0
Network & Security<br />© This document contains confidential and proprietary information of GSS America. It is furnished ...
Network Service Overview<br />Network Services<br />Communication Service Providers<br />Equipment Manufacturers <br />Ent...
Solution Roll-out Support
Service Delivery
Remote Provisioning
Service Assurance
Technology Migration Assistance
Network Integration Testing
Global Network Mgmt
(FCAPS) – L1, L2, L3
Network Application
Performance Optimization
QoS Management
Vendor Management
Managed Security
Upcoming SlideShare
Loading in...5
×

Network security offering

434

Published on

Network security offering

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
434
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Network security offering"

  1. 1. Network & Security<br />© This document contains confidential and proprietary information of GSS America. It is furnished for evaluation purposes only. Except with the express prior written permission of GSS America, this document and the information contained herein may not be published, disclosed, or used for any other purpose. | www.gssamerica.com<br />
  2. 2. Network Service Overview<br />Network Services<br />Communication Service Providers<br />Equipment Manufacturers <br />Enterprise Customers<br /><ul><li>Network Design Assistance
  3. 3. Solution Roll-out Support
  4. 4. Service Delivery
  5. 5. Remote Provisioning
  6. 6. Service Assurance
  7. 7. Technology Migration Assistance
  8. 8. Network Integration Testing
  9. 9. Global Network Mgmt
  10. 10. (FCAPS) – L1, L2, L3
  11. 11. Network Application
  12. 12. Performance Optimization
  13. 13. QoS Management
  14. 14. Vendor Management
  15. 15. Managed Security
  16. 16. Network Design Assistance
  17. 17. Remote Deployment
  18. 18. Solution Testing &
  19. 19. Implementation support
  20. 20. Network Performance </li></ul> Optimization<br /><ul><li>TAC Support</li></ul>2<br />
  21. 21. Network Services for Communication Services Providers<br />Service<br />Delivery<br />Solution <br />Roll-out<br />Support<br />Network <br />Design<br />Assistance<br />Technology<br />Migration<br />Assistance<br />Service <br />Assurance<br />Network <br />Monitoring<br />L2, L3 network <br />Management<br />Capacity <br />Analysis & <br />reporting<br />Network <br />Optimization<br />Service Level <br />Management<br />Order entry<br />Solution<br />Validation <br />Deployment<br />Planning<br />Field<br />co-ordination<br />Remote Device<br />Configuration<br />Remote Test &<br />Turn-up <br />Conformance <br />Testing<br />Test cases &<br />Scenarios<br />Network <br />Modeling<br />Network <br />Integration <br />Testing<br />Recommendations<br />Requirement<br />Analysis<br />Proof of<br />Concept<br />High Level <br />Design<br />Low Level <br />design<br />Design <br />Documentation<br />Technology<br />Readiness<br />Assessment<br />Remote<br />Technology<br />Migration<br />Project Planning & Management<br />3<br />
  22. 22. Monitoring of Network links for Availability<br />Deliverables<br />Service Features<br />Supported Platforms<br /><ul><li> Event Notification via Telephone/ Email in case of any downtime.
  23. 23. Daily Event Summary Reports
  24. 24. Weekly Availability and Link/MPLS port Health Check Reports
  25. 25. Monthly Trend Analysis reports for availability
  26. 26. Monthly Trend Analysis for utilization
  27. 27. Online utilization report
  28. 28. Cisco routers
  29. 29. Cisco Switches
  30. 30. SNMP compatible router of Switches.
  31. 31. MPLS ports
  32. 32. Frame Relay Link (Subject to FR switch supporting SNMP)
  33. 33. Monitoring of availability of the links.
  34. 34. Reporting the errors on the link
  35. 35. Reporting the fluctuations on the link
  36. 36. Reporting the utilization of the link
  37. 37. Reporting the protocol wise traffic distribution on the link. This service requires specific tools to be deployed and configured.
  38. 38. Utilization threshold on link</li></ul>4<br />
  39. 39. Monitoring of Network Devices for Availability & Performance<br />Deliverables<br />Service Features<br />Supported Platforms<br /><ul><li> Event Notification via Telephone/ Email in case of any downtime.
  40. 40. Daily Event Summary Reports
  41. 41. Weekly Availability of devices and Health Check Reports
  42. 42. Monthly Trend Analysis reports for availability
  43. 43. Monthly Trend Analysis for CPU utilization
