SlideShare a Scribd company logo
C180 Security Service




Chameleon Secure Solutions (Pty) Ltd • Reg. No. 2007/032120/07 • Vat No. 4300244029
          (o) 011 463 8035 • (f) 086 608 6668 • (w) www.chameleon-ss.com
    Bridgeport House • Hampton Park North • 20 Georgian Crescent • Bryanston
           Directors • Reinhard Behrens • Christo Boshoff • Possey Mina
Chameleon Secure Solutions C90 Security Appliance                                                                  Confidential




1. Overview
C180 is a 24/7 log file monitoring and reporting solution providing:
   Automated log file interrogation and reporting
   Alerting on critical events
   Storage of categorized and classified log files
   Consultancy in respect of issues arising from any of the above



2. The Chameleon Secure Solutions C180 Service Provides:
   Log file storage and collection from all devices in an environment
   Log file categorization, classification and reporting
   The ability to identify security issues in an environment
   The ability to distinguish between real security alerts and alerts that do not actually impact your environment
   The ability to identify issues within an environment that consume resources like bandwidth and processing capacity
    that are the result of incorrect configurations and security policies
   A historic audit trail to track security events and breaches
   The ability to identify specific areas of the environment that requires investigation and or remediation (Security Hot
    Spots)
   An automated meaningful process for handling the critical information gathered in log files that is impossible to
    manage manually
   Analyses and categorization of events we enable the prioritization of areas and issues that needs to be addressed
   A view of the health of an environment in respect of its security, based on the quantity and severity of events that
    occur
   Monitor and track the remediation process against an SLA




3. Value Derived From the Service

3.1 Control
   Of who has access to the information within your environment
   Of the environment in respect of security events that occur on an ongoing basis
   To identify and prioritize areas that require remediation
   To measure your environment in respect of improvement or lack thereof



3.2 Cost
   Operational costs are reduced in respect of product purchasing and training due to the implementation of one
    comprehensive solution
   High local content – not dependant on exchange rate
   Reduces the cost to identify issues within an environment
   Access to expensive skills that are not cost effective on a full time basis
   We enable the better protection in respect to liability as a result of information loss and misuse.
   We enable you to litigate in the event of information loss or misuse



3.3 Performance
   Shortened lead time to identifying where and what needs fixing
   Shortened lead time to identify the effectiveness of remediation efforts
   By identifying and fixing mis-configurations we free up resources like bandwidth and processing power for real
    business use


                                                            2 of 3
Chameleon Secure Solutions C90 Security Appliance                                 Confidential




3.4 Quality
   Improve quality of the governance of the IT environment
   Improve the quality of the protection of information within an organization




                                                        3 of 3

More Related Content

What's hot

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
JED Consulting Services LLC
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
Arrow ECS UK
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
ControlCase
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
Daniel Suchy, CPP, MSyI
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management Migraines
AlgoSec
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
Maganathin Veeraragaloo
 
Password policy template
Password policy templatePassword policy template
Password policy template
Jayaramachandran Rajendran
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
honeywellgf
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
VISTA InfoSec
 
SPS Enterprise Family
SPS Enterprise FamilySPS Enterprise Family
SPS Enterprise Family
Symantec
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
Desmond Devendran
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
Hernan Huwyler, MBA CPA
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
Donald E. Hester
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
Symantec
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
Tripwire
 

What's hot (20)

Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management Migraines
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Password policy template
Password policy templatePassword policy template
Password policy template
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
SPS Enterprise Family
SPS Enterprise FamilySPS Enterprise Family
SPS Enterprise Family
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
 

Viewers also liked

Chameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview PresentationChameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview Presentation
christoboshoff
 
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
Robert Michael Murray
 
Introduction to widgets
Introduction to widgetsIntroduction to widgets
Introduction to widgets
Thomas Robbins
 
C90 Security Service
C90 Security ServiceC90 Security Service
C90 Security Service
christoboshoff
 
Chameleon PCI Presentation
Chameleon PCI PresentationChameleon PCI Presentation
Chameleon PCI Presentation
christoboshoff
 
Harnessing the content beast – Content marketing in the multiscreen world
Harnessing the content beast – Content marketing in the multiscreen worldHarnessing the content beast – Content marketing in the multiscreen world
Harnessing the content beast – Content marketing in the multiscreen world
Thomas Robbins
 
Using MCollective with Chef - cfgmgmtcamp.eu 2014
Using MCollective with Chef - cfgmgmtcamp.eu 2014Using MCollective with Chef - cfgmgmtcamp.eu 2014
Using MCollective with Chef - cfgmgmtcamp.eu 2014
Zachary Stevens
 
Methodology For Formulation And Appraisal of a Project
Methodology For Formulation And Appraisal of a ProjectMethodology For Formulation And Appraisal of a Project
Methodology For Formulation And Appraisal of a Project
imrohan1
 

Viewers also liked (8)

Chameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview PresentationChameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview Presentation
 
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
VISUAL STORYTELLING: From Kittehs to Selfies Creating Value with Photos in th...
 
