SlideShare a Scribd company logo
Introducing AIS e-ManagedSecurity

          Powered by




1
AIS e-ManagedSecurity Defined

• AIS e-ManagedSecurity is a comprehensive
  enterprise-class, security solution consisting
  of premises and cloud-based security
  services, for protecting an organization
  across all potential attack vectors and
  fulfilling compliance requirements.




2
Why Choose AIS e-ManagedSecurity?

• Companies can easily and cost-effectively
  implement a comprehensive security strategy
  that requires minimal deployment resources.
      >>No upfront capital costs<<
• Increases the level and quality of regulatory
  compliance, along with improving a
  company's audit preparedness.




3
Why Choose AIS e-ManagedSecurity?
Single Pane of Glass
• Provides visibility to all security
  event
  data, alerts, logs, scans, and
  threat intelligence.
• There are over 100 pre-built
  dashboards including                  Clients have access to tools
                                        for real-time analysis and
  compliance specific reports.          one-click alert drill downs.
• Fully customizable to best
  meet the demands of new
  regulations and needs specific
  to their business.
4
Why Choose AIS e-ManagedSecurity?

• It is based on highly scalable hybrid
  security architecture pioneered by


    – Incorporates industry accredited standards
    – Includes flexible service levels
    – Addresses PCI, HIPAA, SOX, GLBA,
      NERC compliance requirements.



5
Why Choose AIS e-ManagedSecurity?

The AIS Emphasis on Total Solution




• AIS ProServices Experts will incorporate
  Managed Security as part of a comprehensive
  colocation, managed services and connectivity
  solution tailored to meet business and
  operational objectives.
6
Drilling Down – The Offering




7
AIS e-Managed Security Services




8
AIS e-Managed Security Services

• Firewall Management for colocation, enterprise and branch
  office includes 24x7 monitoring, patching, technical
  support, firewall rule creation, full
  troubleshooting, logging, and reporting.


Perimeter           Managed
                    Firewall


                                                 Plus




9
AIS e-Managed Security Services
• Network Intrusion Prevention Service (IPS) - combines
  monitoring, incident detection/response, logging, reporting and
  full management including signature management and tuning.
       – Offers multi-segment protection for complex network topologies.
• Vulnerability Scans proactively discovers and evaluates
  potential and confirmed security threats.
       – Can be used to audit internal and external servers, as well as
         Web applications.
       – Vulnerability and remediation management workflow are part of
         this solution.

                           Network IDS
     Network               Network IPS
                                              Vulnerability Scanning



                                                             Plus
10
AIS e-Managed Security Services

 • Log Management provides real-time
   collection, aggregation, and normalization of log
   data from network devices, servers, and security
   sensors for pre-forensic archival and compliance




                                                          Log Management
   reporting.




                                                                           Reporting Data
     – Handles all logging devices, including
       firewalls, servers, and network devices.
                                                       Plus




                                                  Plus
11
AIS e-Managed Security Services
Compliance-related include:
• Web Application Firewall (WAF) includes tuning,
  management monitoring, 24x7 support, patching and
  upgrade recommendations, reporting, and policy
  enforcement.
      – Fulfills compliance requirements



                          Host IDS           File Integrity Manager
     Host                 Host IPS         Web Application Firewall




                                                        Plus


12
AIS e-Managed Security Services
Compliance-related include:
• File Integrity Management (FIM) acts as a secondary
  layer of protection beyond anti-virus messaging and
  alerting monitoring system.
      – It ensures that key systems files are not replaced or tampered with
        without notification.
      – This service is used to help enforce security policies and compliance
        standards.


                              Host IDS             File Integrity Manager
     Host                     Host IPS           Web Application Firewall



                                                              Plus


13
AIS e-Managed Security Services
• Firewall Policy and Compliance                     Compliance
  Analysis (PCA) provides security                 Firewall Policy Mgmt
  policy configuration analysis.                   Compliance Analysis

     – Comprehensive, scalable, non-
       intrusive, easy-to-deploy and use
     – Supports the major firewall platforms in
       the enterprise market.