  44. 44. Online utilization report for CPU</li></ul>The following are specifically supported<br /><ul><li> Cisco routers
  45. 45. Cisco Switches
  46. 46. Cisco WAAS
  47. 47. SNMP compatible Router and Switches of any make.
  48. 48. Other devices (Case to Case basis)
  49. 49. Monitoring of availability of the network devices
  50. 50. Monitoring of CPU utilization of the device
  51. 51. Monitoring of the links terminated on the devices
  52. 52. Monitoring of the hard ware failure of devices like FAN, Interface Cards, Power Supply (subject to availability of SNMP MIB)</li></ul>5<br />
  53. 53. Administration and Management of Network Devices<br />Deliverables<br />Service Features<br />Supported Platforms<br /><ul><li> Daily Summary Reports
  54. 54. Weekly Trend analysis
  55. 55. Monthly Trend Analysis
  56. 56. RCA report for any unscheduled downtime.
  57. 57. Cisco Routers
  58. 58. Cisco Switches
  59. 59. Cisco WAAS
  60. 60. Management and Administration of routers, switches
  61. 61. Management of VLAN on L2 and L3 switches
  62. 62. Monitoring of errors on network or LAN & resolution.
  63. 63. CPU and memory utilization monitoring and management of traffic
  64. 64. Log management (recycling of logs, log preservation)
  65. 65. Monitoring of routing update and traffic
  66. 66. Application of Assess Control List
  67. 67. Routing management of traffic.
  68. 68. Backups before and after each GSS change</li></ul>6<br />
  69. 69. Global Operations Command Center (GOCC) for 24x7 support<br />Our Global Operations Command Centre (GOCC)<br />Infrastructure optimization enables an organization to <br />realize the value of their IT infrastructure investments and convert them into a strategic asset. With the current economic situation, focus is on improving IT efficiency and optimizing existing IT investments, while reducing capital and operating expenditure on existing and new IT investments.<br />Key drivers for optimization include business alignment, data centre consolidation, services consolidation, mitigating downtime costs, globalization, virtualization, security,<br />‘going green' along with project, staff, and service level/performance assessment<br />GSS solutions to IT optimization and Virtualization are holistic and client centered. GSS adapts its solutions to meet each organization’s optimization and virtualization goals, whether they are cost reduction, improved energy efficiency, enhanced response to customers, improved responsiveness to business needs or a combination of these and others. <br />GSS America’s COE has developed <br />offerings which provide enterprises with the flexibility necessary to address the challenges today. The services are <br />depicted below.<br />7<br />
  70. 70. Managed Security Services<br />Managed Security Services (MSS)<br />Intrusion Detection & Management<br />Perimeter Security Management<br />Monitoring & Alerting<br />Maintenance & Support<br />Identity Software Management<br />Vulnerability Assessment & Management<br />Security Advisory Services<br />8<br />
  71. 71. Security Advisory Services<br />To be secure, it is necessary to have timely information, to defend against the latest threats & vulnerabilities. Expert assistance onsite/off-shore is also required for solving emergency IT security issues.<br />Benefits<br />MSS<br />Deliverables<br /><ul><li> Up-to-date Information about possible vulnerabilities respective to the IT infrastructure of the client
  72. 72. Security experts available 24x7 for any IT security related assistance
  73. 73. Latest Vulnerability notification
  74. 74. Patch release notification & Virus warnings
  75. 75. On-site and Remote Incident Management support
  76. 76. Security Advisory Services
  77. 77. Intrusion Detection & Mgmt
  78. 78. Perimeter Security Management
  79. 79. Identity Software Management
  80. 80. Vulnerability Assessment & Mgmt</li></ul>9<br />
  81. 81. Intrusion Detection & Management<br />Monitor network and host activities, analyze it for signs of intrusions and respond to block/contain them<br />Benefits<br />MSS<br />Deliverables<br /><ul><li> 24x7 offshore / onsite Management of IDS
  82. 82. Skilled & Certified IDS Experts managing the IDS with SLAs
  83. 83. Lower cost – Manpower & Tools
  84. 84. Analysis of IDS events (elimination of false positives)
  85. 85. Incident Based Reporting, Escalations and support
  86. 86. IDS Policy Management
  87. 87. Intrusion Trend Analysis and reporting
  88. 88. Security Advisory Services
  89. 89. Intrusion Detection & Mgmt
