SlideShare a Scribd company logo
1 of 12
Download to read offline
Axxera Security – Product / Solutions




www.axxerainc.com
Contents


Security Market Trends


    Company Profile


      Solutions / Products - Framework


    Axxera - Product / Solutions


 Product/ Solutions Delivery
Security Market Trends

Gartner 2011 Managed Security Report –
   Managed security services called "IT management" will grow from
   about $8 billion today to $14.8 billion in 2015. Other segments, such
   as security consulting, are also expected to thrive, with consulting
   rising from $9.6 billion today to $12.1 billion in 2015.


Gartner 2011 SIEM Report –
 “In 2010, demand for SIEM remained very strong. The number of Gartner
   inquiry calls from end user clients with funded SIEM projects grew by more
   than 35% over 2009, and many vendors reported substantial increases in
   customers in 2010; however, revenue growth about 15%. Report survey in
   2010 SIEM market increased from $ 858,000,000 to $ 987,000,000, recorded a
   15% growth rate.
Axxera Solutions

Provides complete suite of Security Solutions
   1. Security – Cloud Solution
   2. Monitoring - Availability / Performance – Product &
      Cloud Solution
   3. Security - Assessment
   4. Security – Integrated SIEM
      –   Portal
      –   Console
      –   Ticketing System
      –   Correlation
      –   3rd Party Security Tool integration over 250 products
   5. Compliance
1. Cloud Security Services

Managed Security Services
      - Early Warning Protection
      - IDS/IPS Monitoring & Management
      - Firewall Monitoring & Management
      - Vulnerability Management
      - Infection Management
      - Database Security
      - Web Application
      - Log Management

Advantages –
        Dynamic Early Warning & Real-time Protection
        Prevents - SPAM, VIRUS, ZERO DAY ATTACKS
        Prevents exploits from occurring
        Centralized View – IDS. Firewall, Vulnerability, Patch
        Management, Database Security, Web Application etc
        Live & Historical Compliance Reporting
2. Cloud Security Monitoring
                                                   Services

Security/Infrastructure Management Services
 •   - Network Monitoring & Management
 •   - System Monitoring & Management
 •   - Application Monitoring & Management
 •   - Database Monitoring & Management
 •   - Synthetic Transaction Monitoring & Management
 •   - Reporting & Analysis

                Advantages –
                24x7 Pro-active Monitoring of Infrastructure
                View Impact on infrastructure during security incident
                Integration of IT monitoring toolsets
                Prevents - System or Network outages
                Centralized Portal View for reporting
                SLA management of Infrastructure Stability & Performance
3. Security Assessment

1.   - Security Assessment and Auditing - Services
2.   - Vulnerability Assessment
3.   - Security Policy & Procedures review
4.   - Penetration Testing
5.   - Forensic Services
6.   - Web Application Penetration Testing
7.   - Web Application Database Testing                 Security Policies
8.   - Onsite Professional Services
                                                Web App / DB Testing


                                        Vulnerability Assessment


                                     Security Assessment
4. Security-Integrated S I E M
                                          Solution


                      Portal

    3rd Party                     Axxera CI
      Tools
     •   McAfee                   •   Correlation
                     Ticketing           • ITIL
      • Tripwire
                                      • Sensors
    • Cyber Ark
                                      • Log Mgt
•   Tipping Point    CI Engine
                                        • Auto
        • Cisco

     • Bluecoat
                                      Ticketing
     • Imperva
                     Reporting
      Over 250
         products


                      Console
5. Central Intelligence (CI) Platform
                   One Stop Compliance Solution
                         Analytics/Reports

      PCI Compliance                         Intrusion Detection



         SOX                                              Wireless Security




ISO 27001/3
                         Central                        Infection detection
                       Intelligence

GLBA, FISMA                                               Data Security/DLP


   HIPAA Compliance                          Vulnerability Management


                        Email Security


      Central Intelligence Platform One Stop Compliance
                            Solution
Security Solutions – Delivery


                               Cloud Onsite Onsite Onsite Remote Remote
   Product / Solutions
                              Solution Product SOC  NOC    SOC    NOC


Security - Cloud Solution      Yes     Yes   Yes    Yes    Yes    Yes


Monitoring - Availability /
                               Yes     Yes   Yes    Yes    Yes    Yes
     Performance


  Security - Assessment                Yes   Yes           Yes


Security - Integrated SIEM     Yes     Yes   Yes    Yes    Yes    Yes
Organization Partners
• Integrated with today’s security organizations exchanging
  Attack & Vulnerability trends & Intelligence

