion and ensure maximum security
of your data.
‘... customers need to
examine security event
data in real time for
internal and external
threat management, and
to collect, store, analyze
and report on log data for
incident response,
forensics, and regulatory
compliance…’
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Solution Architecture
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Key Components
● Full SIEM deployment with real-time security monitoring,
historical analysis and event correlation
● 24x7 security and configuration device monitoring:
IPS/Firewall/VPN/Servers/Virtual Environments; up to 160
different node types
● Customized web-portal dashboard to provide real-time
reports and statistics
● Dedicated engineering consultants to support with forensic
investigation and remediation
● Compliance and security risk reviews: PCI DSS, HIPAA,
ISO27001/27002, COBIT, NIST800-53…
● Consulting Services - Security Posture Analysis and
Recommendation
● Full Engineering and Management Services
‘...the technology provides
real-time security
monitoring, historical
analysis, and other
support for incident
investigation and
compliance reporting...’
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Dashboards Online
Demo:
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
MSS Summary
Low monthly subscription fees
Leverage on DataConsult’s expertise in security
Scale very easily
Ensure compliance to regulatory mandates.
Get Security Monitoring installed in minutes
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Packages
MSS
MSS1
(Reporting)
MSS2
(Premium)
MSSe
(Consulting)
MSSe+
(Managed)
Log Collection X X X X
Event Reporting X X X X
Asset and Performance Monitoring X X X X
Daily Security Status Reports X X X X
Forensic Investigations X X X
Configuration and Asset Management X X X
Event Correlation X X X
Network Behaviour Analysis X X X
24x7 Live Alert Monitoring & Notification X X X
Monthly Health Reports X X X
Compliance Automation X X
Security Posture Analysis and Recommendation X X
Remediation and Control X
Full Engineering and Device Management X
Thank You
BACKUP SLIDES
Screen Shots
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Critical Event per Hour
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Denied Connections per Hour
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Alert Configuration
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Blocking
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Protocol
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
User by Protocol
BACKUP SLIDES
References
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
MALicious softWARE
Cisco Annual Security Report 2014
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Vulnerabilities
Kaspersky Security Bulletin 2014
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Mobile Device Theft
Sophos Security Threat Report 2014

More Related Content

What's hot

Brochure Security
Brochure SecurityBrochure Security
Brochure Security
bryanpsu
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
Paul Hogan
 

What's hot (20)

Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Technical Services eBook
Technical Services eBookTechnical Services eBook
Technical Services eBook
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
Cisco Advanced Services
Cisco Advanced ServicesCisco Advanced Services
Cisco Advanced Services
 

Viewers also liked

Viewers also liked (19)

FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attack
 
Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP Offering
 
A toolbox of modern management practices for a Digital World and the role EA ...
A toolbox of modern management practices for a Digital World and the role EA ...A toolbox of modern management practices for a Digital World and the role EA ...
A toolbox of modern management practices for a Digital World and the role EA ...
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 

Similar to Data Consult - Managed Security Services

Similar to Data Consult - Managed Security Services (20)

#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
Enterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the BankEnterprise-Grade Disaster Recovery Without Breaking the Bank
Enterprise-Grade Disaster Recovery Without Breaking the Bank
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
ITSM Technology Trend
ITSM Technology Trend ITSM Technology Trend
ITSM Technology Trend
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Data Consult - Managed Security Services

