Network  security offering
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Network security offering

on

  • 484 views

Network security offering

Network security offering

Statistics

Views

Total Views
484
Views on SlideShare
484
Embed Views
0

Actions

Likes
0
Downloads
13
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Network security offering Presentation Transcript

  • 1. Network & Security
    © This document contains confidential and proprietary information of GSS America. It is furnished for evaluation purposes only. Except with the express prior written permission of GSS America, this document and the information contained herein may not be published, disclosed, or used for any other purpose. | www.gssamerica.com
  • 2. Network Service Overview
    Network Services
    Communication Service Providers
    Equipment Manufacturers
    Enterprise Customers
    • Network Design Assistance
    • 3. Solution Roll-out Support
    • 4. Service Delivery
    • 5. Remote Provisioning
    • 6. Service Assurance
    • 7. Technology Migration Assistance
    • 8. Network Integration Testing
    • 9. Global Network Mgmt
    • 10. (FCAPS) – L1, L2, L3
    • 11. Network Application
    • 12. Performance Optimization
    • 13. QoS Management
    • 14. Vendor Management
    • 15. Managed Security
    • 16. Network Design Assistance
    • 17. Remote Deployment
    • 18. Solution Testing &
    • 19. Implementation support
    • 20. Network Performance
    Optimization
    • TAC Support
    2
  • 21. Network Services for Communication Services Providers
    Service
    Delivery
    Solution
    Roll-out
    Support
    Network
    Design
    Assistance
    Technology
    Migration
    Assistance
    Service
    Assurance
    Network
    Monitoring
    L2, L3 network
    Management
    Capacity
    Analysis &
    reporting
    Network
    Optimization
    Service Level
    Management
    Order entry
    Solution
    Validation
    Deployment
    Planning
    Field
    co-ordination
    Remote Device
    Configuration
    Remote Test &
    Turn-up
    Conformance
    Testing
    Test cases &
    Scenarios
    Network
    Modeling
    Network
    Integration
    Testing
    Recommendations
    Requirement
    Analysis
    Proof of
    Concept
    High Level
    Design
    Low Level
    design
    Design
    Documentation
    Technology
    Readiness
    Assessment
    Remote
    Technology
    Migration
    Project Planning & Management
    3
  • 22. Monitoring of Network links for Availability
    Deliverables
    Service Features
    Supported Platforms
    • Event Notification via Telephone/ Email in case of any downtime.
    • 23. Daily Event Summary Reports
    • 24. Weekly Availability and Link/MPLS port Health Check Reports
    • 25. Monthly Trend Analysis reports for availability
    • 26. Monthly Trend Analysis for utilization
    • 27. Online utilization report
    • 28. Cisco routers
    • 29. Cisco Switches
    • 30. SNMP compatible router of Switches.
    • 31. MPLS ports
    • 32. Frame Relay Link (Subject to FR switch supporting SNMP)
    • 33. Monitoring of availability of the links.
    • 34. Reporting the errors on the link
    • 35. Reporting the fluctuations on the link
    • 36. Reporting the utilization of the link
    • 37. Reporting the protocol wise traffic distribution on the link. This service requires specific tools to be deployed and configured.
    • 38. Utilization threshold on link
    4
  • 39. Monitoring of Network Devices for Availability & Performance
    Deliverables
    Service Features
    Supported Platforms
    • Event Notification via Telephone/ Email in case of any downtime.
    • 40. Daily Event Summary Reports
    • 41. Weekly Availability of devices and Health Check Reports
    • 42. Monthly Trend Analysis reports for availability
    • 43. Monthly Trend Analysis for CPU utilization
    • 44. Online utilization report for CPU
    The following are specifically supported
    • Cisco routers
    • 45. Cisco Switches
    • 46. Cisco WAAS
    • 47. SNMP compatible Router and Switches of any make.
    • 48. Other devices (Case to Case basis)
    • 49. Monitoring of availability of the network devices
