SlideShare a Scribd company logo
1 of 33
Services Description 
October 2014
AGENDA 
● Cloud: 
○ Own v/s Lease 
○ Decentralization of IT 
● Network Security: 
○ Threats 
○ Impact and Urgency 
○ Cost of Breach 
○ Logs 
● Solution 
○ Overview 
○ Architecture 
○ Packages 
● Backup Slides
CLOUD
Cloud : Own versus Lease 
● Own the asset: you 
can modify it as 
you please 
● You can sell it 
whenever you 
want 
● More economical 
on the long run 
● High Investment - 
Depreciation 
● Lower down payment 
● Lower monthly 
payments 
● Lower maintenance 
costs 
● Ability to modify the 
offering at any time 
● Ability to change asset 
every year or two 
● Faster time to install 
● No need for in-house 
expertise 
● No rent space 
● Increase or decrease 
capacity at will 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud Services 
Deploy faster and easier 
Decrease budget and avoid 
vendor lock-in 
Lower footprint on your network 
Save on technology upgrades and 
maintenance 
Ensure compliance to regulatory 
mandates. 
Gartner defines cloud 
computing as “...a style of 
computing in which 
scalable and elastic IT-enabled 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
capabilities are 
delivered as a service 
using Internet 
technologies.”
Cloud: Decentralization of IT 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
On-Premises 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
IaaS 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
PaaS 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
SaaS
SaaS: ROI 
Line item Cloud On-premise 
Initial license fee None Extensive 
Subscription fee Charged by usage None 
Maintenance fees Included Percentage of license fee 
Support costs Included Extra 
IT stang Significant reductions Significant 
Data center upkeep and 
maintenance 
None Large, ongoing 
Upgrade fees Included Significant 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
NETWORK SECURITY
Threats 
Trojan Horse 
File infection 
Spam email 
zero-day attacks 
Software vulnerabilities 
OS vulnerabilities 
Identify theft 
Mobile Loss 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Phishing
Causes 
Ponemon Institute / Symantec - Cost of Data Breach Study 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Impact 
and 
Urgency 
4 3 2 
3 2 
2 1 1 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
1 
Business Process 
affected. 
Workaround 
available. 
Business Process 
stopped. Can bare 
minimal delay. 
Very hard 
workaround 
Business Process 
stopped. No work 
around 
Urgency 
Impact 
Any system minor 
degradation non-business 
critical. 
<50% of users 
impacted 
Any system 
degraded or 
partially 
unavailable. >50% 
of users impacted 
Any system 
unavailable. 
100% of users 
impacted
Cost of Breach 
IBM Data Breach Statistics 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Logs 
log /lôg läg/ - noun 
"a record of performance, events, or day-to-day activities" 
synonyms: record, register, logbook, journal, diary, chronicle, 
daybook, record book, ledger; 
SNMP 
ODBC 
WMI 
SDEE 
CPMI 
syslog 
netflow 
ssh 
native FIM 
Registry 
Monitor 
custom XML-based 
One Solution 
Vulnerability 
Scanner 
Configuration 
Management 
Asset Analytics 
Performance 
Monitoring 
Network 
Behaviour 
Analysis 
RDEP Forensics 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Log 
Management
Log Management 
Functionality 
Log Management 
(LM) 
Security Information and Event 
Managment (SIEM) 
Log collection Collect all logs Collect security relevant logs + context data 
Log pre-processing 
Indexing, parsing 
Parsing (universal collection), normalization, 
categorization, enrichment 
Log retention Retain raw log data Retain parsed and normalized data 
Reporting Broad use reporting 
Focused reporting: security, asset, 
configuration... 
Analysis Full test analysis, tagging 
Real-time event correlation, threat scoring, 
