SlideShare a Scribd company logo
1 of 6
Download to read offline
LightSEC™
The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the
challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target
their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace.
The Internet has become the new IT
Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud.
Their remote-access employees have no offices, nor the resources for superior protection. So, businesses
are left with no other choice, but to outsource their IT security, just as they did for their IT data centers and
applications. This creates a unique opportunity for service providers to provide managed security services,
which supplement the communication services that they already provide.
ECI’s LightSEC solution enables service providers to become managed security service providers.
MANAGED SECURITY SERVICES
FOR SERVICE PROVIDERS
ECI’S LightSEC SOLUTION TAMES CYBER
SECURITY COMPLEXITY
Single platform
Consolidates delivery of security services for economical initial
deployment and ongoing operations.
All-Inclusive
Combines multiple security services to provide businesses with
comprehensive protection from cyber attacks.
Intuitive threat assessment
Aggregates all security events and network transaction anomalies on
a single dashboard, facilitating identification and response to attacks
and decreasing false negatives.
Single Point-of-contact
Interfaces with a trusted, long-standing vendor with solid expertise
best practices. This eliminates the need to deal with multiple
suppliers.
Best of breed
Integrates and leverages proven security applications from Check
Point® and other leading suppliers, for uncompromising security
assurance.
Future-ready
In-service upgrades keep pace with the evolving threat
landscape, providing you with peace of mind to do business.
Multi-tenant
A single cloud-based managed security service provider
(MSSP) threat detection system provides unrivaled
cost-effectiveness and ease of service delivery.
LightSEC ARCHITECTURE
LightSEC Cloud Solution comprises the following components
ECI’S LIGHTSEC CYBER
SECURITY SUITE
A rich set of mature and innovative security services
developed for today’s MSSP needs, encompassing active
threat mitigation as well as early warning threat detection and
prevention.
Among multiple network security functions, LightSEC
incorporates Check Point’s optimized network security
functions and provides a Next Generation Firewall,
breakthrough Intrusion Prevention System (IPS), URL
Filtering, Anti-Malware, and more.
LIGHTSEC-VTM
INTUITIVE
THREATASSESSMENTPLATFORM
A comprehensive threat assessment and management
platform that features an aggregated view of calculated
threats from the entire cyber security suite. LightSEC-V
also provides adaptive risk grading that correlates multiple
security functions, so that a CSO can allocate security
experts more effectively according to the apparent severity
level of the alert.
MERCURYTM
NFV DELIVERY
SOLUTION
Delivers security services as virtualized network functions
(VNFs) for ultimate deployment flexibility between
cloud-based and customer premise locations. Mercury
eliminates the dependency on diverse dedicated security
appliances.Using Commercial-Off-The-Shelf (COTS)
technology, Mercury is available as a standalone platform,
or as an integrated blade within the Neptune metro packet
transport system, and comes with full Management and
Orchestration (MANO) support.
For application flexibility, Mercury NFV implements
‘dynamic service function chaining’ to optimize risk
classification and adjust the chain of security functions
required to neutralize any given threat.
LightSEC CYBER SECURITY SUITE
The firewall controls all incoming and outgoing
network traffic by applying a designated set of rules.
Simultaneously, it provides multilayer protection
between trusted secure networks and non-trusted
networks, filtered by five security gates. Each security
gate supports intelligent security technologies suited to
a specific layer including, IPsec, NAT, header analysis,
user ID, data validation, full-session state management,
IP/Port/User-based ACL, and URL awareness. This
offering is part of ECI’s alliance with Check Point and
the solution implements their Next Generation Threat
Prevention for multilayer security protection.
IPsec secures IP communications by authenticating and
encrypting each IP packet of a communication session.
IPsec can protect data flows between a pair of hosts
(host-to-host), between a pair of security gateways
(network-to-network), or between a security gateway
and a host (network-to-host). It also supports
network-level peer authentication, data origin
authentication, data integrity, and data confidentiality
(encryption), plus replay protection.
Firewall
IPsec VPN
A real-time, behavioral-based attack mitigation
application that protects the organization infrastructure.
It prevents network and application downtime,
application vulnerability exploitation, malware spread,
network anomalies, information theft, and other
emerging cyber-attacks. It constitutes a world-class
security solution including Distributed Denial of Service
(DDoS) mitigation and SSL-based protection, to fully
protect applications and networks against known and
emerging network security threats. These include
denial of service attacks, DDoS attacks, internet pipe
saturation, attacks on login pages, attacks behind
CDNs, and SSL-based flood attacks. LightSEC DDoS
protection also includes:
•	 Protection without affecting legitimate traffic
•	 A comprehensive set of security modules
•	 Accuracy of inline or out-of-path (OOP) deployment
•	 Centralized attack management, monitoring, and
reporting.
DDoS protection
Provides application security and identity control. It
enables IT teams to create granular policies easily, based
on users or groups, to identify, block, or limit usage of
over 250,000 Web 2.0 applications and widgets.
Application Control
INTERNET-FACING ACTIVE THREAT MITIGATION
FUNDAMENTAL ACTIVE THREAT MITIGATION
Integrated with Application Control, URL filtering allows
unified enforcement and management of all aspects
