SlideShare a Scribd company logo
1 of 10
Download to read offline
Icon Secure
Securing your digital business
Your challenges
Gain more
control to
enforce
policies in
accordance
to regulations
Spend less
time
managing
multiple
partners
Defend the
organisation
against
multiple
vector
attacks
Adjust spend
in
accordance
to business
risk
Benefit from
more visibility
to manage
accurate
security KPIs
© Maintel | Private & Confidential
Icon Secure – Our approach
Network
Security
Platform
Visibility &
Control
Toolset
Security
Operations
Centre
Accredited
Security
Governance
© Maintel | Private & Confidential
Internet connectivity centrally secured for 300+ locations and 1200+ users
 Full end-to-end resilient secure internet service provided in each location
 Managed security services enabled
 Next gen. firewall
 Antivirus
 Antispam
 IPS
 Web filtering & Application Control
A fantastic customer example: Victim Support
© Maintel | Private & Confidential
Branch Offices Icon SecureIcon Connect
Icon Secure – Why should you care?
Business outcomes
Reduce
Threat Exposure
Multi-layered Security
Prevent data theft
& Security breaches
Improve
Productivity
Data driven Security
Enforce various security
policies per groups
Gain better
visibility & control
Self-service portal
Policy enforcement
Board level Security KPIs
Features Benefits
Benefit from
an Emergency
Response Team
In-house & UK based
Security Operations Centre
24x7x365 operations with
ongoing monitoring
& proactive alerting
Compliance
& Risk
State-of-the-art security GDPR and NIST compliancy
© Maintel | Private & Confidential
Icon Secure – Why we’re different
© Maintel | Private & Confidential
 Broad scope of services
 Easy to add services and easy to scale
 Flexible delivery mode, Icon based service
 Hosted & Managed,
 Security as a Service, flexible
 Gain better visibility and control with the self-service portal
 Configure and enforce policies
 Produce your personalised security dashboard with board level KPIs
 Buy what you need when you need it
 Cost effective offering
 Actionable services
Security Delivery Visibility & Control Optimized & predictable
Next steps – Ask for your FREE Cyber-Threat Assessment
© Maintel | Private & Confidential
Know Your Vulnerabilities – Get the Facts About Your Network Security
A Maintel Cyber Threat Assessment can help you better understand
- Security & threat protection
- User productivity
- Network utilization & performance
QUICK
Less than 1 month
of monitoring
EASY
No interruption to
your infrastructure
FREE
Refunded as soon as you
switch to Icon Secure
Take a pragmatic approach to Network Security
“Midsize Organizations Should Consider Managed
Security Service Providers (MSSPs) to Augment or
Replace the DIY Model”
© Maintel | Private & Confidential
Thank you
10
Jean-Frederic Karcher
Tel: 077 0381 9292
Email: jean-frederic.karcher@maintel.co.uk
160 Blackfriars Road, London, SE1 8EZ

More Related Content

What's hot

Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader pptBimadRajSinha1
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Saas and cloud compliance
Saas and cloud complianceSaas and cloud compliance
Saas and cloud complianceMerryman System
 
Introducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partnerIntroducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partnerRicky Homem
 
Tufin overview brochure 2013
Tufin overview brochure 2013Tufin overview brochure 2013
Tufin overview brochure 2013Errol Jayawardene
 
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Business Cable Collaboration Group
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy managementAlgoSec
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challengewebhostingguy
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overviewbmiller144
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksThibault Cantegrel
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor NeutralityVandana Verma
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemNetIQ
 
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...LogMeIn
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Why Go Managed?
Why Go Managed?Why Go Managed?
Why Go Managed?Layeredi
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAppViewX
 

What's hot (20)

Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Saas and cloud compliance
Saas and cloud complianceSaas and cloud compliance
Saas and cloud compliance
 
Introducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partnerIntroducing S.A.M.S Connecting the Dots – your SMART technology partner
Introducing S.A.M.S Connecting the Dots – your SMART technology partner
 
Tufin overview brochure 2013
Tufin overview brochure 2013Tufin overview brochure 2013
Tufin overview brochure 2013
 
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
August 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The ChallengeAugust 2007 Presentation Flow Part A – The Challenge
August 2007 Presentation Flow Part A – The Challenge
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overview
 
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocksSierra Wireless Developer Day 2013 - 05 - Essential building blocks
Sierra Wireless Developer Day 2013 - 05 - Essential building blocks
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid Them
 
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...
[CASE STUDY] LOGMEIN CENTRAL EASES CONTROL AND CUSTOMER SUPPORT FOR AUTOMATED...
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Automated matching
Automated matchingAutomated matching
Automated matching
 
Why Go Managed?
Why Go Managed?Why Go Managed?
Why Go Managed?
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
 

Viewers also liked

Media Mentor Training Overview
Media Mentor Training OverviewMedia Mentor Training Overview
Media Mentor Training OverviewAnnamarie Carlson
 
Eng102 spring assignments
Eng102 spring assignmentsEng102 spring assignments
Eng102 spring assignmentsMichael Olausen
 
Play with No Plot Reader's Theater Script
Play with No Plot Reader's Theater ScriptPlay with No Plot Reader's Theater Script
Play with No Plot Reader's Theater ScriptAnnamarie Carlson
 
Goldilocks and the Three Dinosaurs Reader's Theater Script
Goldilocks and the Three Dinosaurs Reader's Theater ScriptGoldilocks and the Three Dinosaurs Reader's Theater Script
Goldilocks and the Three Dinosaurs Reader's Theater ScriptAnnamarie Carlson
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016Saiful Islam
 