14
AIS e-Managed Security - Notables

• Menu-based services approach
     – Tailored to company size and compliance requirements
• Vendor Neutral
     – Can manage any existing client hardware
• Licenses & hardware bundled into subscription




15
Flexible Service Plan Levels

                                            Fully Managed
                      Co-Managed
Self-Service


Basic Support             Shared                    Full
                        Responsibility            Support


 Companies can decide what levels of security services they need




 16
Other Notables




17
Our Partner - Notable


–   Founded - 2001, HQ in San Diego CA
–   Recent Best of SaaS Winner
–   Clients - North America, Canada, Mexico, Europe, Asia
–   Industry Expertise - Financial, Healthcare, Biotech, Retail/ e-commerce,
    Hospitality, & Others




                                                                      18
Some Questions for Consideration




19
Questions to Ponder

• Regulatory:
     – Do you have regulatory compliance standards (PCI, SOX,
       GLBA/FFIEC, HIPAA) that you’re required to meet?
• Monitoring:
     – Do you have concerns about monitoring all of the
       compliance controls that you have in place?
     – Is there a possibility that your company could be non-
       compliant without realizing it (i.e. systems put in place
       may not be functioning)?




20
Questions to Ponder

• Security Alerts:
     – Do you have 24x7 Coverage for receiving and responding
       to security alerts?
• Up-to-date:
     – Are your current security tools, products, and solutions
       being tuned, maintained, patched, etc.?
     – Are they current with the latest security signatures, threat
       updates, etc.?




21
Questions to Ponder

• Attacks & How They are Handled:
     – What is your process for triaging security alerts, events,
       and potential attacks? Does this happen in real time?
       How long until an attack is identified and the response
       occurs?
     – Do you think that there are attacks on your IT
       infrastructure that go unrecognized or unnoticed?




22
Questions to Ponder

• Protection & the ROI Tradeoff:
     – Do you think that the costs associated with maintaining
       existing security products and solutions and the staff
       product expertise required to maintain and operate them
       exceed the return gained in terms of protection received or
       risk that is mitigated?




23
AIS Can Help…

• We can address your
  security concerns and…
• Look at your overall IT
  infrastructure and…
• Help devise a
  comprehensive IT solution
  that'll scale along with your
  business.



24
About American Internet Services (AIS)




                 www.americanis.net
                   866.971.2656
25
About American Internet Services (AIS)

• We are an enterprise-class data center, cloud and
  connectivity services company, with premium data
  center footprints in Los Angeles, San Diego and
  Phoenix.
   – We provide colocation, managed, and network
     services.
   – 24x7: Resources are always available when you
     need them.
   – We are privately held, backed by Seaport Capital,
     Viridian Investments, and DuPont Capital
     Management.

26

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Ujjwal 'Shanu'
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
Sam Bowne
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
Sam Bowne
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
Robert D. Williams
 
CISSP Preparation: Introduction
CISSP Preparation: IntroductionCISSP Preparation: Introduction
CISSP Preparation: Introduction
Sam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
Michael Jones, CCIE, CISSP, PMP
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
DNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized Security
DNSFilter
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous DeliveryDevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
Dag Rowe
 
Determining Scope for PCI DSS Compliance
Determining Scope for PCI DSS ComplianceDetermining Scope for PCI DSS Compliance
Determining Scope for PCI DSS Compliance
Schellman & Company
 

What's hot (14)

Network security
Network securityNetwork security
Network security
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
CISSP Preparation: Introduction
CISSP Preparation: IntroductionCISSP Preparation: Introduction
CISSP Preparation: Introduction
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
DNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized Security
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous DeliveryDevSecOps: Security and Compliance at the Speed of Continuous Delivery
DevSecOps: Security and Compliance at the Speed of Continuous Delivery
 
