SlideShare a Scribd company logo
1 of 22
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Complete Visibility
 Threat detection across the application stack
 Real-time asset discovery
 Comprehensive view of risks
Continuous Monitoring
 24x7 security monitoring
 Expert assisted remediation
 Faster incident response
Actionable Security Intelligence
 Near real-time incident identification
 Prioritized remediation actions
 Dedicated research to identify emerging threats
Cloud Defender: Built to deliver Security as a Service
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Webindia ActiveWatch: 24x7 Security Monitoring
24x7 Security
Availability Coverage
Expert review, investigation,
and analysis by certified
security experts
Incident response,
escalation, and
recommendations for
resolution
Continuous Security
Value Delivery
Initial tuning of data sources for
new customers
Tuning in response to changing
attacks and customer application
changes
Identification of new attack
patterns and creation of new
security content
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Webindia Onboarding and Integration
The Webindia® customer Onboarding and Integration program is a critical step
in operationalizing Webindia security solutions.
Security investments often go unused or are deployed with partial or default settings – placing businesses at risk
while never fully realizing their investments. Our security professionals ensure proper deployment, configuration,
tuning and optimization of your new Webindia® security solutions.
Every customer is assigned an Webindia onboarding project manager (OPM) to manage the entire process and
onboarding team of 20+ specialist including:
 Project Managers
 Onboarding Engineers
 NOC Technicians
 Network & System Administrators
 Security Analysts
 Product Trainers
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Leading Provider of Security & Compliance for the Cloud
Continuous
Protection
Lower Total
Costs
Deep Security
Insight
Fully managed and monitored security and compliance
solutions for cloud, hybrid, and on-premises infrastructure  Revenue: $103 M
 Growth rate: 40%
 Customers: 4,000+
 Founded: 2002
 Employees: Over 800
 Headquarters: Houston, Texas
INDUSTRY RECOGNITION and CERTIFICATIONS
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Over 4,000 Organizations Worldwide Trust Webindia
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Over 4,000 Organizations Worldwide Trust Webindia
Millions
of devices secured
Petabytes
of log data under
management
Hundreds of
Millions
of security events
correlated per month
Thousands
of incidents identified
and reviewed
per month
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Compliance without Complexity
Webindia
Solution
PCI DSS SOX HIPAA & HITECH
Webindia
Web Security
Manager™
• 6.5.d Have processes in place to protect applications
from common vulnerabilities such as injection flaws,
buffer overflows and others
• 6.6 Address new threats and vulnerabilities on an
ongoing basis by installing a web application firewall in
front of public-facing web applications.
• DS 5.10 Network Security
• AI 3.2 Infrastructure resource
protection and availability
• 164.308(a)(1) Security
Management Process
• 164.308(a)(6) Security Incident
Procedures
Webindia Log
Manager™
• 10.2 Automated audit trails
• 10.3 Capture audit trails
• 10.5 Secure logs
• 10.6 Review logs at least daily
• 10.7 Maintain logs online for three months
• 10.7 Retain audit trail for at least one year
• DS 5.5 Security Testing,
Surveillance and
Monitoring
• 164.308 (a)(1)(ii)(D) Information
System Activity Review
• 164.308 (a)(6)(i) Login Monitoring
• 164.312 (b) Audit Controls
Webindia
Threat
Manager™
• 5.1.1 Monitor zero day attacks not covered by anti-virus
• 6.2 Identify newly discovered security vulnerabilities
• 11.2 Perform network vulnerability scans quarterly by
an ASV or after any significant network change
• 11.4 Maintain IDS/IPS to monitor and alert personnel;
keep engines up to date
• DS5.9 Malicious Software
Prevention, Detection and
Correction
• DS 5.6 Security Incident
Definition
• DS 5.10 Network Security
• 164.308 (a)(1)(ii)(A) Risk
Analysis
• 164.308 (a)(1)(ii)(B) Risk
Management
• 164.308 (a)(5)(ii)(B) Protection
from Malicious Software
• 164.308 (a)(6)(iii) Response &
Reporting
Webindia Security Operations Center providing Monitoring, Protection, and Reporting
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
Scalable Threat Intel Process Delivers Relevant Content
BIG DATA
Alex Webster, Account Executive
REFERENCE
ARCHITECTURES
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Reference
VPC
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Threat Manager
VPC
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Log Manager
VPC
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Cloud Defender
(with Web Security Manager)
VPC
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Web Security Manager Premier
Single Deployment
VPC
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Web Security Manager Premier
HA Deployment
VPC
SECURING
YOUR
INFRASTRUCTU
RE WITH
WEBINDIA
Alex Webster, Account Executive
AWS – Webindia Web Security Manager Premier
Auto scaling
VPC
Alex Webster, Account Executive
ENT– Threat Manager
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
ENT– Log Manager
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
ENT– Web Security Manager
Alex Webster, Account Executive
LICENSING
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, Account Executive
 Threat Manager (IDS) & Out of Band WAF-
Number of hosts
 Log Manager- GB/day from all log sources
 In-Line WAF-Number of websites
 Cloud Insight- Number of hosts per day
How we License

More Related Content

What's hot

QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 

What's hot (20)

Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
VMUGIT UC 2013 - 03b Trend Micro
VMUGIT UC 2013 - 03b Trend MicroVMUGIT UC 2013 - 03b Trend Micro
VMUGIT UC 2013 - 03b Trend Micro
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24 webinar -  Implications when migrating to a Zero Trust modelOutpost24 webinar -  Implications when migrating to a Zero Trust model
Outpost24 webinar - Implications when migrating to a Zero Trust model
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 Webinar - Creating a sustainable application security program to dr...
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 

