E-Security Gulf Group WLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
Profile <ul><li>“ Leading security solutions ” </li></ul><ul><li>Strategic partner for security solutions </li></ul><ul><l...
New Technologies, Risks <ul><li>Laptops </li></ul><ul><li>Mobiles </li></ul><ul><li>Wireless </li></ul><ul><li>Bluetooth <...
More sophisticated Attacks
When Hackers grow UP?
Your Business @ Risk!
Critical resources
Disaster Strikes easy…
Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
Business Risk Employee &  customer  privacy Legislative violations Financial loss Intellectual capital Litigation Public I...
The result is!
Right Assumptions?
Security Challenges Confidentiality Integrity Availability
Threats and Risk
Risk requires… Technology Process People
Risk Matrices
Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO27...
Security = Time Protection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention  ...
A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm  S ecurity Physical A dminister ...
Security Services <ul><li>Managed Security Services </li></ul><ul><li>CCTV & Access Control </li></ul><ul><li>Security Ope...
Security Research-1 <ul><li>Remote secure data access </li></ul><ul><li>Certificate based or dynamic password technology <...
Security Research-2 <ul><li>Hackers Insight for CIO/CEO </li></ul><ul><li>Hackers Insight for Managers </li></ul><ul><li>H...
Integration Business Security Management Physical Security Management ICT Security Management
A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
Best Practices
Securing Applications
Flexible Architecture
Physical Security
Knowledge fills gaps SETA =Security Education + Training + Awareness
A5™  Security Defense in depth
Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring ...
SOC Continuous Response <ul><li>24x7x365  </li></ul><ul><li>Security monitoring </li></ul><ul><li>Managed Services </li></...
Various response types Business Availability
Implementation Process Education Standards & Best Practices Support
Partnerships
Why eSgulf? <ul><li>Integrated Methodology </li></ul><ul><li>Industry Best practices </li></ul><ul><li>Business & Risk  Fo...
Upcoming SlideShare
Loading in...5
×

Esguf Profile Short V34

1,657

Published on

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,657
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Introduce: ESGULF, partners, sponsors, yourself
  • Esguf Profile Short V34