More Related Content

What's hot

DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 Andris Soroka
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersAlgoSec
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 

What's hot (20)

IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 

Viewers also liked

Strategic planning 2013
Strategic planning 2013Strategic planning 2013
Strategic planning 2013robertfast
 
Recruiting Brochure
Recruiting BrochureRecruiting Brochure
Recruiting Brochurewmcdermott
 
Lenox Welcome Brochure
Lenox Welcome BrochureLenox Welcome Brochure
Lenox Welcome Brochurewmcdermott
 
Strategic Planning
Strategic PlanningStrategic Planning
Strategic Planningrobertfast
 
Mogul presentation tin q1 2013
Mogul presentation tin q1 2013Mogul presentation tin q1 2013
Mogul presentation tin q1 2013Mogul_ventures
 
Amdvision trade marketing tools 2010
Amdvision trade marketing tools 2010Amdvision trade marketing tools 2010
Amdvision trade marketing tools 2010Arno Hegemann van Loo
 
PPP for our Canadian penpals
PPP for our Canadian penpalsPPP for our Canadian penpals
PPP for our Canadian penpalssalcgra
 
Corporate Presentation December 2012
Corporate Presentation December 2012Corporate Presentation December 2012
Corporate Presentation December 2012Mogul_ventures
 
Mogul presentation june2712
Mogul presentation june2712Mogul presentation june2712
Mogul presentation june2712Mogul_ventures
 
1 Executive Overview
1 Executive Overview1 Executive Overview
1 Executive Overviewrobertfast
 
How to improve your selling at souq.com?
How to improve your selling at souq.com?How to improve your selling at souq.com?
How to improve your selling at souq.com?Ola Mohey Elden
 
Internet usage and online shopping in thailand
Internet usage and online shopping in thailandInternet usage and online shopping in thailand
Internet usage and online shopping in thailandRabin Gupta
 
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences. Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences. Marie_Estager
 
Piloter sa stratégie de référencement avec Yooda SeeUrank
Piloter sa stratégie de référencement avec Yooda SeeUrankPiloter sa stratégie de référencement avec Yooda SeeUrank
Piloter sa stratégie de référencement avec Yooda SeeUrankLionel Miraton
 

Viewers also liked (20)

Florence nightingale
Florence nightingaleFlorence nightingale
Florence nightingale
 
Consumer marketing plan extraction
Consumer marketing plan extractionConsumer marketing plan extraction
Consumer marketing plan extraction
 
Strategic planning 2013
Strategic planning 2013Strategic planning 2013
Strategic planning 2013
 
Recruiting Brochure
Recruiting BrochureRecruiting Brochure
Recruiting Brochure
 
Yourprezi.pdf1
Yourprezi.pdf1Yourprezi.pdf1
Yourprezi.pdf1
 
Lenox Welcome Brochure
Lenox Welcome BrochureLenox Welcome Brochure
Lenox Welcome Brochure
 
Strategic Planning
Strategic PlanningStrategic Planning
Strategic Planning
 
Mogul presentation tin q1 2013
Mogul presentation tin q1 2013Mogul presentation tin q1 2013
Mogul presentation tin q1 2013
 
Amdvision trade marketing tools 2010
Amdvision trade marketing tools 2010Amdvision trade marketing tools 2010
Amdvision trade marketing tools 2010
 
PPP for our Canadian penpals
PPP for our Canadian penpalsPPP for our Canadian penpals
PPP for our Canadian penpals
 
Corporate Presentation December 2012
Corporate Presentation December 2012Corporate Presentation December 2012
Corporate Presentation December 2012
 
Mogul presentation june2712
Mogul presentation june2712Mogul presentation june2712
Mogul presentation june2712
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Bulliyng
BulliyngBulliyng
Bulliyng
 
1 Executive Overview
1 Executive Overview1 Executive Overview
1 Executive Overview
 
Axxera Ppt
Axxera PptAxxera Ppt
Axxera Ppt
 
How to improve your selling at souq.com?
How to improve your selling at souq.com?How to improve your selling at souq.com?
How to improve your selling at souq.com?
 