of Web security. It provides optimized Web security
through full integration in the gateway to prevent
bypassing of external proxies; integration of policy
enforcement with Application Control for full Web and
Web 2.0 protection; and UserCheck, which empowers
and educates users on Web usage policy in real time.
URL Filtering
Anti-bot detects bot-infected machines and prevents
bot damage by blocking bot command and control
communications. Anti-virus uses virus signatures and
anomaly recognition to block malicious files at the
gateway before they can affect users. Continual updates
from ThreatCloud, the first collaborative network to
fight cybercrime, ensure the latest available protection
measures from the ever-evolving threat landscape.
Anti-Bot and Anti-Virus
Eliminates malware contained in emails and
web-downloaded documents. It removes exploitable
content (including active content and various embedded
objects) and reconstructs files using known, safe elements.
Provides comprehensive protection for the
organization’s messaging infrastructure. A
multidimensional approach delivers highly accurate
spam protection and defends organizations from a wide
variety of virus and malware threat attempts via email.
Continual updates assure interception of all threats
before they spread.
Threat Extraction
Anti-Spam and Email Security
This breach detection and remediation solution
comprises one or more network applications (physical
appliances and/or virtualized delivery) together with
software modules. These connect passively to the primary
switches of your internal network, find compromised
endpoints and stolen credentials proactively, and then
proceed to flag and remediate them. The solution works
in a three-step iterative process to identify and mitigate
attacks, as follows:
•	Detect - The application passively monitors
network traffic and profiles the behavior of each
user/endpoint. Without requiring any configuration
or signatures, it detects subtle deviations in the
network, based on analysis of network behavior and
gathered historical KPIs.
•	 Illuminate - Further investigates traffic anomalies,
automatically scans suspected traffic, and collects
host-level indicators to identify the origin of
suspicious activities. This unique network-centric
detection and analysis, augmented by cloud-based
threat intelligence, provides your security team with
actionable incidents with an extremely low false-
positive rate.
Network Anomaly Detection
EARLY WARNING THREAT DETECTION AND PREVENTION
•	 Remediate - The actionable information generated
for each breached system enables efficient triage
and remediation. The solution purposely keeps
the number of alarms (and false positives) to a low
manageable number, so that security officers can
mitigate breaches efficiently and quickly. This can be
executed early in the attack life cycle, before any real
damage is done.
Big Data Cyber Analytics detect patterns that may
indicate malicious users and trends, to prompt action
before a problem occurs. Similar to Network Anomaly
Detection traffic analysis, Big Data Cyber Analytics
analyzes information over time, including log files of
user behavior, flagged information from deep packet
inspection (DPI), and other data feeds. It employs
sophisticated big-data machine learning without
predefined rules, signatures, or heuristics.
Big Data Cyber Analytics
LightSEC-VTM
INTUITIVETHREATASSESSMENTPLATFORM
REAL-TIME THREAT MANAGEMENT FOR REAL-TIME SECURITY
Security challenges in today’s organization environment are diverse. Threats to critical systems exist in both IT and OT
(Operations Technology) environments on all protocol levels. The sheer amount of notifications, systems, and alarms cause
false positives and increases the chance of a successful breach or attack.
KEY ADVANTAGES
Unified Dashboard gathers relevant data, events, and incidents from network and security systems, and from all layers. It :
•	 Shows the ‘big picture’ by presenting an updated cyber status of your environment
•	 Delivers centralized real-time cyber reports and notifications
•	 Offers visibility from any device, including mobile phones and tablets
Aggregated Events Analysis from multiple security subsystems and cyber engines are graded into significant main alerts to:
•	 Allow drill-down and simple navigation to discover and pinpoint root causes
•	 Supply an automatic learning engine with no need for signature updates or pre-defined heuristics
•	 Provide a smooth flow of information between primary and sub-systems (on the GUI dashboard)
Calculated threats presented in a user-friendly manner
Centralized real-time view of the IT cyber security status combined with the operations network
Future-proof growth flexibility by adding/removing third-party widgets and aggregated components
LightSEC-V addresses these challenges by displaying all
critical information on a single dashboard, which enables
security managers to pinpoint the sources of attack. It provides
‘at-a-glance’ aggregated views of calculated threats from
multiple security functions and probes. LightSEC-V presents
a clear picture of all detected security threats throughout the
entire network, including production and operations networks.
The result is dependable prevention of attacks and breaches
before they cause downtime or damage.
ABOUT ECI
ECI is a global provider of ELASTIC network solutions to CSPs, utilities as well as data center operators. Along with
its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end
network management, a comprehensive cyber security solution, and a range of professional services. ECI's ELASTIC
solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of choosing a
network that can be tailor-made to their needs today – while being flexible enough to evolve with the changing needs
of tomorrow. For more information, visit us at www.ecitele.com
Contact us to discover how ECI’s holistic LightSEC solution can secure your business
Copyright©2016ECI.Allrightsreserved.Informationinthisdocumentissubjecttochangewithoutnotice.ECIassumesnoresponsibilityforanyerrorsthatmayappearinthisdocument.