Determining Scope for PCI DSS Compliance
Determining Scope for PCI DSS ComplianceDetermining Scope for PCI DSS Compliance
Determining Scope for PCI DSS Compliance
 

Viewers also liked

Julie's intro to culture
Julie's intro to cultureJulie's intro to culture
Julie's intro to culture
aquinasmedia
 
Intro to culture studies 1lec
Intro to culture studies   1lecIntro to culture studies   1lec
Intro to culture studies 1lec
Surya Rane
 
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
Gregg L. Witt
 
Organizational Culture Intro
Organizational Culture IntroOrganizational Culture Intro
Organizational Culture Intro
Matthew Dyer, MLIS
 
AP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
AP Human Geography: Unit 3 - Cultural Geography: Part 1 SampleAP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
AP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
Daniel Eiland
 
Organizational culture and climate
Organizational culture and climateOrganizational culture and climate
Organizational culture and climate
niranjan nahak
 
Organizational culture
Organizational cultureOrganizational culture
Organizational culture
Taufik Bintang
 

Viewers also liked (7)

Julie's intro to culture
Julie's intro to cultureJulie's intro to culture
Julie's intro to culture
 
Intro to culture studies 1lec
Intro to culture studies   1lecIntro to culture studies   1lec
Intro to culture studies 1lec
 
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
Crouching Tumblr; Hidden Youth Culture. The Intro Guide to an Elusive Social ...
 
Organizational Culture Intro
Organizational Culture IntroOrganizational Culture Intro
Organizational Culture Intro
 
AP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
AP Human Geography: Unit 3 - Cultural Geography: Part 1 SampleAP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
AP Human Geography: Unit 3 - Cultural Geography: Part 1 Sample
 
Organizational culture and climate
Organizational culture and climateOrganizational culture and climate
Organizational culture and climate
 
Organizational culture
Organizational cultureOrganizational culture
Organizational culture
 

Similar to Overview of AIS e-ManagedSecurity

Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
Ubiquisys Small Cells
 
Cloud Computing with InduSoft
Cloud Computing with InduSoftCloud Computing with InduSoft
Cloud Computing with InduSoft
AVEVA
 
A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloud
Laurent Eschenauer
 
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
ObserveIT
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss development
bezpiecznik
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10G
Savvius, Inc
 
Getting Started with DevOps
Getting Started with DevOpsGetting Started with DevOps
Getting Started with DevOps
IBM UrbanCode Products
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Internap
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps Presentation
Stanford University
 
ObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your ServersObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT
 
Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...
ObserveIT
 
Erp b
Erp bErp b
Erp b
amitcdesai
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
Itris Automation Square
 
Ipanema
IpanemaIpanema
Ipanema
dannysmolders
 
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN TreasuryCase Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
ObserveIT
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
dynamicscom
 
The Application Development Landscape - 2011
The Application Development Landscape -  2011The Application Development Landscape -  2011
The Application Development Landscape - 2011
David Skok
 
Use case+2-0
Use case+2-0Use case+2-0
Use case+2-0
MikeSorokin
 
Yacht Charter Reservation August 2009
Yacht Charter Reservation August 2009Yacht Charter Reservation August 2009
Yacht Charter Reservation August 2009
Latitude 26
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 

Similar to Overview of AIS e-ManagedSecurity (20)

Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
 
Cloud Computing with InduSoft
Cloud Computing with InduSoftCloud Computing with InduSoft
Cloud Computing with InduSoft
 
A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloud
 
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss development
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10G
 
Getting Started with DevOps
Getting Started with DevOpsGetting Started with DevOps
Getting Started with DevOps
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps Presentation
 
ObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your ServersObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your Servers
 
Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...
 