Viewers also liked (9)

Media Mentor Training Overview
Media Mentor Training OverviewMedia Mentor Training Overview
Media Mentor Training Overview
 
Eng102 spring assignments
Eng102 spring assignmentsEng102 spring assignments
Eng102 spring assignments
 
Mohammad Al Nsour CV
Mohammad Al Nsour CVMohammad Al Nsour CV
Mohammad Al Nsour CV
 
Play with No Plot Reader's Theater Script
Play with No Plot Reader's Theater ScriptPlay with No Plot Reader's Theater Script
Play with No Plot Reader's Theater Script
 
2016-12-12 Amsterdam editie Noord
2016-12-12 Amsterdam editie Noord2016-12-12 Amsterdam editie Noord
2016-12-12 Amsterdam editie Noord
 
Goldilocks and the Three Dinosaurs Reader's Theater Script
Goldilocks and the Three Dinosaurs Reader's Theater ScriptGoldilocks and the Three Dinosaurs Reader's Theater Script
Goldilocks and the Three Dinosaurs Reader's Theater Script
 
Resume
ResumeResume
Resume
 
Good CBC Morphological AssessmentPDF
Good CBC Morphological AssessmentPDFGood CBC Morphological AssessmentPDF
Good CBC Morphological AssessmentPDF
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
 

Similar to Icon Secure by Maintel

Comprehensive Cloud Security Services.pdf
Comprehensive Cloud Security Services.pdfComprehensive Cloud Security Services.pdf
Comprehensive Cloud Security Services.pdfunicloudm
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comCGC Solutions & Services
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall ServiceSecureData Europe
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Servicesbeckyjacobs
 
Cloud
CloudCloud
CloudNone
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentationDonnie Eib
 
EXL - Global Risk Privacy Framework
EXL -  Global Risk Privacy FrameworkEXL -  Global Risk Privacy Framework
EXL - Global Risk Privacy FrameworkAshish Kumar
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 

Similar to Icon Secure by Maintel (20)

Comprehensive Cloud Security Services.pdf
Comprehensive Cloud Security Services.pdfComprehensive Cloud Security Services.pdf
Comprehensive Cloud Security Services.pdf
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Security Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.comSecurity Consulting and Management by CGC - www.cgcsas.com
Security Consulting and Management by CGC - www.cgcsas.com
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Services
 
Cloud
CloudCloud
Cloud
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentation
 
EXL - Global Risk Privacy Framework
EXL -  Global Risk Privacy FrameworkEXL -  Global Risk Privacy Framework
EXL - Global Risk Privacy Framework
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Security
SecuritySecurity
Security
 

Icon Secure by Maintel

  • 1. Icon Secure Securing your digital business
  • 2. Your challenges Gain more control to enforce policies in accordance to regulations Spend less time managing multiple partners Defend the organisation against multiple vector attacks Adjust spend in accordance to business risk Benefit from more visibility to manage accurate security KPIs © Maintel | Private & Confidential
  • 3. Icon Secure – Our approach Network Security Platform Visibility & Control Toolset Security Operations Centre Accredited Security Governance © Maintel | Private & Confidential
  • 4. Internet connectivity centrally secured for 300+ locations and 1200+ users  Full end-to-end resilient secure internet service provided in each location  Managed security services enabled  Next gen. firewall  Antivirus  Antispam  IPS  Web filtering & Application Control A fantastic customer example: Victim Support © Maintel | Private & Confidential Branch Offices Icon SecureIcon Connect
  • 5. Icon Secure – Why should you care? Business outcomes Reduce Threat Exposure Multi-layered Security Prevent data theft & Security breaches Improve Productivity Data driven Security Enforce various security policies per groups Gain better visibility & control Self-service portal Policy enforcement Board level Security KPIs Features Benefits Benefit from an Emergency Response Team In-house & UK based Security Operations Centre 24x7x365 operations with ongoing monitoring & proactive alerting Compliance & Risk State-of-the-art security GDPR and NIST compliancy © Maintel | Private & Confidential
  • 6. Icon Secure – Why we’re different © Maintel | Private & Confidential  Broad scope of services  Easy to add services and easy to scale  Flexible delivery mode, Icon based service  Hosted & Managed,  Security as a Service, flexible  Gain better visibility and control with the self-service portal  Configure and enforce policies  Produce your personalised security dashboard with board level KPIs  Buy what you need when you need it  Cost effective offering  Actionable services Security Delivery Visibility & Control Optimized & predictable
  • 7. Next steps – Ask for your FREE Cyber-Threat Assessment © Maintel | Private & Confidential Know Your Vulnerabilities – Get the Facts About Your Network Security A Maintel Cyber Threat Assessment can help you better understand - Security & threat protection - User productivity - Network utilization & performance QUICK Less than 1 month of monitoring EASY No interruption to your infrastructure FREE Refunded as soon as you switch to Icon Secure
  • 8.
  • 9. Take a pragmatic approach to Network Security “Midsize Organizations Should Consider Managed Security Service Providers (MSSPs) to Augment or Replace the DIY Model” © Maintel | Private & Confidential
  • 10. Thank you 10 Jean-Frederic Karcher Tel: 077 0381 9292 Email: jean-frederic.karcher@maintel.co.uk 160 Blackfriars Road, London, SE1 8EZ