Internet usage and online shopping in thailand
Internet usage and online shopping in thailandInternet usage and online shopping in thailand
Internet usage and online shopping in thailand
 
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences. Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
 
Piloter sa stratégie de référencement avec Yooda SeeUrank
Piloter sa stratégie de référencement avec Yooda SeeUrankPiloter sa stratégie de référencement avec Yooda SeeUrank
Piloter sa stratégie de référencement avec Yooda SeeUrank
 

Similar to Axxera Security Solutions Ver 2.0

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version Ricardo Resnik
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsSplunk
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando M. Imperiale
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESFernando M. Imperiale
 

Similar to Axxera Security Solutions Ver 2.0 (20)

Axxera
AxxeraAxxera
Axxera
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
 

Axxera Security Solutions Ver 2.0

  • 1. Axxera Security – Product / Solutions www.axxerainc.com
  • 2. Contents Security Market Trends Company Profile Solutions / Products - Framework Axxera - Product / Solutions Product/ Solutions Delivery
  • 3. Security Market Trends Gartner 2011 Managed Security Report – Managed security services called "IT management" will grow from about $8 billion today to $14.8 billion in 2015. Other segments, such as security consulting, are also expected to thrive, with consulting rising from $9.6 billion today to $12.1 billion in 2015. Gartner 2011 SIEM Report – “In 2010, demand for SIEM remained very strong. The number of Gartner inquiry calls from end user clients with funded SIEM projects grew by more than 35% over 2009, and many vendors reported substantial increases in customers in 2010; however, revenue growth about 15%. Report survey in 2010 SIEM market increased from $ 858,000,000 to $ 987,000,000, recorded a 15% growth rate.
  • 4.
  • 5. Axxera Solutions Provides complete suite of Security Solutions 1. Security – Cloud Solution 2. Monitoring - Availability / Performance – Product & Cloud Solution 3. Security - Assessment 4. Security – Integrated SIEM – Portal – Console – Ticketing System – Correlation – 3rd Party Security Tool integration over 250 products 5. Compliance
  • 6. 1. Cloud Security Services Managed Security Services - Early Warning Protection - IDS/IPS Monitoring & Management - Firewall Monitoring & Management - Vulnerability Management - Infection Management - Database Security - Web Application - Log Management Advantages – Dynamic Early Warning & Real-time Protection Prevents - SPAM, VIRUS, ZERO DAY ATTACKS Prevents exploits from occurring Centralized View – IDS. Firewall, Vulnerability, Patch Management, Database Security, Web Application etc Live & Historical Compliance Reporting
  • 7. 2. Cloud Security Monitoring Services Security/Infrastructure Management Services • - Network Monitoring & Management • - System Monitoring & Management • - Application Monitoring & Management • - Database Monitoring & Management • - Synthetic Transaction Monitoring & Management • - Reporting & Analysis Advantages – 24x7 Pro-active Monitoring of Infrastructure View Impact on infrastructure during security incident Integration of IT monitoring toolsets Prevents - System or Network outages Centralized Portal View for reporting SLA management of Infrastructure Stability & Performance
  • 8. 3. Security Assessment 1. - Security Assessment and Auditing - Services 2. - Vulnerability Assessment 3. - Security Policy & Procedures review 4. - Penetration Testing 5. - Forensic Services 6. - Web Application Penetration Testing 7. - Web Application Database Testing Security Policies 8. - Onsite Professional Services Web App / DB Testing Vulnerability Assessment Security Assessment
  • 9. 4. Security-Integrated S I E M Solution Portal 3rd Party Axxera CI Tools • McAfee • Correlation Ticketing • ITIL • Tripwire • Sensors • Cyber Ark • Log Mgt • Tipping Point CI Engine • Auto • Cisco • Bluecoat Ticketing • Imperva Reporting Over 250 products Console
  • 10. 5. Central Intelligence (CI) Platform One Stop Compliance Solution Analytics/Reports PCI Compliance Intrusion Detection SOX Wireless Security ISO 27001/3 Central Infection detection Intelligence GLBA, FISMA Data Security/DLP HIPAA Compliance Vulnerability Management Email Security Central Intelligence Platform One Stop Compliance Solution
  • 11. Security Solutions – Delivery Cloud Onsite Onsite Onsite Remote Remote Product / Solutions Solution Product SOC NOC SOC NOC Security - Cloud Solution Yes Yes Yes Yes Yes Yes Monitoring - Availability / Yes Yes Yes Yes Yes Yes Performance Security - Assessment Yes Yes Yes Security - Integrated SIEM Yes Yes Yes Yes Yes Yes
  • 12. Organization Partners • Integrated with today’s security organizations exchanging Attack & Vulnerability trends & Intelligence