Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Esguf Profile Short V34


Published on

Introduction to E-Security Gulf Group - eSgulf, profile of services, solutions, approach to information, home land, and physical security protection

Published in: Business, Technology
  • Be the first to comment

Esguf Profile Short V34

  1. 1. E-Security Gulf Group WLL Corporate Profile [email_address]
  2. 2. Profile <ul><li>“ Leading security solutions ” </li></ul><ul><li>Strategic partner for security solutions </li></ul><ul><li>EU, GCC, Asia </li></ul><ul><li>ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX </li></ul><ul><li>Complete security portfolio </li></ul><ul><li>Physical Security </li></ul><ul><li>Homeland Security </li></ul><ul><li>Incidence Response Center </li></ul><ul><li>Managed Security Services </li></ul><ul><li>Pool > 50 security professionals </li></ul><ul><li>A 5tm Methodology </li></ul><ul><li>Time Based Security </li></ul>
  3. 3. New Technologies, Risks <ul><li>Laptops </li></ul><ul><li>Mobiles </li></ul><ul><li>Wireless </li></ul><ul><li>Bluetooth </li></ul><ul><li>PDA </li></ul><ul><li>Memory Sticks </li></ul><ul><li>Smart Card </li></ul>
  4. 4. More sophisticated Attacks
  5. 5. When Hackers grow UP?
  6. 6. Your Business @ Risk!
  7. 7. Critical resources
  8. 8. Disaster Strikes easy…
  9. 9. Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
  10. 10. Business Risk Employee & customer privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
  11. 11. The result is!
  12. 12. Right Assumptions?
  13. 13. Security Challenges Confidentiality Integrity Availability
  14. 14. Threats and Risk
  15. 15. Risk requires… Technology Process People
  16. 16. Risk Matrices
  17. 17. Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
  18. 18. Security = Time Protection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
  19. 19. A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm S ecurity Physical A dminister A pply A rchitect A ssess A wareness
  20. 20. Security Services <ul><li>Managed Security Services </li></ul><ul><li>CCTV & Access Control </li></ul><ul><li>Security Operations Center </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Incidence Response </li></ul>Administer <ul><li>Security Education Training and Awareness </li></ul><ul><li>Organizational security </li></ul><ul><li>Security Maturity </li></ul>Awareness <ul><li>Security Defense, Administration </li></ul><ul><li>PKI, VPN, Encryption </li></ul><ul><li>Biometrics, Smart Card, Access Control, Perimeter </li></ul><ul><li>Web Defacement Protection </li></ul><ul><li>Content Inspection and Management </li></ul>Apply <ul><li>Design Security Perimeter </li></ul><ul><li>Security Awareness Program </li></ul><ul><li>Policies, Standards, Procedures, Guidelines </li></ul><ul><li>Physical Protection </li></ul><ul><li>Disaster Recovery Planning </li></ul>Architect <ul><li>Vulnerability Testing </li></ul><ul><li>ISO27001 Assessment </li></ul><ul><li>Penetration Testing </li></ul><ul><li>Business Impact Assessment </li></ul><ul><li>Security Auditing </li></ul>Assess
  21. 21. Security Research-1 <ul><li>Remote secure data access </li></ul><ul><li>Certificate based or dynamic password technology </li></ul><ul><li>Transparent technology </li></ul>Secure Access <ul><li>Your portable Datacenter </li></ul><ul><li>Full Data synchronization </li></ul><ul><li>Multi-operating System Support </li></ul><ul><li>Support for full back and front office operations </li></ul><ul><li>Tactical solution for Disaster Recovery </li></ul>Disaster Recovery Box (DRB) <ul><li>Cost Effective Security Operations Center </li></ul><ul><li>Internal or Externally Managed </li></ul><ul><li>Technology Transfer </li></ul><ul><li>Distributed Architecture, Scalable, Module </li></ul><ul><li>Support for full forensic analysis </li></ul>First Defence <ul><li>Basis for Security Framework </li></ul><ul><li>Based on open Security Standards </li></ul><ul><li>Support for Time Based Security </li></ul><ul><li>Continuous Process </li></ul><ul><li>People, Process Technology Paradigm </li></ul>A 5 tm Methodology Key Features Solutions
  22. 22. Security Research-2 <ul><li>Hackers Insight for CIO/CEO </li></ul><ul><li>Hackers Insight for Managers </li></ul><ul><li>Hackers Insight for Techies </li></ul><ul><li>Hackers Insight for Wireless </li></ul><ul><li>Practical Security Workshops </li></ul><ul><li>Learn attack and countermeasure technologies </li></ul>Hackers Insight Training Series <ul><li>Managed Vulnerability Services </li></ul><ul><li>Managed Early alter Services </li></ul><ul><li>Managed Patching and Configuration Management </li></ul><ul><li>Managed Incidence Response </li></ul><ul><li>Managed Security Monitoring and Alerting </li></ul>Managed Security Services (MSS) <ul><li>Multi technology for complete Defense </li></ul><ul><li>Early warning system </li></ul><ul><li>Internal and external protection </li></ul><ul><li>Managed Service </li></ul>Phishing Alert Plus (PAP) <ul><li>Secure Hosting </li></ul><ul><li>Secure Data Vaulting </li></ul><ul><li>Complete Storage and Transmission Encryption </li></ul>Swiss Vault Key Features Solutions
  23. 23. Integration Business Security Management Physical Security Management ICT Security Management
  24. 24. A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
  25. 25. Best Practices
  26. 26. Securing Applications
  27. 27. Flexible Architecture
  28. 28. Physical Security
  29. 29. Knowledge fills gaps SETA =Security Education + Training + Awareness
  30. 30. A5™ Security Defense in depth
  31. 31. Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
  32. 32. SOC Continuous Response <ul><li>24x7x365 </li></ul><ul><li>Security monitoring </li></ul><ul><li>Managed Services </li></ul><ul><li>Automatic Alerting </li></ul><ul><li>Incidence Response </li></ul><ul><li>Vulnerability Assessment </li></ul><ul><li>Patch Management </li></ul><ul><li>Forensic Analysis </li></ul><ul><li>Integration </li></ul>
  33. 33. Various response types Business Availability
  34. 34. Implementation Process Education Standards & Best Practices Support
  35. 35. Partnerships
  36. 36. Why eSgulf? <ul><li>Integrated Methodology </li></ul><ul><li>Industry Best practices </li></ul><ul><li>Business & Risk Focus </li></ul><ul><li>Security Metrics approach </li></ul><ul><li>Security Experts </li></ul><ul><li>Proof of Concept and R&D Lab </li></ul><ul><li>Proven delivery, references </li></ul><ul><li>Cost effective solutions & services </li></ul><ul><li>Strategic Vendor Partnerships </li></ul><ul><li>24x7x365 Support </li></ul>