SlideShare a Scribd company logo
1 of 24
Security Management Services
Security Management ServicesOverview Chapter1	 	Security Management Challenges & Solutions Chapter2	Definition of the services Chapter3	Phases of Implementation  Chapter4 		Value added for the customer Chapter5	Customer testimonial  Chapter6	Why S&T services?
Chapter 1 Security Management Challenges & Solutions
 Security Management Services Challenges & Solutions CHALLENGES SOLUTION 24/7 reliable and professional  pro-active services for business critical environments Highly trained experts with extensive experience in the design, implementation, and administration of security solutions Remote or on site delivery of outsourcing services SLA based availability and performance   ,[object Object]
Staff skills need to be continually updated leading to high education costs.
Security logs must be continuously and pro-actively monitored.
Security incidents demand pre-planned and coordinated responses.
Proposed security policy changes must be analyzed and carried out without delay.
Security is not customer’s core business,[object Object]
 Security Management Services Service definition 24x7 system and service administration,    business as usual  monitoring, reporting, analyses and alerting  documentation and procedures Equipment, facilities and license owned by Customer  Equipment, facilities and licensing provided by S&T Firewalls Intrusion Prevention (Detection) systems Email security  Web security with application control
 Security Management Services Service definition
 Security Management Services Service definition
9 Security Management ServicesServicedefinition Consultancy  andIntegration Transition  & ImplementationServices Design & DevelopmentServices IT ServicesManagement Administration  Services Monitoring  Services Managed   Services Support & Maintenance Services Security IT Strategy “IT” Business Strategy
Security Management ServicesManaged services delivery approach 10
Chapter 3 Phases of Implementation
Security Management ServicesPhases of implementation Phase 1 Phase 2 (optional) Phase 3  Phase 4 Assesment of existing Security infrastructure  Security Design Initial Installation  Operational Management Service Transition  Definition Documentation (schemes, concepts) Project scope Configuration Integration Documentation Administration, Configuration, SLA, … (HW/SW main.) Service managed and monitored by S&T Result
 Security Management ServicesOperational Management
 Security Management ServicesOperational Management (cont.)
Security Management Services HW/SW Maintanance (Add-on service)
Security Management ServicesTechnology used and supported Firewalls	 ,[object Object]
 Check Point
 IBM Proventia MXIPS ,[object Object]
 Check Point
 IBM Proventia GXEmail and Web Security ,[object Object]

More Related Content

What's hot

Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate ManagementAppViewX
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for stephKjohnson33
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAppViewX
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overviewexpetec
 
Credit Card Processing for Small Business
Credit Card Processing for Small BusinessCredit Card Processing for Small Business
Credit Card Processing for Small BusinessMark Ginnebaugh
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Clint Walker
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffSectricity
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
PCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowPCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowBarry Shteiman
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...akquinet enterprise solutions GmbH
 
Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwellMark Capwell
 

What's hot (19)

Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for steph
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
Credit Card Processing for Small Business
Credit Card Processing for Small BusinessCredit Card Processing for Small Business
Credit Card Processing for Small Business
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT Staff
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Isms5
Isms5Isms5
Isms5
 
Isms3
Isms3Isms3
Isms3
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Network Audit
Network AuditNetwork Audit
Network Audit
 
Isms4
Isms4Isms4
Isms4
 
PCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowPCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to know
 
kapil mehandiratta_CV
kapil mehandiratta_CVkapil mehandiratta_CV
kapil mehandiratta_CV
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwell
 
SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]SAST Safe Go-Live Management for SAP authorizations [Webinar]
SAST Safe Go-Live Management for SAP authorizations [Webinar]
 
Ekran 4.1
Ekran 4.1Ekran 4.1
Ekran 4.1
 

Viewers also liked

Rock'n'roll poslovne in kadrovske strategije - izzivi implementacije
Rock'n'roll poslovne in kadrovske strategije - izzivi implementacijeRock'n'roll poslovne in kadrovske strategije - izzivi implementacije
Rock'n'roll poslovne in kadrovske strategije - izzivi implementacijeS&T GROUP
 
ORODJA SIEM
ORODJA SIEM ORODJA SIEM
ORODJA SIEM S&T GROUP
 
Logistika - Supply Chain Management
Logistika - Supply Chain ManagementLogistika - Supply Chain Management
Logistika - Supply Chain ManagementS&T GROUP
 
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...S&T GROUP
 
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...S&T GROUP
 
Outsourcing Case Studies, Marjan Posedi, S&T Slovenija
Outsourcing Case Studies, Marjan Posedi, S&T SlovenijaOutsourcing Case Studies, Marjan Posedi, S&T Slovenija
Outsourcing Case Studies, Marjan Posedi, S&T SlovenijaS&T GROUP
 
