Your SlideShare is downloading. ×
  • Like
  • Save
Ma infosec managed_security_services
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Ma infosec managed_security_services

  • 127 views
Published

 

Published in Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
127
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved
  • MaInfosec Managed Security Solutions © Copyright 2012 MaInfosec, All Rights Reserved

Transcript

  • 1. 1
  • 2. Customers Can Submit suspected files – We analyze the files for youBehavior analysis of Malware files and code analysis would be conductedMalware Files can be .exe, DLL, PDF, SWF, Java scripts, VB Scripts and HTML Customers Can submit the URL which is suspicious, We analyze the site for youWe have Sandbox environment with Specialized Open source toolsand Certified professionals to Analyze Malware filesCalculating the Risk to your environment based on the malware andIts communication to external Bot net controllers, Data Loss 2
  • 3. Todays Evolving Days Anti Virus Plays Vital Role in an Enterprise We Support Standalone and Distributed Deployment Models Standalone Model for Small Business – Deploying Antivirus Software in each Computer and setting up the Automatic Updates and Logs Distributed Model for Medium/Large Business – Deploying Client/Server Anti vir softwares And setting up Alerting mechanism, Automatic Updates and Logs Day to day Operations Support – Virus alerts would be sent to Analyst Mail box Analyst Will take RDP to Customers Computer and Fix the Virus related Issues b Checking Registry entries/Cleaners/Temp clean up/Uninstall virus programsChecking with Enterprise Security Incident Response Teams for any data loss durinThe Virus infection and communication to external Malicious Controllers 3
  • 4. •IDS/IPS Deployments for Small/Medium Business – Architecture, Install , Configure•IDS Architecture - Designing a Best suitable place for IDS to Cover All Network traf•IDS Install – Installing IDS Device – Rack Mounting to Console Software Installation•IDS Configuration – Configuring IDS device w.r.t to Organization requirements•Log Collector Tool Deployments for Small/Medium Business – Architecture, Install, Configure•Log Collectors/SIM tools like splunk and OSSIM – collect logs from all the devices.•Security Operation Center 24X7 Support•Security Operation Center will be monitoring Enterprise Traffic 24X7 to find any attacks.•Attacks which are not blocked, would be escalated to Organization for further actions. 4
  • 5. --Vulnerability Scanners Will find the Patch status of servers/desktops--Deploying Vulnerability Scanners for Medium/Large EnterprisesMcAfee Foundstone, Nexpose, Nessus and Qualys Guard are exaples of scannVulnerability Scanner will find the Operating System Bugs.Gathering Organizations Assets, IP address, System names and Importing toEnterprise scanners.Performing Monthly, Quarterly and Annual Scans for providing evidence to AudPerforming On demand scans to Pre-Production Servers, When going LiveAnalyzing the vulnerabilities, Assessing the Risk , Calculating the Threat andProviding the Report on Vulnerability Assessments. 5
  • 6. Penetration testing is a test which would be done by ethical hackers inside the organizationTo find loop holes in the system/server/website.Before External Hackers Hack Organizations Assets and Steal data/reputation – BetterTo have a Penetration Test done on Organizations Assets.We Perform Manual and Automated Penetration Tests by most popular exploitation kits.Example : Metasploit, backtrack tools, Custom scripts written for different vulnerabilitiesFrom different sources.We have Certified Ethical Hackers with good expertise on exploitation 6
  • 7. Web Applications are very crucial in organization, where a small vulnerability in thewebsite can cause lot of financial damage to the firm.We Deploy/Manage the Web Application Security Tools like IBM App scan, Cenzic etc…Performing Monthly, Quarterly and Annual Scans on your websites for submitting AuditScanning Web applications when they are in last phase of SDLC life cycle forVulnerabilities.Analyzing the web vulnerabilities like SQL Injection, XSS and CSRF etc.. And assistingThe developers – what to fix, how to fix, where to fix. 7
  • 8. Create/Modify/Delete Users for Medium/Large OrganizationsActive Directory User administration and Profile managementCreating Role Based user account depending on the Organization requirementGroup Creation and AdministrationsUser Administration for newly joined employees/third parties 8