  90. 90. Perimeter Security Management
  91. 91. Identity Software Management
  92. 92. Vulnerability Assessment & Mgmt</li></ul>10<br />
  93. 93. Perimeter Security Management<br />Management of Firewalls, VPNs, Routers & gateway anti-virus solutions<br />Benefits<br />MSS<br />Deliverables<br /><ul><li> 24x7 offshore / onsite Management
  94. 94. Analysis reports to assist better planning
  95. 95. Lower cost – Manpower & Tools
  96. 96. Certified experts
  97. 97. Log analysis
  98. 98. Patch/Signature Updation & OS hardening
  99. 99. Availability Monitoring
  100. 100. Change Management (Policies, Access lists & User Mgmt)
  101. 101. Configuration backup & restoration assistance
  102. 102. Trend analysis and reporting
  103. 103. Security Advisory Services
  104. 104. Intrusion Detection & Mgmt
  105. 105. Perimeter Security Management
  106. 106. Identity Software Management
  107. 107. Vulnerability Assessment & Mgmt</li></ul>11<br />
  108. 108. Identity Software management<br />Management of Security Applications based on PKI, Directory Services and Single-Sign-on solutions<br />Benefits<br />MSS<br />Deliverables<br /><ul><li> Analyze reports to assist in better planning
  109. 109. Lower cost – Manpower & Tools
  110. 110. Experience & Certified security professionals 24x7 for any assistance
  111. 111. Change Management of the applications
  112. 112. Up gradation and fine-tuning of the applications
  113. 113. Analysis reports with recommendations
  114. 114. Security Advisory Services
  115. 115. Intrusion Detection & Mgmt
  116. 116. Perimeter Security Management
  117. 117. Identity Software Management
  118. 118. Vulnerability Assessment & Mgmt</li></ul>12<br />
  119. 119. Vulnerability Assessment & Management<br /> Assess the security of IT infrastructure periodically Security effectiveness & compliance checks<br />Benefits<br />MSS<br />Deliverables<br /><ul><li> Certified experts performing the Security Audits
  120. 120. Analysis reports to assist better planning
  121. 121. Low tool cost
  122. 122. Vulnerability Assessment of – Networks, Systems, Databases, Applications
  123. 123. Policy & Process compliance checks
  124. 124. Vulnerability fixing / hardening
  125. 125. Penetration Testing
  126. 126. Security Advisory Services
  127. 127. Intrusion Detection & Mgmt
  128. 128. Perimeter Security Management
  129. 129. Identity Software Management
  130. 130. Vulnerability Assessment & Mgmt</li></ul>13<br />
  131. 131. Managed Firewall Services <br />Benefits<br />Service Features<br />Deliverables<br /><ul><li> Initial and monthly assessments of firewall setup
  132. 132. Firewall administration, including rule changes for services to be turned on or off; monitoring of traffic flow to and from IP addresses and ports
  133. 133. Backups before and after each GSS change
  134. 134. VPN configuration or maintenance (Based on requirement)
  135. 135. Software upgrades, patches or other version-related maintenance of Firewalls
  136. 136. 24 x 7 Device Availability Monitoring
  137. 137. Security Event Inspection
  138. 138. Alert Prioritization & Response
  139. 139. Firewall Log Monitoring
  140. 140. Firewall Log maintenance service
  141. 141. Event Notification via Telephone/ Email in case of any Firewall Outage.
  142. 142. Daily Event Summary Reports
  143. 143. Weekly Availability and Firewall Health Check Reports
  144. 144. Monthly Trend Analysis reports
  145. 145. Other Customized reports can be provided as per client requirements
  146. 146. Check Point
  147. 147. Cisco PIX
  148. 148. Netscreen
  149. 149. WatchGuard
  150. 150. Symantec
  151. 151. Nokia/ Nortel Alteon appliances
  152. 152. SonicWALL</li></ul>14<br />
  153. 153. Network & Security Transition Framework<br />Due <br />Diligence<br />Knowledge Transfer<br />Steady <br />State<br />Shadow Support<br />Transition Planning<br />Transition Execution / Shadow support<br />Improved <br />service<br />Reverse<br />Shadow<br />Environment<br />Information<br />Risk <br />Assessment<br />To-Be Tools &<br />Process design <br />Review<br />Requirements<br />Detailed data <br />collection<br />Primary<br />Shadow<br />Activity Grouping<br />& Sequencing<br />Knowledge<br />Transfer<br />Setup offshore <br />support<br />Steady <br />State<br />Updated <br />Knowledge base<br />Better <br />Processes<br />X:WEEKS<br />Y:WEEKS<br />SLA Measurement starts<br />15<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×