Similar to It Infrastructure Security - 24x7 Security Monitoring

Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15
Bilha Diaz
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungard
Cheryl Goldberg
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
TechBiz Forense Digital
 

Similar to It Infrastructure Security - 24x7 Security Monitoring (20)

AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungard
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

It Infrastructure Security - 24x7 Security Monitoring

  • 2. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Complete Visibility  Threat detection across the application stack  Real-time asset discovery  Comprehensive view of risks Continuous Monitoring  24x7 security monitoring  Expert assisted remediation  Faster incident response Actionable Security Intelligence  Near real-time incident identification  Prioritized remediation actions  Dedicated research to identify emerging threats Cloud Defender: Built to deliver Security as a Service
  • 3. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Webindia ActiveWatch: 24x7 Security Monitoring 24x7 Security Availability Coverage Expert review, investigation, and analysis by certified security experts Incident response, escalation, and recommendations for resolution Continuous Security Value Delivery Initial tuning of data sources for new customers Tuning in response to changing attacks and customer application changes Identification of new attack patterns and creation of new security content
  • 4. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Webindia Onboarding and Integration The Webindia® customer Onboarding and Integration program is a critical step in operationalizing Webindia security solutions. Security investments often go unused or are deployed with partial or default settings – placing businesses at risk while never fully realizing their investments. Our security professionals ensure proper deployment, configuration, tuning and optimization of your new Webindia® security solutions. Every customer is assigned an Webindia onboarding project manager (OPM) to manage the entire process and onboarding team of 20+ specialist including:  Project Managers  Onboarding Engineers  NOC Technicians  Network & System Administrators  Security Analysts  Product Trainers
  • 5. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Leading Provider of Security & Compliance for the Cloud Continuous Protection Lower Total Costs Deep Security Insight Fully managed and monitored security and compliance solutions for cloud, hybrid, and on-premises infrastructure  Revenue: $103 M  Growth rate: 40%  Customers: 4,000+  Founded: 2002  Employees: Over 800  Headquarters: Houston, Texas INDUSTRY RECOGNITION and CERTIFICATIONS
  • 6. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Over 4,000 Organizations Worldwide Trust Webindia
  • 7. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Over 4,000 Organizations Worldwide Trust Webindia Millions of devices secured Petabytes of log data under management Hundreds of Millions of security events correlated per month Thousands of incidents identified and reviewed per month
  • 8. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Compliance without Complexity Webindia Solution PCI DSS SOX HIPAA & HITECH Webindia Web Security Manager™ • 6.5.d Have processes in place to protect applications from common vulnerabilities such as injection flaws, buffer overflows and others • 6.6 Address new threats and vulnerabilities on an ongoing basis by installing a web application firewall in front of public-facing web applications. • DS 5.10 Network Security • AI 3.2 Infrastructure resource protection and availability • 164.308(a)(1) Security Management Process • 164.308(a)(6) Security Incident Procedures Webindia Log Manager™ • 10.2 Automated audit trails • 10.3 Capture audit trails • 10.5 Secure logs • 10.6 Review logs at least daily • 10.7 Maintain logs online for three months • 10.7 Retain audit trail for at least one year • DS 5.5 Security Testing, Surveillance and Monitoring • 164.308 (a)(1)(ii)(D) Information System Activity Review • 164.308 (a)(6)(i) Login Monitoring • 164.312 (b) Audit Controls Webindia Threat Manager™ • 5.1.1 Monitor zero day attacks not covered by anti-virus • 6.2 Identify newly discovered security vulnerabilities • 11.2 Perform network vulnerability scans quarterly by an ASV or after any significant network change • 11.4 Maintain IDS/IPS to monitor and alert personnel; keep engines up to date • DS5.9 Malicious Software Prevention, Detection and Correction • DS 5.6 Security Incident Definition • DS 5.10 Network Security • 164.308 (a)(1)(ii)(A) Risk Analysis • 164.308 (a)(1)(ii)(B) Risk Management • 164.308 (a)(5)(ii)(B) Protection from Malicious Software • 164.308 (a)(6)(iii) Response & Reporting Webindia Security Operations Center providing Monitoring, Protection, and Reporting
  • 9. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive Scalable Threat Intel Process Delivers Relevant Content BIG DATA
  • 10. Alex Webster, Account Executive REFERENCE ARCHITECTURES
  • 11. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Reference VPC
  • 12. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Threat Manager VPC
  • 13. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Log Manager VPC
  • 14. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Cloud Defender (with Web Security Manager) VPC
  • 15. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Web Security Manager Premier Single Deployment VPC
  • 16. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Web Security Manager Premier HA Deployment VPC
  • 17. SECURING YOUR INFRASTRUCTU RE WITH WEBINDIA Alex Webster, Account Executive AWS – Webindia Web Security Manager Premier Auto scaling VPC
  • 18. Alex Webster, Account Executive ENT– Threat Manager
  • 19. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive ENT– Log Manager
  • 20. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive ENT– Web Security Manager
  • 21. Alex Webster, Account Executive LICENSING
  • 22. SECURING YOUR INFRASTRUCTURE WITH WEBINDIA Alex Webster, Account Executive  Threat Manager (IDS) & Out of Band WAF- Number of hosts  Log Manager- GB/day from all log sources  In-Line WAF-Number of websites  Cloud Insight- Number of hosts per day How we License