Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Threat Management Services


Published on

Marlabs offers an overview of the kind of threats facing technology today and explains the service offerings that will help ensure data security at all costs.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cyber Threat Management Services

  1. 1. MarlabsCyber Threat Management Services © 2012 Marlabs Inc. Proprietary and Confidential
  2. 2. About Marlabs Steady Growth Global Footprint • Founded in 1996 • US-centric operations with seamlessly integrated onsite and • 2,000+ employees offshore teams • Consistent year-on-year revenue growth • Headquarters in Piscataway , NJ - USA • 100+ prominent blue-chip clients across a • Global delivery headquarters in Bangalore, India wide variety of verticals including • Office Locations: USA - Piscataway (NJ), Bethlehem (PA); Citibank, Barclays, T-Mobile, Toshiba, India - Bangalore, Mysore, Pune, Cochin, and Trivandrum; Toys R Us, Reliant Energy, and the Mexico - Mexico City; Canada – Toronto; Malaysia - Kuala State of New Jersey. Lumpur; Latin America Vertical Expertise Technology Solutions • Airline • Energy and Utilities • Cloud Computing • Microsoft Services • Government • Mobility • Java • Healthcare • Education • BI-Analytics • Open Source • BFSI • Retail • ERP • Media © 2012 Marlabs Inc. Proprietary and Confidential 2
  3. 3. Service Offerings Application Development and Maintenance| IT Infrastructure Services | Testing | Packaged SERVICES Implementation & Support | Product Engineering Energy Airline & Govt. BFSI Healthcare Media Education Retail Services Utilities VERTICALS TECHNOLOGY SOLUTIONS Information Security | Cloud | Mobility | BI-Analytics| Microsoft |Java | Open Source | ERP © 2012 Marlabs Inc. Proprietary and Confidential 3
  4. 4. How to Secure a Network Purchase Good Firewalls, Install and Configure Install Intrusion Detection Systems in Network and Monitor Install Intrusion Prevention Systems Device to Protect against Threats Install Anti-Virus and Malware Prevention Software Install Authentication Server to Protect against Unauthorized Entry into Networks Install Encryption Process to Maintain Integrity & Confidentiality of Data © 2012 Marlabs Inc. Proprietary and Confidential 4
  5. 5. Recent High-Profile Cyber Attacks Anonymous Hackers Take Down Justice Department Site Over Megaupload Shutdown Romney Private email: Authorities How to Protect Yourself From Hacker Attacks Probe Possible Hacking Abroad Hackers Release Private FBI Call about Hackers Is the US already Engaged in a ‘Cyber War © 2012 Marlabs Inc. Proprietary and Confidential 5
  6. 6. Security Cost to Nation © 2012 Marlabs Inc. Proprietary and Confidential 6
  7. 7. Who is Vulnerable? Banks and Internet Government Pharmaceutical Financial Service and Defense Companies Institutions Providers Agencies Contractors Every Man, to Multinational Woman & Government Corporations Child using Agencies the Internet © 2012 Marlabs Inc. Proprietary and Confidential 7
  8. 8. Data Protection in the Cyber World – It’s about Managing Risk – No 100% Security Firewalls: Can be Bypassed Authentication: Can be Guessed or Attacked IDS Device: Lots of False Positives Anti-Virus: Only as Good as Last Signature Encryption: Cracked or Can Also Be Used By Attackers © 2012 Marlabs Inc. Proprietary and Confidential 8
  9. 9. Marlabs Cyber Threat Management Service (CTMS) Methodology Experienced Leverage Holistic Security Cyber Intelligence Professionals Early Detection of Near-Real-Time Indicators and Analysis Warnings Forensically Sound Evidence © 2012 Marlabs Inc. Proprietary and Confidential 9
  10. 10. Marlabs CTMS Approach Network Surveillance - NIKSUN Cyber Security Vulnerability Incident Assessment Management Cyber Security Operations Center Holistic Security Intelligence Log Collection Incident Plan Correlation Development and Analysis Security Device Management © 2012 Marlabs Inc. Proprietary and Confidential 10
  11. 11. NIKSUN Network Surveillance Appliance – Provides Visibility Making the Unknown “Known” © 2012 Marlabs Inc. Proprietary and Confidential 11
  12. 12. NIKSUN Network Surveillance Appliance 1. Everything must be recorded 2. Everything must be organized 3. Everything must be visible In real time for preemptive detection, operational analytics, forensic analysis – all in one device © 2012 Marlabs Inc. Proprietary and Confidential 12
  13. 13. NIKSUN Network Surveillance Appliance All Incoming/Outgoing packets, flows, etc. are non- intrusively analyzed and optionally recorded -- at multi gigabit rates -- in real-time to generate pertinent metadata Enterprise-wide Metadata and analytics are immediately accessible for visibility, analysis, alarming and troubleshooting All raw packets and metadata are correlated, indexed and stored in NIKSUN’s built-in Knowledge Warehouse, creating a powerful and scalable real time source of network information The Industry’s Only Unified, Scalable and Cost-effective Holistic Security Monitoring Solution © 2012 Marlabs Inc. Proprietary and Confidential 13
  14. 14. NIKSUN Network Surveillance Appliance Core Backbone Firewall Internal Network To Internet Router Internet Gigabit Ethernet Gigabit Ethernet Router Server End User Supply Location A Chain Router Intranet B2B / B2B2C Connecton Global Network F/W Router Correlation Location B Aggregation Management © 2012 Marlabs Inc. Proprietary and Confidential 14
  15. 15. Thank YouTo learn more about how Marlabs can help you with your Cyber Security challenges, please call us at732.694.1000 or write to us at © 2012 Marlabs Inc. Proprietary and Confidential 15