    • 50. Monitoring of CPU utilization of the device
    • 51. Monitoring of the links terminated on the devices
    • 52. Monitoring of the hard ware failure of devices like FAN, Interface Cards, Power Supply (subject to availability of SNMP MIB)
    5
  • 53. Administration and Management of Network Devices
    Deliverables
    Service Features
    Supported Platforms
    • Daily Summary Reports
    • 54. Weekly Trend analysis
    • 55. Monthly Trend Analysis
    • 56. RCA report for any unscheduled downtime.
    • 57. Cisco Routers
    • 58. Cisco Switches
    • 59. Cisco WAAS
    • 60. Management and Administration of routers, switches
    • 61. Management of VLAN on L2 and L3 switches
    • 62. Monitoring of errors on network or LAN & resolution.
    • 63. CPU and memory utilization monitoring and management of traffic
    • 64. Log management (recycling of logs, log preservation)
    • 65. Monitoring of routing update and traffic
    • 66. Application of Assess Control List
    • 67. Routing management of traffic.
    • 68. Backups before and after each GSS change
    6
  • 69. Global Operations Command Center (GOCC) for 24x7 support
    Our Global Operations Command Centre (GOCC)
    Infrastructure optimization enables an organization to
    realize the value of their IT infrastructure investments and convert them into a strategic asset. With the current economic situation, focus is on improving IT efficiency and optimizing existing IT investments, while reducing capital and operating expenditure on existing and new IT investments.
    Key drivers for optimization include business alignment, data centre consolidation, services consolidation, mitigating downtime costs, globalization, virtualization, security,
    ‘going green' along with project, staff, and service level/performance assessment
    GSS solutions to IT optimization and Virtualization are holistic and client centered. GSS adapts its solutions to meet each organization’s optimization and virtualization goals, whether they are cost reduction, improved energy efficiency, enhanced response to customers, improved responsiveness to business needs or a combination of these and others.
    GSS America’s COE has developed
    offerings which provide enterprises with the flexibility necessary to address the challenges today. The services are
    depicted below.
    7
  • 70. Managed Security Services
    Managed Security Services (MSS)
    Intrusion Detection & Management
    Perimeter Security Management
    Monitoring & Alerting
    Maintenance & Support
    Identity Software Management
    Vulnerability Assessment & Management
    Security Advisory Services
    8
  • 71. Security Advisory Services
    To be secure, it is necessary to have timely information, to defend against the latest threats & vulnerabilities. Expert assistance onsite/off-shore is also required for solving emergency IT security issues.
    Benefits
    MSS
    Deliverables
    • Up-to-date Information about possible vulnerabilities respective to the IT infrastructure of the client
    • 72. Security experts available 24x7 for any IT security related assistance
    • 73. Latest Vulnerability notification
    • 74. Patch release notification & Virus warnings
    • 75. On-site and Remote Incident Management support
    • 76. Security Advisory Services
    • 77. Intrusion Detection & Mgmt
    • 78. Perimeter Security Management
    • 79. Identity Software Management
    • 80. Vulnerability Assessment & Mgmt
    9
  • 81. Intrusion Detection & Management
    Monitor network and host activities, analyze it for signs of intrusions and respond to block/contain them
    Benefits
    MSS
    Deliverables
    • 24x7 offshore / onsite Management of IDS
    • 82. Skilled & Certified IDS Experts managing the IDS with SLAs
    • 83. Lower cost – Manpower & Tools
    • 84. Analysis of IDS events (elimination of false positives)
    • 85. Incident Based Reporting, Escalations and support
    • 86. IDS Policy Management
    • 87. Intrusion Trend Analysis and reporting
    • 88. Security Advisory Services
    • 89. Intrusion Detection & Mgmt
    • 90. Perimeter Security Management