Erp b
Erp bErp b
Erp b
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
 
Ipanema
IpanemaIpanema
Ipanema
 
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN TreasuryCase Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
Case Study - Customer Auditing and ISO 27001 Certification at BELLIN Treasury
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
 
The Application Development Landscape - 2011
The Application Development Landscape -  2011The Application Development Landscape -  2011
The Application Development Landscape - 2011
 
Use case+2-0
Use case+2-0Use case+2-0
Use case+2-0
 
Yacht Charter Reservation August 2009
Yacht Charter Reservation August 2009Yacht Charter Reservation August 2009
Yacht Charter Reservation August 2009
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 

More from AISDC

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
AISDC
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
AISDC
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
AISDC
 
Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1
AISDC
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
AISDC
 
The 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOneThe 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOne
AISDC
 
The 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOneThe 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOne
AISDC
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
AISDC
 
AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)
AISDC
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
AISDC
 

More from AISDC (10)

AIS Client Portal Overview
AIS Client Portal OverviewAIS Client Portal Overview
AIS Client Portal Overview
 
Moss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC AuditsMoss Adams SSAE 16 SOC Audits
Moss Adams SSAE 16 SOC Audits
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
 
Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1Introducing AIS BusinessCloud1
Introducing AIS BusinessCloud1
 
7 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud17 Essentials of AIS BusinessCloud1
7 Essentials of AIS BusinessCloud1
 
The 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOneThe 7 Essential Features of AIS vCloudOne
The 7 Essential Features of AIS vCloudOne
 
The 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOneThe 7 Essentials of AIS CloudOne
The 7 Essentials of AIS CloudOne
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
 
AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)AIS e-High Availability (e-HA)
AIS e-High Availability (e-HA)
 
AIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business ContinuityAIS DIsaster Recovery & Business Continuity
AIS DIsaster Recovery & Business Continuity
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 