S&T Slovenija - predstavitev podjetja 2011
S&T Slovenija - predstavitev podjetja 2011S&T Slovenija - predstavitev podjetja 2011
S&T Slovenija - predstavitev podjetja 2011S&T GROUP
 
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija S&T GROUP
 
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T Slovenija
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T SlovenijaZunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T Slovenija
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T SlovenijaS&T GROUP
 
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...S&T GROUP
 
SAP EHS – Skladnost poslovnih procesov z zahtevami okolja
SAP EHS – Skladnost poslovnih procesov z zahtevami okoljaSAP EHS – Skladnost poslovnih procesov z zahtevami okolja
SAP EHS – Skladnost poslovnih procesov z zahtevami okoljaS&T GROUP
 
Izvedba napada s pomocjo socialnih omrezij
Izvedba napada s pomocjo socialnih omrezijIzvedba napada s pomocjo socialnih omrezij
Izvedba napada s pomocjo socialnih omrezijS&T GROUP
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaS&T GROUP
 
Andritz and S&T –partnership for business success
Andritz and S&T –partnership for business successAndritz and S&T –partnership for business success
Andritz and S&T –partnership for business successS&T GROUP
 

Viewers also liked (16)

Rock'n'roll poslovne in kadrovske strategije - izzivi implementacije
Rock'n'roll poslovne in kadrovske strategije - izzivi implementacijeRock'n'roll poslovne in kadrovske strategije - izzivi implementacije
Rock'n'roll poslovne in kadrovske strategije - izzivi implementacije
 
ORODJA SIEM
ORODJA SIEM ORODJA SIEM
ORODJA SIEM
 
Logistika - Supply Chain Management
Logistika - Supply Chain ManagementLogistika - Supply Chain Management
Logistika - Supply Chain Management
 
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
 
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...
Uvedba informacijskega sistema za poslovno planiranje v podjetje S&T Slovenij...
 
Outsourcing Case Studies, Marjan Posedi, S&T Slovenija
Outsourcing Case Studies, Marjan Posedi, S&T SlovenijaOutsourcing Case Studies, Marjan Posedi, S&T Slovenija
Outsourcing Case Studies, Marjan Posedi, S&T Slovenija
 
S&T Slovenija - predstavitev podjetja 2011
S&T Slovenija - predstavitev podjetja 2011S&T Slovenija - predstavitev podjetja 2011
S&T Slovenija - predstavitev podjetja 2011
 
Aurkakoak
AurkakoakAurkakoak
Aurkakoak
 
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija
Dejstva o outsourcingu in S&T-jev odgovor nanje Borut Kolmanič, S&T Slovenija
 
S&T Live
S&T LiveS&T Live
S&T Live
 
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T Slovenija
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T SlovenijaZunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T Slovenija
Zunanje izvajanje – od ideje do partnerstva, Marjan Posedi, S&T Slovenija
 
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...
Zunanje izvajanje – kako ga predstaviti nadrejenim in kako motivirati podreje...
 
SAP EHS – Skladnost poslovnih procesov z zahtevami okolja
SAP EHS – Skladnost poslovnih procesov z zahtevami okoljaSAP EHS – Skladnost poslovnih procesov z zahtevami okolja
SAP EHS – Skladnost poslovnih procesov z zahtevami okolja
 
Izvedba napada s pomocjo socialnih omrezij
Izvedba napada s pomocjo socialnih omrezijIzvedba napada s pomocjo socialnih omrezij
Izvedba napada s pomocjo socialnih omrezij
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T Slovenija
 
Andritz and S&T –partnership for business success
Andritz and S&T –partnership for business successAndritz and S&T –partnership for business success
Andritz and S&T –partnership for business success
 

Similar to Security operations services

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overviewlynotts
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services MarketingShahzad Khan
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comCGC Solutions & Services
 
EGC presentation 2016 r12
EGC presentation 2016 r12EGC presentation 2016 r12
EGC presentation 2016 r12Stephanie Gigi
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011andrewpugh
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overviewlynotts
 
GSS Infosoft Pvt Ltd
GSS Infosoft Pvt LtdGSS Infosoft Pvt Ltd
GSS Infosoft Pvt Ltdbecoder
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overviewpmurphy123
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentationprashantjky
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureYitao Cen
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilitiesshaun_raghavan
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceChristian Torres
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 

Similar to Security operations services (20)

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.com
 
EGC presentation 2016 r12
EGC presentation 2016 r12EGC presentation 2016 r12
EGC presentation 2016 r12
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
GSS Infosoft Pvt Ltd
GSS Infosoft Pvt LtdGSS Infosoft Pvt Ltd
GSS Infosoft Pvt Ltd
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentation
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-Architecture
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-service
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 