    1. 1. E-Security Gulf Group WLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
    2. 2. Profile <ul><li>“ Leading security solutions ” </li></ul><ul><li>Strategic partner for security solutions </li></ul><ul><li>EU, GCC, Asia </li></ul><ul><li>ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX </li></ul><ul><li>Complete security portfolio </li></ul><ul><li>Physical Security </li></ul><ul><li>Homeland Security </li></ul><ul><li>Incidence Response Center </li></ul><ul><li>Managed Security Services </li></ul><ul><li>Pool > 50 security professionals </li></ul><ul><li>A 5tm Methodology </li></ul><ul><li>Time Based Security </li></ul>
    3. 3. New Technologies, Risks <ul><li>Laptops </li></ul><ul><li>Mobiles </li></ul><ul><li>Wireless </li></ul><ul><li>Bluetooth </li></ul><ul><li>PDA </li></ul><ul><li>Memory Sticks </li></ul><ul><li>Smart Card </li></ul>
    4. 4. More sophisticated Attacks
    5. 5. When Hackers grow UP?
    6. 6. Your Business @ Risk!
    7. 7. Critical resources
    8. 8. Disaster Strikes easy…
    9. 9. Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
    10. 10. Business Risk Employee & customer privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
    11. 11. The result is!
    12. 12. Right Assumptions?
    13. 13. Security Challenges Confidentiality Integrity Availability
    14. 14. Threats and Risk
    15. 15. Risk requires… Technology Process People
    16. 16. Risk Matrices
    17. 17. Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
    18. 18. Security = Time Protection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
    19. 19. A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm S ecurity Physical A dminister A pply A rchitect A ssess A wareness
    20. 20. Security Services <ul><li>Managed Security Services </li></ul><ul><li>CCTV & Access Control </li></ul><ul><li>Security Operations Center </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Incidence Response </li></ul>Administer <ul><li>Security Education Training and Awareness </li></ul><ul><li>Organizational security </li></ul><ul><li>Security Maturity </li></ul>Awareness <ul><li>Security Defense, Administration </li></ul><ul><li>PKI, VPN, Encryption </li></ul><ul><li>Biometrics, Smart Card, Access Control, Perimeter </li></ul><ul><li>Web Defacement Protection </li></ul><ul><li>Content Inspection and Management </li></ul>Apply <ul><li>Design Security Perimeter </li></ul><ul><li>Security Awareness Program </li></ul><ul><li>Policies, Standards, Procedures, Guidelines </li></ul><ul><li>Physical Protection </li></ul><ul><li>Disaster Recovery Planning </li></ul>Architect <ul><li>Vulnerability Testing </li></ul><ul><li>ISO27001 Assessment </li></ul><ul><li>Penetration Testing </li></ul><ul><li>Business Impact Assessment </li></ul><ul><li>Security Auditing </li></ul>Assess
    21. 21. Security Research-1 <ul><li>Remote secure data access </li></ul><ul><li>Certificate based or dynamic password technology </li></ul><ul><li>Transparent technology </li></ul>Secure Access <ul><li>Your portable Datacenter </li></ul><ul><li>Full Data synchronization </li></ul><ul><li>Multi-operating System Support </li></ul><ul><li>Support for full back and front office operations </li></ul><ul><li>Tactical solution for Disaster Recovery </li></ul>Disaster Recovery Box (DRB) <ul><li>Cost Effective Security Operations Center </li></ul><ul><li>Internal or Externally Managed </li></ul><ul><li>Technology Transfer </li></ul><ul><li>Distributed Architecture, Scalable, Module </li></ul><ul><li>Support for full forensic analysis </li></ul>First Defence <ul><li>Basis for Security Framework </li></ul><ul><li>Based on open Security Standards </li></ul><ul><li>Support for Time Based Security </li></ul><ul><li>Continuous Process </li></ul><ul><li>People, Process Technology Paradigm </li></ul>A 5 tm Methodology Key Features Solutions
    22. 22. Security Research-2 <ul><li>Hackers Insight for CIO/CEO </li></ul><ul><li>Hackers Insight for Managers </li></ul><ul><li>Hackers Insight for Techies </li></ul><ul><li>Hackers Insight for Wireless </li></ul><ul><li>Practical Security Workshops </li></ul><ul><li>Learn attack and countermeasure technologies </li></ul>Hackers Insight Training Series <ul><li>Managed Vulnerability Services </li></ul><ul><li>Managed Early alter Services </li></ul><ul><li>Managed Patching and Configuration Management </li></ul><ul><li>Managed Incidence Response </li></ul><ul><li>Managed Security Monitoring and Alerting </li></ul>Managed Security Services (MSS) <ul><li>Multi technology for complete Defense </li></ul><ul><li>Early warning system </li></ul><ul><li>Internal and external protection </li></ul><ul><li>Managed Service </li></ul>Phishing Alert Plus (PAP) <ul><li>Secure Hosting </li></ul><ul><li>Secure Data Vaulting </li></ul><ul><li>Complete Storage and Transmission Encryption </li></ul>Swiss Vault Key Features Solutions
    23. 23. Integration Business Security Management Physical Security Management ICT Security Management
    24. 24. A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
    25. 25. Best Practices
    26. 26. Securing Applications
    27. 27. Flexible Architecture
    28. 28. Physical Security
    29. 29. Knowledge fills gaps SETA =Security Education + Training + Awareness
    30. 30. A5™ Security Defense in depth
    31. 31. Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
    32. 32. SOC Continuous Response <ul><li>24x7x365 </li></ul><ul><li>Security monitoring </li></ul><ul><li>Managed Services </li></ul><ul><li>Automatic Alerting </li></ul><ul><li>Incidence Response </li></ul><ul><li>Vulnerability Assessment </li></ul><ul><li>Patch Management </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Integration </li></ul>
    33. 33. Various response types Business Availability
    34. 34. Implementation Process Education Standards & Best Practices Support
    35. 35. Partnerships
    36. 36. Why eSgulf? <ul><li>Integrated Methodology </li></ul><ul><li>Industry Best practices </li></ul><ul><li>Business & Risk Focus </li></ul><ul><li>Security Metrics approach </li></ul><ul><li>Security Experts </li></ul><ul><li>Proof of Concept and R&D Lab </li></ul><ul><li>Proven delivery, references </li></ul><ul><li>Cost effective solutions & services </li></ul><ul><li>Strategic Vendor Partnerships </li></ul><ul><li>24x7x365 Support </li></ul>

    ×