event prioritization 
Alerting and 
notification 
Simple alerting on all logs 
Categorized focused alerting, user activity, 
dashboards, monitors, file integrity monitoring 
Other features 
High scalability of collection 
and storage 
Incident Management, analyst workflow, 
context analysis, forensics, configuration audit, 
application monitoring, compliance 
automation, vulnerability monitoring 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
SOLUTION 
SIEM as a Service
Solution Overview 
MSS is a Unified Security Management service that 
combines multiple security functions in a single 
console: 
● SIEM (security information and event 
management) 
● Secure Configuration Auditing 
● Compliance Automation 
● Contextual Forensic Analysis 
Network state and event data is collected 
continuously. The system deploys alert 
correlations schemes to identify suspicious activity 
that can develop into threats affecting your 
business. 
Network data collected is compressed and 
encrypted to avoid network congestion and 
ensure maximum security of your data. 
‘... customers need to 
examine security event 
data in real time for 
internal and external 
threat management, and 
to collect, store, analyze 
and report on log data for 
incident response, 
forensics, and regulatory 
compliance…’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Architecture 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Key Components 
● Full SIEM deployment with real-time security monitoring, 
historical analysis and event correlation 
● 24x7 security and configuration device monitoring: 
IPS/Firewall/VPN/Servers/Virtual Environments; up to 
160 different node types 
● Customized web-portal dashboard to provide real-time 
reports and statistics 
● Dedicated engineering consultants to support with 
forensic investigation and remediation 
● Compliance and security risk reviews: PCI DSS, HIPAA, 
ISO27001/27002, COBIT, NIST800-53… 
● Consulting Services - Security Posture Analysis and 
Recommendation 
● Full Engineering and Management Services 
‘...the technology 
provides real-time 
security monitoring, 
historical analysis, and 
other support for incident 
investigation and 
compliance reporting...’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Dashboards Online 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Demo:
Summary 
Get Security Monitoring installed in minutes 
Low monthly subscription fees 
Scale very easily 
Leverage DataConsult’s expertise in security 
Ensure compliance to regulatory mandates. 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Packages 
MSS feature 
MSS1 
(Reporting) 
MSS2 
(Premium) 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
MSSe 
(Consulting) 
MSSe+ 
(Managed) 
Log Collection X X X X 
Event Reporting X X X X 
Asset and Performance Monitoring X X X X 
Daily Security Status Reports X X X X 
Forensic Investigations X X X 
Configuration and Asset Management X X X 
Event Correlation X X X 
Network Behaviour Analysis X X X 
24x7 Live Alert Monitoring & Notification X X X 
Monthly Health Reports X X X 
Compliance Automation X X 
Security Analysis and Recommendation X X 
Remediation and Control X 
Full Device Management X
Thank You
BACKUP SLIDES 
Screen Shots
Critical Events per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Denied Connections per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Alert Configuration 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Blocking 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
User by Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
BACKUP SLIDES 
References
MALicious softWARE 
Cisco Annual Security Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Vulnerabilities 
Kaspersky Security Bulletin 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Mobile Device Theft 
Sophos Security Threat Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