More from S&T GROUP

Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012
Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012
Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012S&T GROUP
 
Implementacija ciljnega vodenja
Implementacija ciljnega vodenjaImplementacija ciljnega vodenja
Implementacija ciljnega vodenjaS&T GROUP
 
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...S&T GROUP
 
S&T group - company presentation 2011
S&T group - company presentation 2011S&T group - company presentation 2011
S&T group - company presentation 2011S&T GROUP
 
Outsourcing success stories
Outsourcing success storiesOutsourcing success stories
Outsourcing success storiesS&T GROUP
 
Osebna izkaznica S&T Slovenija
Osebna izkaznica S&T SlovenijaOsebna izkaznica S&T Slovenija
Osebna izkaznica S&T SlovenijaS&T GROUP
 
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvo
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvoIntervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvo
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvoS&T GROUP
 
Outsourcing – case study of Connectis company, Manfred Meier, S&T
Outsourcing – case study of Connectis company, Manfred Meier, S&TOutsourcing – case study of Connectis company, Manfred Meier, S&T
Outsourcing – case study of Connectis company, Manfred Meier, S&TS&T GROUP
 

More from S&T GROUP (8)

Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012
Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012
Getting things done, Teja Breznik Alfirev HR arena, Zagreb, 18-19.september 2012
 
Implementacija ciljnega vodenja
Implementacija ciljnega vodenjaImplementacija ciljnega vodenja
Implementacija ciljnega vodenja
 
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...
Upravljanje talentima, Vedrana Simić, SAP Human Capital Management Info day, ...
 
S&T group - company presentation 2011
S&T group - company presentation 2011S&T group - company presentation 2011
S&T group - company presentation 2011
 
Outsourcing success stories
Outsourcing success storiesOutsourcing success stories
Outsourcing success stories
 
Osebna izkaznica S&T Slovenija
Osebna izkaznica S&T SlovenijaOsebna izkaznica S&T Slovenija
Osebna izkaznica S&T Slovenija
 
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvo
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvoIntervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvo
Intervju Robert Trnovec, Zunanje izvajanje storitev IT je dolgoročno partnerstvo
 
Outsourcing – case study of Connectis company, Manfred Meier, S&T
Outsourcing – case study of Connectis company, Manfred Meier, S&TOutsourcing – case study of Connectis company, Manfred Meier, S&T
Outsourcing – case study of Connectis company, Manfred Meier, S&T
 

Security operations services

  • 2. Security Management ServicesOverview Chapter1 Security Management Challenges & Solutions Chapter2 Definition of the services Chapter3 Phases of Implementation Chapter4 Value added for the customer Chapter5 Customer testimonial Chapter6 Why S&T services?
  • 3. Chapter 1 Security Management Challenges & Solutions
  • 4.
  • 5. Staff skills need to be continually updated leading to high education costs.
  • 6. Security logs must be continuously and pro-actively monitored.
  • 7. Security incidents demand pre-planned and coordinated responses.
  • 8. Proposed security policy changes must be analyzed and carried out without delay.
  • 9.
  • 10. Security Management Services Service definition 24x7 system and service administration, business as usual monitoring, reporting, analyses and alerting documentation and procedures Equipment, facilities and license owned by Customer Equipment, facilities and licensing provided by S&T Firewalls Intrusion Prevention (Detection) systems Email security Web security with application control
  • 11. Security Management Services Service definition
  • 12. Security Management Services Service definition
  • 13. 9 Security Management ServicesServicedefinition Consultancy andIntegration Transition & ImplementationServices Design & DevelopmentServices IT ServicesManagement Administration Services Monitoring Services Managed Services Support & Maintenance Services Security IT Strategy “IT” Business Strategy
  • 14. Security Management ServicesManaged services delivery approach 10
  • 15. Chapter 3 Phases of Implementation
  • 16. Security Management ServicesPhases of implementation Phase 1 Phase 2 (optional) Phase 3 Phase 4 Assesment of existing Security infrastructure Security Design Initial Installation Operational Management Service Transition Definition Documentation (schemes, concepts) Project scope Configuration Integration Documentation Administration, Configuration, SLA, … (HW/SW main.) Service managed and monitored by S&T Result
  • 17. Security Management ServicesOperational Management
  • 18. Security Management ServicesOperational Management (cont.)
  • 19. Security Management Services HW/SW Maintanance (Add-on service)
  • 20.
  • 22.
  • 24.
  • 28.
  • 29. Security Management Services Customer benefits
  • 30. Chapter 5 Customer Testimonial
  • 31. Security Management Services Description of the Customer “ The Mercator Group is one of the largest and most successful commercial chains in South-eastern Europe; it is the leading commercial chain in Slovenia and is now operating in seven markets of the region: Serbia, Croatia, Bosnia and Herzegovina, Monte Negro, Bulgaria and Albania. These are all swiftly growing markets, and with shopping malls in capitals and regional centers Mercator strives to become the first or second largest fast-moving consumer goods retailer in each market. Mercator is also an important retailer in the region in specialized technical program, clothing and sportswear. ”
  • 32. Security Management Services Customer Testimonial “ » In Mercator we rely on experts from S&T Slovenia for the administration and supervision of Firewall and networking equipment on the network perimeter in the six countries within which our company operates. S&T takes care of business as usual tasks such as management and changes to configurations as well as actively monitoring the complete operation of the system ensuring minimal downtime and the quickest possible return to operation in case of unexpected incidents causing downtime. We are very satisfied to have found in S&T Slovenia a reliable and skilled IT partner, able to provide deep technical knowledge and a complete service package « ”
  • 33. Chapter 6 Why S&T Services?
  • 34.
  • 35. No.1 consulting company in CEE region
  • 36. One of thelargest IT service provider
  • 37. Operating in 19countries withmore than 2600 professionals
  • 38.
  • 41.
  • 47.
  • 48. Information security (ISO 27001) certified processes
  • 49. Experience in the most complex IT environments
  • 51.