Introduction to widgets
Introduction to widgetsIntroduction to widgets
Introduction to widgets
 
C90 Security Service
C90 Security ServiceC90 Security Service
C90 Security Service
 
Chameleon PCI Presentation
Chameleon PCI PresentationChameleon PCI Presentation
Chameleon PCI Presentation
 
Harnessing the content beast – Content marketing in the multiscreen world
Harnessing the content beast – Content marketing in the multiscreen worldHarnessing the content beast – Content marketing in the multiscreen world
Harnessing the content beast – Content marketing in the multiscreen world
 
Using MCollective with Chef - cfgmgmtcamp.eu 2014
Using MCollective with Chef - cfgmgmtcamp.eu 2014Using MCollective with Chef - cfgmgmtcamp.eu 2014
Using MCollective with Chef - cfgmgmtcamp.eu 2014
 
Methodology For Formulation And Appraisal of a Project
Methodology For Formulation And Appraisal of a ProjectMethodology For Formulation And Appraisal of a Project
Methodology For Formulation And Appraisal of a Project
 

Similar to C180 Security Service

Information Security
Information SecurityInformation Security
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
NetIQ
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
ThomasBronack
 
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
ThomasBronack
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
Enterprise Technology Management (ETM)
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
IT Security and Risk Management
IT Security and Risk ManagementIT Security and Risk Management
IT Security and Risk Management
ARNOOSH
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
Michael Nickle
 
AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docx
daniahendric
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
Secure Architecture and Incident Management for E-Business
Secure Architecture and Incident Management for E-BusinessSecure Architecture and Incident Management for E-Business
Secure Architecture and Incident Management for E-Business
Marc S. Sokol
 
Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
Tufin
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 

Similar to C180 Security Service (20)

Information Security
Information SecurityInformation Security
Information Security
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
 
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
IT Security and Risk Management
IT Security and Risk ManagementIT Security and Risk Management
IT Security and Risk Management
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docx
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
Secure Architecture and Incident Management for E-Business
Secure Architecture and Incident Management for E-BusinessSecure Architecture and Incident Management for E-Business
Secure Architecture and Incident Management for E-Business
 
Data Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in CybersecurityData Con LA 2022 - The Evolution of AI in Cybersecurity
Data Con LA 2022 - The Evolution of AI in Cybersecurity
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 

C180 Security Service

  • 1. C180 Security Service Chameleon Secure Solutions (Pty) Ltd • Reg. No. 2007/032120/07 • Vat No. 4300244029 (o) 011 463 8035 • (f) 086 608 6668 • (w) www.chameleon-ss.com Bridgeport House • Hampton Park North • 20 Georgian Crescent • Bryanston Directors • Reinhard Behrens • Christo Boshoff • Possey Mina
  • 2. Chameleon Secure Solutions C90 Security Appliance Confidential 1. Overview C180 is a 24/7 log file monitoring and reporting solution providing:  Automated log file interrogation and reporting  Alerting on critical events  Storage of categorized and classified log files  Consultancy in respect of issues arising from any of the above 2. The Chameleon Secure Solutions C180 Service Provides:  Log file storage and collection from all devices in an environment  Log file categorization, classification and reporting  The ability to identify security issues in an environment  The ability to distinguish between real security alerts and alerts that do not actually impact your environment  The ability to identify issues within an environment that consume resources like bandwidth and processing capacity that are the result of incorrect configurations and security policies  A historic audit trail to track security events and breaches  The ability to identify specific areas of the environment that requires investigation and or remediation (Security Hot Spots)  An automated meaningful process for handling the critical information gathered in log files that is impossible to manage manually  Analyses and categorization of events we enable the prioritization of areas and issues that needs to be addressed  A view of the health of an environment in respect of its security, based on the quantity and severity of events that occur  Monitor and track the remediation process against an SLA 3. Value Derived From the Service 3.1 Control  Of who has access to the information within your environment  Of the environment in respect of security events that occur on an ongoing basis  To identify and prioritize areas that require remediation  To measure your environment in respect of improvement or lack thereof 3.2 Cost  Operational costs are reduced in respect of product purchasing and training due to the implementation of one comprehensive solution  High local content – not dependant on exchange rate  Reduces the cost to identify issues within an environment  Access to expensive skills that are not cost effective on a full time basis  We enable the better protection in respect to liability as a result of information loss and misuse.  We enable you to litigate in the event of information loss or misuse 3.3 Performance  Shortened lead time to identifying where and what needs fixing  Shortened lead time to identify the effectiveness of remediation efforts  By identifying and fixing mis-configurations we free up resources like bandwidth and processing power for real business use 2 of 3
  • 3. Chameleon Secure Solutions C90 Security Appliance Confidential 3.4 Quality  Improve quality of the governance of the IT environment  Improve the quality of the protection of information within an organization 3 of 3