More Related Content

What's hot

Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Grant Swanson
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber ThreatsSolarWinds
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesReliaQuest
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
AccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC ConvergenceAccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC ConvergenceStephen Tsuchiyama
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...akquinet enterprise solutions GmbH
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementEnclaveSecurity
 
PRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADAPRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADAAnandKumarJha33
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...akquinet enterprise solutions GmbH
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 

What's hot (20)

Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
AccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC ConvergenceAccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC Convergence
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Ambesh
AmbeshAmbesh
Ambesh
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
PRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADAPRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADA
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 

Viewers also liked

Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security ArchitectureCisco Canada
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackDaniele Bellavista
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact centerCisco Canada
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupseFolder
 
Real Time Target Marketing
Real Time Target MarketingReal Time Target Marketing
Real Time Target MarketingBrad Andersohn
 
Promat Oil & Gas Brochure
Promat Oil & Gas BrochurePromat Oil & Gas Brochure
Promat Oil & Gas BrochurePrasad Mandava
 
Europroperties Web Tv Presentation
Europroperties Web Tv PresentationEuroproperties Web Tv Presentation
Europroperties Web Tv PresentationUnitrustMedia
 
Presentación monica botero
Presentación monica boteroPresentación monica botero
Presentación monica boteroRamón Mejía
 
All about me gareth rollason
All about me gareth rollasonAll about me gareth rollason
All about me gareth rollasonmdhih123
 
Exploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level RevisitedExploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level RevisitedSaepio Technologies
 
Loesungen fuer die Hydraulik
Loesungen fuer die HydraulikLoesungen fuer die Hydraulik
Loesungen fuer die HydraulikChristian Holder
 

Viewers also liked (20)

Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attack
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 
Real Time Target Marketing
Real Time Target MarketingReal Time Target Marketing
Real Time Target Marketing
 
Pulseras de cuero
 Pulseras de cuero Pulseras de cuero
Pulseras de cuero
 
Promat Oil & Gas Brochure
Promat Oil & Gas BrochurePromat Oil & Gas Brochure
Promat Oil & Gas Brochure
 
Europroperties Web Tv Presentation
Europroperties Web Tv PresentationEuroproperties Web Tv Presentation
Europroperties Web Tv Presentation
 
Presentación monica botero
Presentación monica boteroPresentación monica botero
Presentación monica botero
 
All about me gareth rollason
All about me gareth rollasonAll about me gareth rollason
All about me gareth rollason
 
Presentacion Memoria Jung Mayo 2015
Presentacion Memoria Jung Mayo 2015Presentacion Memoria Jung Mayo 2015
Presentacion Memoria Jung Mayo 2015
 
Exploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level RevisitedExploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level Revisited
 
Loesungen fuer die Hydraulik
Loesungen fuer die HydraulikLoesungen fuer die Hydraulik
Loesungen fuer die Hydraulik
 

Similar to Data Consult Managed Security Services

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Marketing Team
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12mjamesvoyss
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 

Similar to Data Consult Managed Security Services (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Information Security
Information SecurityInformation Security
Information Security
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Data Consult Managed Security Services