Editor's Notes

  1. With increasingly sophisticated security threats coming from all directions, it is important to keep pace with technological advances to counter and stay ahead of malicious influences intent on disrupting your services and business. The challenge for any IT manager is to achieve and maintain effective levels of information security, within budget, utilizing the most current industry available capabilities. Enterprise security continues to grow in complexity so often new technologies (or solutions) need to be added, which means that staff skills must be continuously updated and which can lead to higher costs.
  2. Here we emphasize the fact that IT staff have better things to do than support a wide range of security solutions. It’s best to leave such tasks to experts who will perform the task better, more efficiently and (when supported by a larger organization such as S&T) will be available around the clock, as needed.It makes little sense for any (except the largest) companies to have an electrician on the payroll 24/7, similarly it makes little sense to have a security expert on the payroll (and a routing expert, and a SAN expert, and a storage …)Companies usually require at least 10x5x2 “changes and removes” process and 24x7 availability. To provide this they must have at least 2 educated persons for security solutions. Staff skills need to be continuously updated which could lead to high education cost.
  3. Detailed explanation:Regular system administration (backups, upgrades, updates, maintenance)Regular service administration (Adds, changes and removes, business as usual)Preparation and maintaining of documentation (settings, instructions, procedures ...).
  4. Depends on existing customer environment, subscriptions, and equipment
  5. How security fits into the IT pictureDesignand/or transition and analysis services during the move to outsourcing (covering customized selection of IT components and services – indicated by arrow)Support services + monitoring + required admin services + managedinfrastructureservices(again covering a customized selection of IT components and services – indicated by arrow)
  6. An example of infrastructure monitoring and interaction between S&T and the customer.On the customer side the specifics of interaction depend on the customer Helpdesk infrastructure, level of outsourcing and the customer’s requirements. The customer may require interaction with the S&T helpdesk by it’s own helpdesk, by IT staff or by end-users.Notes on this diagram:The central component is the S&T Monitoring, Alerting and Reporting standard outsourcing component (monitors). Using this component S&T transforms reactive support services into proactive infrastructure availability services.Critical and failure alerting is usually via SMS to the Helpdesk and/or on-call outsourcing engineer. This results in callout and escalation to Level 2 product specialists as required.The interface with other customer business partners is not shown on this diagram but is also an important part of the SLA definition. For example in certain cases it may be necessary for a customer business partner to call out S&T (or S&T needs to call out a customer business partner to be able to fulfill its SLA obligations)
  7. We don’t really emphasize cost savings here. Unless we perform a lot of additional services the cost savings may not be significant. However the customer is offloading a risk and getting service level guarantees, something that they probably don’t have from internal IT.It a tried and true formula – specialization (or use of a specialized provider in this case) reduces costs and increases performance. It does not make economic sense for IT departments to have a complete complement of specialized staff as staff and training costs would be too high.There is also an element of risk management. One method of reducing risk is to transfer the risk and responsibility to a 3rd party. S&T.Staffing flexibility. We don’t emphasize staff cuts here, we talk about staff not having to be on-call, work out of hours, inflexibility with holidays etc.
  8. As a system integrator we can offer at least 2 different solutions for each service. The best solution on the marketplace is always an option with S&T – this is not the case with vendor pushed solutions.