More Related Content

What's hot

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management Skybox Security
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security TrainingBryan Len
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to SecurityPriyanka Aash
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Russia
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESwebhostingguy
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 

What's hot (20)

Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 

Viewers also liked

Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation SolutionsGeorge Wainblat
 
Drama genre of film
Drama genre of filmDrama genre of film
Drama genre of filmfrankieb08
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management SolutionGeorge Wainblat
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a trainGeorge Wainblat
 
Poster Compositions
Poster CompositionsPoster Compositions
Poster Compositionsfrankieb08
 
I. Bobko_Buyer-Expeditor
I. Bobko_Buyer-ExpeditorI. Bobko_Buyer-Expeditor
I. Bobko_Buyer-ExpeditorIgor Bobko
 
ACQA conference 4 November 2016
ACQA conference 4 November 2016ACQA conference 4 November 2016
ACQA conference 4 November 2016toptentips
 

Viewers also liked (12)

Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation Solutions
 
Drama genre of film
Drama genre of filmDrama genre of film
Drama genre of film
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
radarfinalADCA
radarfinalADCAradarfinalADCA
radarfinalADCA
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a train
 
Poster Compositions
Poster CompositionsPoster Compositions
Poster Compositions
 
Ekonomi regional
Ekonomi regionalEkonomi regional
Ekonomi regional
 
I. Bobko_Buyer-Expeditor
I. Bobko_Buyer-ExpeditorI. Bobko_Buyer-Expeditor
I. Bobko_Buyer-Expeditor
 
ACQA conference 4 November 2016
ACQA conference 4 November 2016ACQA conference 4 November 2016
ACQA conference 4 November 2016
 

Similar to LightSEC Enables MSSPs to Tame Cyber Security Complexity

Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with CybowallIdan Tohami
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-enLee Dalton
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptographyprosunghosh7
 

Similar to LightSEC Enables MSSPs to Tame Cyber Security Complexity (20)

Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

LightSEC Enables MSSPs to Tame Cyber Security Complexity

  • 1. LightSEC™ The Cloud and Mobility revolution, intensified by the quickly evolving threat landscape, heightens the challenge for businesses to secure their IT infrastructure. Now they must fight security threats that target their employees, applications, and other assets - not just on-premises, but throughout all of cyberspace. The Internet has become the new IT Enterprises and SMBs are migrating to off-premise data centers and most are already on the cloud. Their remote-access employees have no offices, nor the resources for superior protection. So, businesses are left with no other choice, but to outsource their IT security, just as they did for their IT data centers and applications. This creates a unique opportunity for service providers to provide managed security services, which supplement the communication services that they already provide. ECI’s LightSEC solution enables service providers to become managed security service providers. MANAGED SECURITY SERVICES FOR SERVICE PROVIDERS
  • 2. ECI’S LightSEC SOLUTION TAMES CYBER SECURITY COMPLEXITY Single platform Consolidates delivery of security services for economical initial deployment and ongoing operations. All-Inclusive Combines multiple security services to provide businesses with comprehensive protection from cyber attacks. Intuitive threat assessment Aggregates all security events and network transaction anomalies on a single dashboard, facilitating identification and response to attacks and decreasing false negatives. Single Point-of-contact Interfaces with a trusted, long-standing vendor with solid expertise best practices. This eliminates the need to deal with multiple suppliers. Best of breed Integrates and leverages proven security applications from Check Point® and other leading suppliers, for uncompromising security assurance. Future-ready In-service upgrades keep pace with the evolving threat landscape, providing you with peace of mind to do business. Multi-tenant A single cloud-based managed security service provider (MSSP) threat detection system provides unrivaled cost-effectiveness and ease of service delivery.
  • 3. LightSEC ARCHITECTURE LightSEC Cloud Solution comprises the following components ECI’S LIGHTSEC CYBER SECURITY SUITE A rich set of mature and innovative security services developed for today’s MSSP needs, encompassing active threat mitigation as well as early warning threat detection and prevention. Among multiple network security functions, LightSEC incorporates Check Point’s optimized network security functions and provides a Next Generation Firewall, breakthrough Intrusion Prevention System (IPS), URL Filtering, Anti-Malware, and more. LIGHTSEC-VTM INTUITIVE THREATASSESSMENTPLATFORM A comprehensive threat assessment and management platform that features an aggregated view of calculated threats from the entire cyber security suite. LightSEC-V also provides adaptive risk grading that correlates multiple security functions, so that a CSO can allocate security experts more effectively according to the apparent severity level of the alert. MERCURYTM NFV DELIVERY SOLUTION Delivers security services as virtualized network functions (VNFs) for ultimate deployment flexibility between cloud-based and customer premise locations. Mercury eliminates the dependency on diverse dedicated security appliances.Using Commercial-Off-The-Shelf (COTS) technology, Mercury is available as a standalone platform, or as an integrated blade within the Neptune metro packet transport system, and comes with full Management and Orchestration (MANO) support. For application flexibility, Mercury NFV implements ‘dynamic service function chaining’ to optimize risk classification and adjust the chain of security functions required to neutralize any given threat.
  • 4. LightSEC CYBER SECURITY SUITE The firewall controls all incoming and outgoing network traffic by applying a designated set of rules. Simultaneously, it provides multilayer protection between trusted secure networks and non-trusted networks, filtered by five security gates. Each security gate supports intelligent security technologies suited to a specific layer including, IPsec, NAT, header analysis, user ID, data validation, full-session state management, IP/Port/User-based ACL, and URL awareness. This offering is part of ECI’s alliance with Check Point and the solution implements their Next Generation Threat Prevention for multilayer security protection. IPsec secures IP communications by authenticating and encrypting each IP packet of a communication session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). It also supports network-level peer authentication, data origin authentication, data integrity, and data confidentiality (encryption), plus replay protection. Firewall IPsec VPN A real-time, behavioral-based attack mitigation application that protects the organization infrastructure. It prevents network and application downtime, application vulnerability exploitation, malware spread, network anomalies, information theft, and other emerging cyber-attacks. It constitutes a world-class security solution including Distributed Denial of Service (DDoS) mitigation and SSL-based protection, to fully protect applications and networks against known and emerging network security threats. These include denial of service attacks, DDoS attacks, internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks. LightSEC DDoS protection also includes: • Protection without affecting legitimate traffic • A comprehensive set of security modules • Accuracy of inline or out-of-path (OOP) deployment • Centralized attack management, monitoring, and reporting. DDoS protection Provides application security and identity control. It enables IT teams to create granular policies easily, based on users or groups, to identify, block, or limit usage of over 250,000 Web 2.0 applications and widgets. Application Control INTERNET-FACING ACTIVE THREAT MITIGATION FUNDAMENTAL ACTIVE THREAT MITIGATION Integrated with Application Control, URL filtering allows unified enforcement and management of all aspects of Web security. It provides optimized Web security through full integration in the gateway to prevent bypassing of external proxies; integration of policy enforcement with Application Control for full Web and Web 2.0 protection; and UserCheck, which empowers and educates users on Web usage policy in real time. URL Filtering