  • 2. AGENDA ● Cloud: ○ Own v/s Lease ○ Decentralization of IT ● Network Security: ○ Threats ○ Impact and Urgency ○ Cost of Breach ○ Logs ● Solution ○ Overview ○ Architecture ○ Packages ● Backup Slides
  • 4. Cloud : Own versus Lease ● Own the asset: you can modify it as you please ● You can sell it whenever you want ● More economical on the long run ● High Investment - Depreciation ● Lower down payment ● Lower monthly payments ● Lower maintenance costs ● Ability to modify the offering at any time ● Ability to change asset every year or two ● Faster time to install ● No need for in-house expertise ● No rent space ● Increase or decrease capacity at will © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 5. Cloud Services Deploy faster and easier Decrease budget and avoid vendor lock-in Lower footprint on your network Save on technology upgrades and maintenance Ensure compliance to regulatory mandates. Gartner defines cloud computing as “...a style of computing in which scalable and elastic IT-enabled © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission capabilities are delivered as a service using Internet technologies.”
  • 6. Cloud: Decentralization of IT Users Data Application Tools Database Network OS Hardware On-Premises Users Data Application Tools Database Network OS Hardware IaaS Users Data Application Tools Database Network OS Hardware PaaS © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Users Data Application Tools Database Network OS Hardware SaaS
  • 7. SaaS: ROI Line item Cloud On-premise Initial license fee None Extensive Subscription fee Charged by usage None Maintenance fees Included Percentage of license fee Support costs Included Extra IT stang Significant reductions Significant Data center upkeep and maintenance None Large, ongoing Upgrade fees Included Significant © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 9. Threats Trojan Horse File infection Spam email zero-day attacks Software vulnerabilities OS vulnerabilities Identify theft Mobile Loss © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Phishing
  • 10. Causes Ponemon Institute / Symantec - Cost of Data Breach Study 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 11. Impact and Urgency 4 3 2 3 2 2 1 1 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 1 Business Process affected. Workaround available. Business Process stopped. Can bare minimal delay. Very hard workaround Business Process stopped. No work around Urgency Impact Any system minor degradation non-business critical. <50% of users impacted Any system degraded or partially unavailable. >50% of users impacted Any system unavailable. 100% of users impacted
  • 12. Cost of Breach IBM Data Breach Statistics 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 13. Logs log /lôg läg/ - noun "a record of performance, events, or day-to-day activities" synonyms: record, register, logbook, journal, diary, chronicle, daybook, record book, ledger; SNMP ODBC WMI SDEE CPMI syslog netflow ssh native FIM Registry Monitor custom XML-based One Solution Vulnerability Scanner Configuration Management Asset Analytics Performance Monitoring Network Behaviour Analysis RDEP Forensics © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Log Management
  • 14. Log Management Functionality Log Management (LM) Security Information and Event Managment (SIEM) Log collection Collect all logs Collect security relevant logs + context data Log pre-processing Indexing, parsing Parsing (universal collection), normalization, categorization, enrichment Log retention Retain raw log data Retain parsed and normalized data Reporting Broad use reporting Focused reporting: security, asset, configuration... Analysis Full test analysis, tagging Real-time event correlation, threat scoring, event prioritization Alerting and notification Simple alerting on all logs Categorized focused alerting, user activity, dashboards, monitors, file integrity monitoring Other features High scalability of collection and storage Incident Management, analyst workflow, context analysis, forensics, configuration audit, application monitoring, compliance automation, vulnerability monitoring © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 15. SOLUTION SIEM as a Service
  • 16. Solution Overview MSS is a Unified Security Management service that combines multiple security functions in a single console: ● SIEM (security information and event management) ● Secure Configuration Auditing ● Compliance Automation ● Contextual Forensic Analysis Network state and event data is collected continuously. The system deploys alert correlations schemes to identify suspicious activity that can develop into threats affecting your business. Network data collected is compressed and encrypted to avoid network congestion and ensure maximum security of your data. ‘... customers need to examine security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics, and regulatory compliance…’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 17. Architecture © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 18. Key Components ● Full SIEM deployment with real-time security monitoring, historical analysis and event correlation ● 24x7 security and configuration device monitoring: IPS/Firewall/VPN/Servers/Virtual Environments; up to 160 different node types ● Customized web-portal dashboard to provide real-time reports and statistics ● Dedicated engineering consultants to support with forensic investigation and remediation ● Compliance and security risk reviews: PCI DSS, HIPAA, ISO27001/27002, COBIT, NIST800-53… ● Consulting Services - Security Posture Analysis and Recommendation ● Full Engineering and Management Services ‘...the technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting...’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 19. Dashboards Online © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Demo:
  • 20. Summary Get Security Monitoring installed in minutes Low monthly subscription fees Scale very easily Leverage DataConsult’s expertise in security Ensure compliance to regulatory mandates. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 21. Packages MSS feature MSS1 (Reporting) MSS2 (Premium) © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission MSSe (Consulting) MSSe+ (Managed) Log Collection X X X X Event Reporting X X X X Asset and Performance Monitoring X X X X Daily Security Status Reports X X X X Forensic Investigations X X X Configuration and Asset Management X X X Event Correlation X X X Network Behaviour Analysis X X X 24x7 Live Alert Monitoring & Notification X X X Monthly Health Reports X X X Compliance Automation X X Security Analysis and Recommendation X X Remediation and Control X Full Device Management X
  • 24. Critical Events per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 25. Denied Connections per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 26. Alert Configuration © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 27. Destination Blocking © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 28. Destination Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 29. User by Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 31. MALicious softWARE Cisco Annual Security Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 32. Vulnerabilities Kaspersky Security Bulletin 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 33. Mobile Device Theft Sophos Security Threat Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission