SlideShare a Scribd company logo
Ver 4.1_Jun16
AGC Networks Limited
Cyber Security Overview
Atul Khatavkar
June 2016
Agenda
2
05
04
03
02
01
Case Study
AGC CLIENTELE
GLOBAL SECURITY OPERATIONS CENTRE
AGC PORTFOLIO
CYBER SECURITY OVERVIEW
Internet - The Powerhouse
3
Few of the Reported Breaches
4
Source: http://www.informationisbeautiful.net/
Hackers steal $10 million from a
Ukrainian bank through SWIFT
loophole
AGC Networks Corporate Overview
A Leading Global Information &
Communications Technology (ICT) Solutions
Provider, combining expertise with Best-in-Class
technology
30 Years Of Experience Across 9 geographies
Serving Over 3000 Customers Partnering
with 20+ Technology Leaders
Global HQ : Mumbai, India
US HQ : Dallas, Texas
– the Cyber Security division of
AGC Networks
• ISO/IEC 9001 and 27001:2005 certified, SOC2 Type 1
Certified
Our vision is to deliver enterprise innovation,
creating clear and measurable success for our customers
5
Customer Organization Imperatives
CFO
Imperatives
CEO
Imperatives
CIO
Imperatives
• Revenue Growth
• Superior Customer Service
• Business Efficiency
• Risk & Compliance
• Cost Reduction
• Cash Flows
• Investment Protection
• Return on Technology
Investment
• Rapid Deployment
1. Profitable
Growth
2. Customer
Experience
3. Security &
Compliance
4. Operational
Efficiencies
Key Focus Areas
6
7
Global Customer Footprint
Why Choose AGC Networks?
Experience
o AGC Networks has installed over 1 mn Unified
Communications ports, 500K data ports and 100K video end-
points worldwide. This vast experience enables AGC to design
the perfect solution for even the most complex situation
Innovation
o AGC Networks is committed to technology innovation. We
deliver solutions across multiple vendors, thereby offering and
integrating vendor-neutral, best-in-class solutions
o Our commitment is illustrated by a $3 mn investment in
building AGC’s Mumbai and Dallas-based Customer Experience
Centers (CEC) - unique facilities showcasing next generation
technologies in real application settings
8
Exposure of New Cyber Attacks
9
Cybercrime is impacting the
global economy significantly
with estimated annual losses of
up to $ 575 billion
Cyber attack on Target alone
striped banks and credit unions
of $200M
Nearly two-thirds of
organizations learn of their
breach from an external source
A typical advanced attack goes
unnoticed for nearly eight
months
Attackers are increasingly using
outsourced service providers as
a means to gain access to their
victims
While organizations have made
significant security improvements,
they have yet to keep pace with
today’s determined adversaries.
Many still rely on yesterday’s
security practices to combat
today’s threats
Technology Solutions
10
Key Features: CYBER-i
Largest and the only “Global Managed Services Partner” of
Intel Security in India
Live Feeds available on Global Threat Intelligence from Intel
Security
State-of-the-art Global Security Operations Center (G-SoC) in
Mumbai
Offering advanced services for “0” Day threat defense, active
response and integration with all Intel security partners
11
Services Portfolio
12
A team of 65+ qualified, experienced and certified cyber security professionals form the backbone of the services portfolio
Technology Portfolio
13
Managed Security Offerings
Security Incident & Event Monitoring (SIEM)
Vulnerability Assessment/Penetration Testing
Active Threat Defense- “0” Day Protection
Data Leak Prevention
Web Proxy
Intrusion Prevention System
Threat Intelligence
Active Threat Defense- Anti Virus, Active Response, TIE
Security Device Management
14
CLOUD ON PREMHYBRID
INTEL SECURITY’s MSSP of the Year 2016: CYBER-i
15
Global Threat Intelligence-Intel Security
16
Threat Intelligence- CYBER-i
17
Threat Intelligence-CYBER-i
18
Total Data :
98,818 Malicious IP’s, Domains & URL’s
IP 83,178
DOMAIN = 4,321
URL = 11,319
Malware = 3,050
Scanning Host = 6,134
Ransomware = 1,433
Phishing = 7,134
Spamming = 1,474
Malicious Host = 23,124
Defacement = 22
TOR = 6,933
Service Exploitation = 49,514
Business Challenges
A Dynamic Threat Landscape
Need to create Cyber Threat Awareness at the top level
Risk Perception and Mitigation Strategy
Investments – a must!
Technology Obsolesce – a reality!
Multiple Players with heterogeneous technologies and lack of end
to end offerings
Restricted availability of Skilled Manpower
Compliance adherence
19
MSSP - Know your probable attacker
AGC receives data from Intel Security for billions of IP
addresses and network ports, providing hundreds of
trillions of unique views, and calculates a reputation
score based on network traffic, including port,
destination, protocol, and inbound and outbound
connection requests. connections. This data helps
know your probable attacker well in advance
Protects organisations from botnets, distributed denial-of-
service (DDoS) attacks, command and control activity,
advanced persistent threats, and risky web connections.
Reduces system and network burden by blocking threats at
the network edge.
Decreases downtime and remediation costs associated with
network-based attacks.
20
Know What & How the attacker is attempting
Authentication Failed attempt
on this Device
Root user
Credentials tried
Time of Incident
21
Spam Email Traffic - Geo-location / Country
22
Understanding the attack
Remote Shell Success connection from External
IP’s by Geo location
23
Track, Correlate, End Points Risks
Events with
Virus infected
file
24
Managed Security Offerings
Threat Monitoring & Incident
Response on 24*7 Basis
Vulnerability Management
Forensic Analysis
Advanced Persistent Threats
GRC Management
Security Device Management
Firewall / IDS / IPS/ NGFW / UTM
WAF / DAM Management
25
The Mobile Wallet Engagement
Cyber Threat
Management
01
PCI DSS Consulting
02
VM & Application
Security
03
Security Solution
Deployment
04
30
Cyber Threat Management
27
Traffic from
Malicious
Sources
Proactively
Blocked
Continuous
Support for
Threat
Mitigation &
Compliance
Management
Global Security
Intelligence
Applied to Local N
etwork
CYBER-i Offering benefits
200+ Incidents
Identified
PCI DSS Certification
THE MOBILE WALLET’s PCI DSS CERTIFICATION
28
29
Customer Speak
Let’s Begin!

More Related Content

What's hot

Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
Den Reymer
 
Company presentation Servicenoew
Company presentation ServicenoewCompany presentation Servicenoew
Company presentation Servicenoew
ZeruiWei
 
NEXTGEN Cyber Security 2021
NEXTGEN Cyber Security 2021NEXTGEN Cyber Security 2021
NEXTGEN Cyber Security 2021
GabeMarzano
 
Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) Economy
Cisco Services
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoption
Suzanne Livingston
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
marina romanovich
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_Broadcom
William H. Miller, Jr.
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
BlackBerry
 
Design and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage systemDesign and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage system
IJCSEA Journal
 
Blockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every ThingBlockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every Thing
Rids Vazi
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paper
jtiblier
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
 
2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller
William H. Miller, Jr.
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
Insights success media and technology pvt ltd
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of Things
Kim Escherich
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic
Lora Berr
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IT&C Security Master Informatics Security Master
 
Mobile is the new face of business
Mobile is the new face of businessMobile is the new face of business
Mobile is the new face of business
Sybase Türkiye
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
Redington Value Distribution
 

What's hot (20)

Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Company presentation Servicenoew
Company presentation ServicenoewCompany presentation Servicenoew
Company presentation Servicenoew
 
NEXTGEN Cyber Security 2021
NEXTGEN Cyber Security 2021NEXTGEN Cyber Security 2021
NEXTGEN Cyber Security 2021
 
Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) Economy
 
If you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoptionIf you build it, will they come? Debunking the myths of social software adoption
If you build it, will they come? Debunking the myths of social software adoption
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_Broadcom
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Design and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage systemDesign and implementation of remotely managed embedded digital signage system
Design and implementation of remotely managed embedded digital signage system
 
Blockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every ThingBlockchain — The Ledger Of Every Thing
Blockchain — The Ledger Of Every Thing
 
Cisco Cloud White Paper
Cisco  Cloud  White  PaperCisco  Cloud  White  Paper
Cisco Cloud White Paper
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller2015 12 08 Evanta CIO Summit_Miller
2015 12 08 Evanta CIO Summit_Miller
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
Driving IT: Internet of Things
Driving IT: Internet of ThingsDriving IT: Internet of Things
Driving IT: Internet of Things
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
Mobile is the new face of business
Mobile is the new face of businessMobile is the new face of business
Mobile is the new face of business
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 

Viewers also liked

What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
SlideShare
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
Kapost
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
Empowered Presentations
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
Jesse Desjardins - @jessedee
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
Oneupweb
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
Content Marketing Institute
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 

Viewers also liked (7)

What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to AGC Networks Security Solutions - Cyber-i

Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
IBM Events
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
IndSightsResearchSG
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015
IBM Security
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
Didiet Kusumadihardja
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
Kenny Chia Wei Hao
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
petchphumsanit40
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
Marc Crudgington, MBA
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
Ulf Mattsson
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
Zscaler
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 

Similar to AGC Networks Security Solutions - Cyber-i (20)

Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
7 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 20157 Ways to Stay 7 Years Ahead of the Threat 2015
7 Ways to Stay 7 Years Ahead of the Threat 2015
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 

Recently uploaded

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
Web Inspire
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 

Recently uploaded (15)