    • 91. Identity Software Management
    • 92. Vulnerability Assessment & Mgmt
    10
  • 93. Perimeter Security Management
    Management of Firewalls, VPNs, Routers & gateway anti-virus solutions
    Benefits
    MSS
    Deliverables
    • 24x7 offshore / onsite Management
    • 94. Analysis reports to assist better planning
    • 95. Lower cost – Manpower & Tools
    • 96. Certified experts
    • 97. Log analysis
    • 98. Patch/Signature Updation & OS hardening
    • 99. Availability Monitoring
    • 100. Change Management (Policies, Access lists & User Mgmt)
    • 101. Configuration backup & restoration assistance
    • 102. Trend analysis and reporting
    • 103. Security Advisory Services
    • 104. Intrusion Detection & Mgmt
    • 105. Perimeter Security Management
    • 106. Identity Software Management
    • 107. Vulnerability Assessment & Mgmt
    11
  • 108. Identity Software management
    Management of Security Applications based on PKI, Directory Services and Single-Sign-on solutions
    Benefits
    MSS
    Deliverables
    • Analyze reports to assist in better planning
    • 109. Lower cost – Manpower & Tools
    • 110. Experience & Certified security professionals 24x7 for any assistance
    • 111. Change Management of the applications
    • 112. Up gradation and fine-tuning of the applications
    • 113. Analysis reports with recommendations
    • 114. Security Advisory Services
    • 115. Intrusion Detection & Mgmt
    • 116. Perimeter Security Management
    • 117. Identity Software Management
    • 118. Vulnerability Assessment & Mgmt
    12
  • 119. Vulnerability Assessment & Management
    Assess the security of IT infrastructure periodically Security effectiveness & compliance checks
    Benefits
    MSS
    Deliverables
    • Certified experts performing the Security Audits
    • 120. Analysis reports to assist better planning
    • 121. Low tool cost
    • 122. Vulnerability Assessment of – Networks, Systems, Databases, Applications
    • 123. Policy & Process compliance checks
    • 124. Vulnerability fixing / hardening
    • 125. Penetration Testing
    • 126. Security Advisory Services
    • 127. Intrusion Detection & Mgmt
    • 128. Perimeter Security Management
    • 129. Identity Software Management
    • 130. Vulnerability Assessment & Mgmt
    13
  • 131. Managed Firewall Services
    Benefits
    Service Features
    Deliverables
    • Initial and monthly assessments of firewall setup
    • 132. Firewall administration, including rule changes for services to be turned on or off; monitoring of traffic flow to and from IP addresses and ports
    • 133. Backups before and after each GSS change
    • 134. VPN configuration or maintenance (Based on requirement)
    • 135. Software upgrades, patches or other version-related maintenance of Firewalls
    • 136. 24 x 7 Device Availability Monitoring
    • 137. Security Event Inspection
    • 138. Alert Prioritization & Response
    • 139. Firewall Log Monitoring
    • 140. Firewall Log maintenance service
    • 141. Event Notification via Telephone/ Email in case of any Firewall Outage.
    • 142. Daily Event Summary Reports
    • 143. Weekly Availability and Firewall Health Check Reports
    • 144. Monthly Trend Analysis reports
    • 145. Other Customized reports can be provided as per client requirements
    • 146. Check Point
    • 147. Cisco PIX
    • 148. Netscreen
    • 149. WatchGuard
    • 150. Symantec
    • 151. Nokia/ Nortel Alteon appliances
    • 152. SonicWALL
    14
  • 153. Network & Security Transition Framework
    Due
    Diligence
    Knowledge Transfer
    Steady
    State
    Shadow Support
    Transition Planning
    Transition Execution / Shadow support
    Improved
    service
    Reverse
    Shadow
    Environment
    Information
    Risk
    Assessment
    To-Be Tools &
    Process design
    Review
    Requirements
    Detailed data
    collection
    Primary
    Shadow
    Activity Grouping
    & Sequencing
    Knowledge
    Transfer
    Setup offshore
    support
    Steady
    State
    Updated
    Knowledge base
    Better
    Processes
    X:WEEKS
    Y:WEEKS
    SLA Measurement starts
    15