  • 5. Anti-bot detects bot-infected machines and prevents bot damage by blocking bot command and control communications. Anti-virus uses virus signatures and anomaly recognition to block malicious files at the gateway before they can affect users. Continual updates from ThreatCloud, the first collaborative network to fight cybercrime, ensure the latest available protection measures from the ever-evolving threat landscape. Anti-Bot and Anti-Virus Eliminates malware contained in emails and web-downloaded documents. It removes exploitable content (including active content and various embedded objects) and reconstructs files using known, safe elements. Provides comprehensive protection for the organization’s messaging infrastructure. A multidimensional approach delivers highly accurate spam protection and defends organizations from a wide variety of virus and malware threat attempts via email. Continual updates assure interception of all threats before they spread. Threat Extraction Anti-Spam and Email Security This breach detection and remediation solution comprises one or more network applications (physical appliances and/or virtualized delivery) together with software modules. These connect passively to the primary switches of your internal network, find compromised endpoints and stolen credentials proactively, and then proceed to flag and remediate them. The solution works in a three-step iterative process to identify and mitigate attacks, as follows: • Detect - The application passively monitors network traffic and profiles the behavior of each user/endpoint. Without requiring any configuration or signatures, it detects subtle deviations in the network, based on analysis of network behavior and gathered historical KPIs. • Illuminate - Further investigates traffic anomalies, automatically scans suspected traffic, and collects host-level indicators to identify the origin of suspicious activities. This unique network-centric detection and analysis, augmented by cloud-based threat intelligence, provides your security team with actionable incidents with an extremely low false- positive rate. Network Anomaly Detection EARLY WARNING THREAT DETECTION AND PREVENTION • Remediate - The actionable information generated for each breached system enables efficient triage and remediation. The solution purposely keeps the number of alarms (and false positives) to a low manageable number, so that security officers can mitigate breaches efficiently and quickly. This can be executed early in the attack life cycle, before any real damage is done. Big Data Cyber Analytics detect patterns that may indicate malicious users and trends, to prompt action before a problem occurs. Similar to Network Anomaly Detection traffic analysis, Big Data Cyber Analytics analyzes information over time, including log files of user behavior, flagged information from deep packet inspection (DPI), and other data feeds. It employs sophisticated big-data machine learning without predefined rules, signatures, or heuristics. Big Data Cyber Analytics
  • 6. LightSEC-VTM INTUITIVETHREATASSESSMENTPLATFORM REAL-TIME THREAT MANAGEMENT FOR REAL-TIME SECURITY Security challenges in today’s organization environment are diverse. Threats to critical systems exist in both IT and OT (Operations Technology) environments on all protocol levels. The sheer amount of notifications, systems, and alarms cause false positives and increases the chance of a successful breach or attack. KEY ADVANTAGES Unified Dashboard gathers relevant data, events, and incidents from network and security systems, and from all layers. It : • Shows the ‘big picture’ by presenting an updated cyber status of your environment • Delivers centralized real-time cyber reports and notifications • Offers visibility from any device, including mobile phones and tablets Aggregated Events Analysis from multiple security subsystems and cyber engines are graded into significant main alerts to: • Allow drill-down and simple navigation to discover and pinpoint root causes • Supply an automatic learning engine with no need for signature updates or pre-defined heuristics • Provide a smooth flow of information between primary and sub-systems (on the GUI dashboard) Calculated threats presented in a user-friendly manner Centralized real-time view of the IT cyber security status combined with the operations network Future-proof growth flexibility by adding/removing third-party widgets and aggregated components LightSEC-V addresses these challenges by displaying all critical information on a single dashboard, which enables security managers to pinpoint the sources of attack. It provides ‘at-a-glance’ aggregated views of calculated threats from multiple security functions and probes. LightSEC-V presents a clear picture of all detected security threats throughout the entire network, including production and operations networks. The result is dependable prevention of attacks and breaches before they cause downtime or damage. ABOUT ECI ECI is a global provider of ELASTIC network solutions to CSPs, utilities as well as data center operators. Along with its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end network management, a comprehensive cyber security solution, and a range of professional services. ECI's ELASTIC solutions ensure open, future-proof, and secure communications. With ECI, customers have the luxury of choosing a network that can be tailor-made to their needs today – while being flexible enough to evolve with the changing needs of tomorrow. For more information, visit us at www.ecitele.com Contact us to discover how ECI’s holistic LightSEC solution can secure your business Copyright©2016ECI.Allrightsreserved.Informationinthisdocumentissubjecttochangewithoutnotice.ECIassumesnoresponsibilityforanyerrorsthatmayappearinthisdocument.