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 

AGC Networks Security Solutions - Cyber-i

  • 1. Ver 4.1_Jun16 AGC Networks Limited Cyber Security Overview Atul Khatavkar June 2016
  • 2. Agenda 2 05 04 03 02 01 Case Study AGC CLIENTELE GLOBAL SECURITY OPERATIONS CENTRE AGC PORTFOLIO CYBER SECURITY OVERVIEW
  • 3. Internet - The Powerhouse 3
  • 4. Few of the Reported Breaches 4 Source: http://www.informationisbeautiful.net/ Hackers steal $10 million from a Ukrainian bank through SWIFT loophole
  • 5. AGC Networks Corporate Overview A Leading Global Information & Communications Technology (ICT) Solutions Provider, combining expertise with Best-in-Class technology 30 Years Of Experience Across 9 geographies Serving Over 3000 Customers Partnering with 20+ Technology Leaders Global HQ : Mumbai, India US HQ : Dallas, Texas – the Cyber Security division of AGC Networks • ISO/IEC 9001 and 27001:2005 certified, SOC2 Type 1 Certified Our vision is to deliver enterprise innovation, creating clear and measurable success for our customers 5
  • 6. Customer Organization Imperatives CFO Imperatives CEO Imperatives CIO Imperatives • Revenue Growth • Superior Customer Service • Business Efficiency • Risk & Compliance • Cost Reduction • Cash Flows • Investment Protection • Return on Technology Investment • Rapid Deployment 1. Profitable Growth 2. Customer Experience 3. Security & Compliance 4. Operational Efficiencies Key Focus Areas 6
  • 8. Why Choose AGC Networks? Experience o AGC Networks has installed over 1 mn Unified Communications ports, 500K data ports and 100K video end- points worldwide. This vast experience enables AGC to design the perfect solution for even the most complex situation Innovation o AGC Networks is committed to technology innovation. We deliver solutions across multiple vendors, thereby offering and integrating vendor-neutral, best-in-class solutions o Our commitment is illustrated by a $3 mn investment in building AGC’s Mumbai and Dallas-based Customer Experience Centers (CEC) - unique facilities showcasing next generation technologies in real application settings 8
  • 9. Exposure of New Cyber Attacks 9 Cybercrime is impacting the global economy significantly with estimated annual losses of up to $ 575 billion Cyber attack on Target alone striped banks and credit unions of $200M Nearly two-thirds of organizations learn of their breach from an external source A typical advanced attack goes unnoticed for nearly eight months Attackers are increasingly using outsourced service providers as a means to gain access to their victims While organizations have made significant security improvements, they have yet to keep pace with today’s determined adversaries. Many still rely on yesterday’s security practices to combat today’s threats
  • 11. Key Features: CYBER-i Largest and the only “Global Managed Services Partner” of Intel Security in India Live Feeds available on Global Threat Intelligence from Intel Security State-of-the-art Global Security Operations Center (G-SoC) in Mumbai Offering advanced services for “0” Day threat defense, active response and integration with all Intel security partners 11
  • 12. Services Portfolio 12 A team of 65+ qualified, experienced and certified cyber security professionals form the backbone of the services portfolio
  • 14. Managed Security Offerings Security Incident & Event Monitoring (SIEM) Vulnerability Assessment/Penetration Testing Active Threat Defense- “0” Day Protection Data Leak Prevention Web Proxy Intrusion Prevention System Threat Intelligence Active Threat Defense- Anti Virus, Active Response, TIE Security Device Management 14 CLOUD ON PREMHYBRID
  • 15. INTEL SECURITY’s MSSP of the Year 2016: CYBER-i 15
  • 18. Threat Intelligence-CYBER-i 18 Total Data : 98,818 Malicious IP’s, Domains & URL’s IP 83,178 DOMAIN = 4,321 URL = 11,319 Malware = 3,050 Scanning Host = 6,134 Ransomware = 1,433 Phishing = 7,134 Spamming = 1,474 Malicious Host = 23,124 Defacement = 22 TOR = 6,933 Service Exploitation = 49,514
  • 19. Business Challenges A Dynamic Threat Landscape Need to create Cyber Threat Awareness at the top level Risk Perception and Mitigation Strategy Investments – a must! Technology Obsolesce – a reality! Multiple Players with heterogeneous technologies and lack of end to end offerings Restricted availability of Skilled Manpower Compliance adherence 19
  • 20. MSSP - Know your probable attacker AGC receives data from Intel Security for billions of IP addresses and network ports, providing hundreds of trillions of unique views, and calculates a reputation score based on network traffic, including port, destination, protocol, and inbound and outbound connection requests. connections. This data helps know your probable attacker well in advance Protects organisations from botnets, distributed denial-of- service (DDoS) attacks, command and control activity, advanced persistent threats, and risky web connections. Reduces system and network burden by blocking threats at the network edge. Decreases downtime and remediation costs associated with network-based attacks. 20
  • 21. Know What & How the attacker is attempting Authentication Failed attempt on this Device Root user Credentials tried Time of Incident 21
  • 22. Spam Email Traffic - Geo-location / Country 22
  • 23. Understanding the attack Remote Shell Success connection from External IP’s by Geo location 23
  • 24. Track, Correlate, End Points Risks Events with Virus infected file 24
  • 25. Managed Security Offerings Threat Monitoring & Incident Response on 24*7 Basis Vulnerability Management Forensic Analysis Advanced Persistent Threats GRC Management Security Device Management Firewall / IDS / IPS/ NGFW / UTM WAF / DAM Management 25
  • 26. The Mobile Wallet Engagement Cyber Threat Management 01 PCI DSS Consulting 02 VM & Application Security 03 Security Solution Deployment 04 30
  • 27. Cyber Threat Management 27 Traffic from Malicious Sources Proactively Blocked Continuous Support for Threat Mitigation & Compliance Management Global Security Intelligence Applied to Local N etwork CYBER-i Offering benefits 200+ Incidents Identified
  • 28. PCI DSS Certification THE MOBILE WALLET’s PCI DSS CERTIFICATION 28