  • 2. AGENDA ● Cloud: ○ Own v/s Lease ○ Decentralization of IT ● Security: ○ Threats ○ Impact and Urgency ○ Cost of Breach ○ Log Monitoring ● Solution ○ Overview ○ Architecture ○ Packages ● Backup Slides
  • 4. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Cloud : Own versus Lease ● Own the asset: you can modify it as you please ● You can sell it whenever you want ● More economical on the long run ● High Investment - Depreciation ● Lower down payment ● Lower monthly payments ● Lower maintenance costs ● Ability to modify the offering at any time ● Ability to change asset every year or two ● Faster time to install ● No need for in-house expertise ● No rent space ● Increase or decrease capacity at will
  • 5. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Cloud Services Decrease budget and avoid vendor lock-in Save on technology upgrades and maintenance Lower footprint on your network Ensure compliance to regulatory mandates. Deploy faster and easier Gartner defines cloud computing as “...a style of computing in which scalable and elastic IT- enabled capabilities are delivered as a service using Internet technologies.”
  • 6. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Cloud: The Decentralization of IT Hardware On-Premises OS Network Database Tools Application Data Users Hardware IaaS OS Network Database Tools Application Data Users Hardware PaaS OS Network Database Tools Application Data Users Hardware SaaS OS Network Database Tools Application Data Users
  • 8. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Network Security: Malware, Vulnerabilities, Theft Trojan Horse File infection Spam email zero-day attacks Software vulnerabilities OS vulnerabilities Identify theft Mobile Loss Phishing
  • 9. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Impact and Urgency 112 3 2 4 3 2 1 Business Process affected. Workaround available. Business Process stopped. Can bare minimal delay. Very hard workaround Business Process stopped. No work around Urgency Impact Any system minor degradation non- business critical. <50% of users impacted Any system degraded or partially unavailable. >50% of users impacted Any system unavailable. 100% of users impacted
  • 10. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Cost of Breach IBM Data Breach Statistics 2014
  • 11. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Logs ODBC WMI SDEE CPMI SNMP syslog netflow ssh native FIM Registry Monitor custom XML- based log /lôg läg/ - noun "a record of performance, events, or day-to-day activities" synonyms: record, register, logbook, journal, diary, chronicle, daybook, record book, ledger; RDEP Forensics Network Behaviour Analysis Performance Monitoring Asset Analytics Configuration Management Vulnerability Scanner Log Management One Solution
  • 13. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Solution Overview MSS is a Unified Security Management service that combines multiple security functions in a single console: ● SIEM (security incident and event management) ● Secure Configuration Auditing ● Compliance Automation ● Contextual Forensic Analysis Network state and event data is collected continuously. The system deploys alert correlations schemes to identify suspicious activity that can develop into threats affecting your business. Network data collected is compressed and encrypted to avoid network congestion and ensure maximum security of your data. ‘... customers need to examine security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics, and regulatory compliance…’
  • 14. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Solution Architecture
  • 15. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Key Components ● Full SIEM deployment with real-time security monitoring, historical analysis and event correlation ● 24x7 security and configuration device monitoring: IPS/Firewall/VPN/Servers/Virtual Environments; up to 160 different node types ● Customized web-portal dashboard to provide real-time reports and statistics ● Dedicated engineering consultants to support with forensic investigation and remediation ● Compliance and security risk reviews: PCI DSS, HIPAA, ISO27001/27002, COBIT, NIST800-53… ● Consulting Services - Security Posture Analysis and Recommendation ● Full Engineering and Management Services ‘...the technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting...’
  • 16. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Dashboards Online Demo:
  • 17. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission MSS Summary Low monthly subscription fees Leverage on DataConsult’s expertise in security Scale very easily Ensure compliance to regulatory mandates. Get Security Monitoring installed in minutes
  • 18. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Packages MSS MSS1 (Reporting) MSS2 (Premium) MSSe (Consulting) MSSe+ (Managed) Log Collection X X X X Event Reporting X X X X Asset and Performance Monitoring X X X X Daily Security Status Reports X X X X Forensic Investigations X X X Configuration and Asset Management X X X Event Correlation X X X Network Behaviour Analysis X X X 24x7 Live Alert Monitoring & Notification X X X Monthly Health Reports X X X Compliance Automation X X Security Posture Analysis and Recommendation X X Remediation and Control X Full Engineering and Device Management X
  • 21. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Critical Event per Hour
  • 22. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Denied Connections per Hour
  • 23. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Alert Configuration
  • 24. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Destination Blocking
  • 25. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Destination Protocol
  • 26. © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission User by Protocol
  • 28. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission MALicious softWARE Cisco Annual Security Report 2014
  • 29. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Vulnerabilities Kaspersky Security Bulletin 2014
  • 30. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Mobile Device Theft Sophos Security Threat Report 2014