Your SlideShare is downloading. ×
0
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Esguf Profile Short V34
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Esguf Profile Short V34

1,646

Published on

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,646
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Introduce: ESGULF, partners, sponsors, yourself
  • Transcript

    • 1. E-Security Gulf Group WLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
    • 2. Profile <ul><li>“ Leading security solutions ” </li></ul><ul><li>Strategic partner for security solutions </li></ul><ul><li>EU, GCC, Asia </li></ul><ul><li>ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX </li></ul><ul><li>Complete security portfolio </li></ul><ul><li>Physical Security </li></ul><ul><li>Homeland Security </li></ul><ul><li>Incidence Response Center </li></ul><ul><li>Managed Security Services </li></ul><ul><li>Pool &gt; 50 security professionals </li></ul><ul><li>A 5tm Methodology </li></ul><ul><li>Time Based Security </li></ul>
    • 3. New Technologies, Risks <ul><li>Laptops </li></ul><ul><li>Mobiles </li></ul><ul><li>Wireless </li></ul><ul><li>Bluetooth </li></ul><ul><li>PDA </li></ul><ul><li>Memory Sticks </li></ul><ul><li>Smart Card </li></ul>
    • 4. More sophisticated Attacks
    • 5. When Hackers grow UP?
    • 6. Your Business @ Risk!
    • 7. Critical resources
    • 8. Disaster Strikes easy…
    • 9. Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
    • 10. Business Risk Employee &amp; customer privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
    • 11. The result is!
    • 12. Right Assumptions?
    • 13. Security Challenges Confidentiality Integrity Availability
    • 14. Threats and Risk
    • 15. Risk requires… Technology Process People
    • 16. Risk Matrices
    • 17. Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( &amp; BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
    • 18. Security = Time Protection Detection Response SECURITY P&gt;D+R Anti-virus VPN Access Control Firewall Intrusion Prevention Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
    • 19. A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm S ecurity Physical A dminister A pply A rchitect A ssess A wareness
    • 20. Security Services <ul><li>Managed Security Services </li></ul><ul><li>CCTV &amp; Access Control </li></ul><ul><li>Security Operations Center </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Incidence Response </li></ul>Administer <ul><li>Security Education Training and Awareness </li></ul><ul><li>Organizational security </li></ul><ul><li>Security Maturity </li></ul>Awareness <ul><li>Security Defense, Administration </li></ul><ul><li>PKI, VPN, Encryption </li></ul><ul><li>Biometrics, Smart Card, Access Control, Perimeter </li></ul><ul><li>Web Defacement Protection </li></ul><ul><li>Content Inspection and Management </li></ul>Apply <ul><li>Design Security Perimeter </li></ul><ul><li>Security Awareness Program </li></ul><ul><li>Policies, Standards, Procedures, Guidelines </li></ul><ul><li>Physical Protection </li></ul><ul><li>Disaster Recovery Planning </li></ul>Architect <ul><li>Vulnerability Testing </li></ul><ul><li>ISO27001 Assessment </li></ul><ul><li>Penetration Testing </li></ul><ul><li>Business Impact Assessment </li></ul><ul><li>Security Auditing </li></ul>Assess
    • 21. Security Research-1 <ul><li>Remote secure data access </li></ul><ul><li>Certificate based or dynamic password technology </li></ul><ul><li>Transparent technology </li></ul>Secure Access <ul><li>Your portable Datacenter </li></ul><ul><li>Full Data synchronization </li></ul><ul><li>Multi-operating System Support </li></ul><ul><li>Support for full back and front office operations </li></ul><ul><li>Tactical solution for Disaster Recovery </li></ul>Disaster Recovery Box (DRB) <ul><li>Cost Effective Security Operations Center </li></ul><ul><li>Internal or Externally Managed </li></ul><ul><li>Technology Transfer </li></ul><ul><li>Distributed Architecture, Scalable, Module </li></ul><ul><li>Support for full forensic analysis </li></ul>First Defence <ul><li>Basis for Security Framework </li></ul><ul><li>Based on open Security Standards </li></ul><ul><li>Support for Time Based Security </li></ul><ul><li>Continuous Process </li></ul><ul><li>People, Process Technology Paradigm </li></ul>A 5 tm Methodology Key Features Solutions
    • 22. Security Research-2 <ul><li>Hackers Insight for CIO/CEO </li></ul><ul><li>Hackers Insight for Managers </li></ul><ul><li>Hackers Insight for Techies </li></ul><ul><li>Hackers Insight for Wireless </li></ul><ul><li>Practical Security Workshops </li></ul><ul><li>Learn attack and countermeasure technologies </li></ul>Hackers Insight Training Series <ul><li>Managed Vulnerability Services </li></ul><ul><li>Managed Early alter Services </li></ul><ul><li>Managed Patching and Configuration Management </li></ul><ul><li>Managed Incidence Response </li></ul><ul><li>Managed Security Monitoring and Alerting </li></ul>Managed Security Services (MSS) <ul><li>Multi technology for complete Defense </li></ul><ul><li>Early warning system </li></ul><ul><li>Internal and external protection </li></ul><ul><li>Managed Service </li></ul>Phishing Alert Plus (PAP) <ul><li>Secure Hosting </li></ul><ul><li>Secure Data Vaulting </li></ul><ul><li>Complete Storage and Transmission Encryption </li></ul>Swiss Vault Key Features Solutions
    • 23. Integration Business Security Management Physical Security Management ICT Security Management
    • 24. A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
    • 25. Best Practices
    • 26. Securing Applications
    • 27. Flexible Architecture
    • 28. Physical Security
    • 29. Knowledge fills gaps SETA =Security Education + Training + Awareness
    • 30. A5™ Security Defense in depth
    • 31. Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
    • 32. SOC Continuous Response <ul><li>24x7x365 </li></ul><ul><li>Security monitoring </li></ul><ul><li>Managed Services </li></ul><ul><li>Automatic Alerting </li></ul><ul><li>Incidence Response </li></ul><ul><li>Vulnerability Assessment </li></ul><ul><li>Patch Management </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Integration </li></ul>
    • 33. Various response types Business Availability
    • 34. Implementation Process Education Standards &amp; Best Practices Support
    • 35. Partnerships
    • 36. Why eSgulf? <ul><li>Integrated Methodology </li></ul><ul><li>Industry Best practices </li></ul><ul><li>Business &amp; Risk Focus </li></ul><ul><li>Security Metrics approach </li></ul><ul><li>Security Experts </li></ul><ul><li>Proof of Concept and R&amp;D Lab </li></ul><ul><li>Proven delivery, references </li></ul><ul><li>Cost effective solutions &amp; services </li></ul><ul><li>Strategic Vendor Partnerships </li></ul><ul><li>24x7x365 Support </li></ul>

    ×