Overview of AIS e-ManagedSecurity

  • 2. AIS e-ManagedSecurity Defined • AIS e-ManagedSecurity is a comprehensive enterprise-class, security solution consisting of premises and cloud-based security services, for protecting an organization across all potential attack vectors and fulfilling compliance requirements. 2
  • 3. Why Choose AIS e-ManagedSecurity? • Companies can easily and cost-effectively implement a comprehensive security strategy that requires minimal deployment resources. >>No upfront capital costs<< • Increases the level and quality of regulatory compliance, along with improving a company's audit preparedness. 3
  • 4. Why Choose AIS e-ManagedSecurity? Single Pane of Glass • Provides visibility to all security event data, alerts, logs, scans, and threat intelligence. • There are over 100 pre-built dashboards including Clients have access to tools for real-time analysis and compliance specific reports. one-click alert drill downs. • Fully customizable to best meet the demands of new regulations and needs specific to their business. 4
  • 5. Why Choose AIS e-ManagedSecurity? • It is based on highly scalable hybrid security architecture pioneered by – Incorporates industry accredited standards – Includes flexible service levels – Addresses PCI, HIPAA, SOX, GLBA, NERC compliance requirements. 5
  • 6. Why Choose AIS e-ManagedSecurity? The AIS Emphasis on Total Solution • AIS ProServices Experts will incorporate Managed Security as part of a comprehensive colocation, managed services and connectivity solution tailored to meet business and operational objectives. 6
  • 7. Drilling Down – The Offering 7
  • 9. AIS e-Managed Security Services • Firewall Management for colocation, enterprise and branch office includes 24x7 monitoring, patching, technical support, firewall rule creation, full troubleshooting, logging, and reporting. Perimeter Managed Firewall Plus 9
  • 10. AIS e-Managed Security Services • Network Intrusion Prevention Service (IPS) - combines monitoring, incident detection/response, logging, reporting and full management including signature management and tuning. – Offers multi-segment protection for complex network topologies. • Vulnerability Scans proactively discovers and evaluates potential and confirmed security threats. – Can be used to audit internal and external servers, as well as Web applications. – Vulnerability and remediation management workflow are part of this solution. Network IDS Network Network IPS Vulnerability Scanning Plus 10
  • 11. AIS e-Managed Security Services • Log Management provides real-time collection, aggregation, and normalization of log data from network devices, servers, and security sensors for pre-forensic archival and compliance Log Management reporting. Reporting Data – Handles all logging devices, including firewalls, servers, and network devices. Plus Plus 11
  • 12. AIS e-Managed Security Services Compliance-related include: • Web Application Firewall (WAF) includes tuning, management monitoring, 24x7 support, patching and upgrade recommendations, reporting, and policy enforcement. – Fulfills compliance requirements Host IDS File Integrity Manager Host Host IPS Web Application Firewall Plus 12
  • 13. AIS e-Managed Security Services Compliance-related include: • File Integrity Management (FIM) acts as a secondary layer of protection beyond anti-virus messaging and alerting monitoring system. – It ensures that key systems files are not replaced or tampered with without notification. – This service is used to help enforce security policies and compliance standards. Host IDS File Integrity Manager Host Host IPS Web Application Firewall Plus 13
  • 14. AIS e-Managed Security Services • Firewall Policy and Compliance Compliance Analysis (PCA) provides security  Firewall Policy Mgmt policy configuration analysis.  Compliance Analysis – Comprehensive, scalable, non- intrusive, easy-to-deploy and use – Supports the major firewall platforms in the enterprise market. 14
  • 15. AIS e-Managed Security - Notables • Menu-based services approach – Tailored to company size and compliance requirements • Vendor Neutral – Can manage any existing client hardware • Licenses & hardware bundled into subscription 15
  • 16. Flexible Service Plan Levels Fully Managed Co-Managed Self-Service Basic Support Shared Full Responsibility Support Companies can decide what levels of security services they need 16
  • 18. Our Partner - Notable – Founded - 2001, HQ in San Diego CA – Recent Best of SaaS Winner – Clients - North America, Canada, Mexico, Europe, Asia – Industry Expertise - Financial, Healthcare, Biotech, Retail/ e-commerce, Hospitality, & Others 18
  • 19. Some Questions for Consideration 19
  • 20. Questions to Ponder • Regulatory: – Do you have regulatory compliance standards (PCI, SOX, GLBA/FFIEC, HIPAA) that you’re required to meet? • Monitoring: – Do you have concerns about monitoring all of the compliance controls that you have in place? – Is there a possibility that your company could be non- compliant without realizing it (i.e. systems put in place may not be functioning)? 20
  • 21. Questions to Ponder • Security Alerts: – Do you have 24x7 Coverage for receiving and responding to security alerts? • Up-to-date: – Are your current security tools, products, and solutions being tuned, maintained, patched, etc.? – Are they current with the latest security signatures, threat updates, etc.? 21
  • 22. Questions to Ponder • Attacks & How They are Handled: – What is your process for triaging security alerts, events, and potential attacks? Does this happen in real time? How long until an attack is identified and the response occurs? – Do you think that there are attacks on your IT infrastructure that go unrecognized or unnoticed? 22
  • 23. Questions to Ponder • Protection & the ROI Tradeoff: – Do you think that the costs associated with maintaining existing security products and solutions and the staff product expertise required to maintain and operate them exceed the return gained in terms of protection received or risk that is mitigated? 23
  • 24. AIS Can Help… • We can address your security concerns and… • Look at your overall IT infrastructure and… • Help devise a comprehensive IT solution that'll scale along with your business. 24
  • 25. About American Internet Services (AIS) www.americanis.net 866.971.2656 25
  • 26. About American Internet Services (AIS) • We are an enterprise-class data center, cloud and connectivity services company, with premium data center footprints in Los Angeles, San Diego and Phoenix. – We provide colocation, managed, and network services. – 24x7: Resources are always available when you need them. – We are privately held, backed by Seaport Capital, Viridian Investments, and DuPont Capital Management. 26

Editor's Notes

  1. Flexible services levels
  2. Replace this with the following from SW
  3. Service Plan Flexibility – Get Only what you Need&gt; “Pay-as-you-Go” Licensing&gt; Change Device Quantity, type, or service level at any time&gt; Upgrade Hardware at any time if you outgrow a system