SlideShare a Scribd company logo
Caretower’s SIEM Managed Security Services 1
Caretower’s SIEM
Managed Security
Services
Enterprise Security Manager
MSS -TRUE 24/7 Service
I.T. Security Specialists
2 Caretower’s SIEM Managed Security Services
Challenges
During recent times, organisations
all over the globe are facing many
challenges irrelevant of size or
vertical when it comes to Security
Information and Event Management
(SIEM) solutions.
Advanced persistent
threats
Many organisations have implemented a defence
in depth strategy around their critical assets using
APT, firewalls and IDS/IPS at the perimeter, two-
factor authentication, internal firewalls, network
segmentation, HIDS, AV and as well as other
technologies. All of these devices generate a huge
amount of data, which is difficult to monitor. A security
team cannot realistically have all these dashboards
open and correlate events among several components
fast enough to keep up with the packets traversing the
network.
Compliance
Almost every business is bound by some sort of
industry regulation such as PCI-DSS, GPG13,
ISO27001/2, HIPAA, SOX. Attaining and maintaining
these regulations is a daunting task. Virtually every
regulatory mandate requires some form of log
management to maintain an audit trail of activity.
Zero-day threat
detection
New attack vectors and vulnerabilities are discovered
every day. Firewalls, IDS/IPS and AV solutions all
look for malicious activity at various points within the
IT infrastructure, from the perimeter to endpoints.
However, many of these solutions are not equipped to
detect zero-day attacks.
Operation support
The size and complexity of today’s enterprises is
growing exponentially, along with the number of IT
personnel to support them. Operations are often
split among different groups such as the Network
Operations Centre (NOC), the Security Operations
Centre (SOC), the server team, desktop team, network
team etc.
Each with their own tools to monitor and respond
to events. This makes information sharing and
collaboration difficult when problems occur.
Forensics
Not only must a forensics analyst interpret log data to
determine what actually happened, the analyst must
preserve the data in a way that makes it admissible
in a court of law. Since log data represents the
digital fingerprints of all activity that occurs across
IT infrastructures, it can be mined to detect security,
operations and regulatory compliance problems.
Challenges &
Solution
Caretower’s SIEM Managed Security Services 3
Whether it is the challenges of managing many
disparate devices across different locations or having
to face a cyber attack in the ever growing threat
landscape, systems are compromised and affected with
data being taken, along with the complexity of adhering
to and maintaining industry driven compliances. These
factors are major concerns for businesses as they are
difficult to combat which need to be addressed and
overcome in an effective and timely manner.
Solution
Caretower’s Security Information and
Event Management (SIEM) service
collects, analyses and stores logs
from networks, hosts and various
applications. SIEM allows clients to:
ÎÎ Collect logs from multiple locations into a central
system: This enables numerous receivers to feed
into one central system for monitoring and reporting.
ÎÎ Summarise key incidents: Critical events and
alarms are reported to the client, in turn decreasing
the period and resource.
ÎÎ Correlate critical events: A pro-active holistic
approach that ensures threats are identified where
individual devices alone may not detect them.
ÎÎ Report on incidents: A full reporting engine and
dashboard is built into the Caretower’s MSS SIEM
service, providing clients with a real-time visibility
and historic reporting activity.
ÎÎ Take immediate and suitable remediation
activities: This minimises the implication of threats
on our client’s network and allows our Incident
Response Team to take immediate action.
Caretower’s Vendor Agnostic
MS SIEM Service
Existing SIEM Solution
Customer Network
Security
Devices
Endpoints
Network
Devices
4 Caretower’s SIEM Managed Security Services
SIEM Managed Security Services Architecture
In the architecture diagram below, multiple receivers
from multiple locations collect logs from various
devices and ELM (Enterprise Log Manager) and ESM
(Enterprise Security Manager) fetch these logs from the
receiver periodically. ELM Stores the RAW logs mainly
for compliance purposes and ESM uses normalised
logs for reporting, correlation and alerting.
Situational Awareness and
Advanced Correlation
Real time Risk Based Alerting
and Remediation
Ad-hoc and Scheduled Reports
Centralised Overview, Analyse, Alert and Report (ESM - Enterprise Security Manager)
Receiver A Receiver B Receiver C
Storage
Devices
Business
Apps
Servers
Location A
Security
Devices
Endpoints
Network
Devices
Location B
Security
Devices
Mobile
Devices
Servers
Location C
Enterpise Log Manager (Raw Event Archive)
SIEM Managed Security
Service
We can host the solution or the solution can reside
within our customer’s network. We wrap our services
around either option which offers flexibility of
architecture and management. We monitor security
events 24/7 and provide in-depth security expertise. We
also provide reports on spot-patterns across a number
of customers to provide advanced warning on new
threats.
ÎÎ Proactive management
ÎÎ Run by dedicated and industry leading certified
security engineers (GIAC Certified Forensic Analyst)
– GCFA
ÎÎ SOC Engineer’s vendor certified
ÎÎ Escalation from tier 1 to tier 3 engineers
ÎÎ 24/7 x 365 SOC cover
ÎÎ Fully ISO27001 accredited SOC
SIEM Managed
Security Services
Caretower’s SIEM Managed Security Services 5
ÎÎ Service based on ITIL3 framework
ÎÎ Customer oriented, process driven and service
driven
ÎÎ Transition, incident, problem and change
management
ÎÎ Portal access for incident and change management
ÎÎ Multiple logins available for customer staff
ÎÎ Change requests initiated by SOC or by the
customer
ÎÎ Incident tickets raised in management system
automatically or manually via web portal
ÎÎ Email notification of tickets raised and updated
ÎÎ Bi-weekly/monthly reports generated for customers
ÎÎ SLA - Measurable Escalations – industry leading
SLAs
ÎÎ Incident Response - SANS (SysAdmin, Audit,
Networking, and Security)
Incident Response
ÎÎ Receive alerts in real-time
ÎÎ Perform forensic investigation
ÎÎ 	Provide security reports with expert advice within
SLAs
ÎÎ SLAs depend on the business impact for the
inbound alerts.
ÎÎ Different SLAs are implemented for traditional
support (change requests, patching, upgrading,
etc.) and incident response (advice on alerts) and
work through a remediation
ÎÎ Remediation plan and infrastructure
recommendations
ÎÎ Change requests
ÎÎ Fully logged and reports for audit trail
Minimise Operational
Expenditure
ÎÎ Improve productivity/effectiveness of the solution
ÎÎ Maximise your investments
ÎÎ Help achieve compliance
ÎÎ Traditional monitoring and support
ÎÎ Maintenance of rules and reports
ÎÎ 	Offer agility and flexibility
ÎÎ Reduce Internal Resource and Training Costs
ÎÎ Gives you peace of mind that your security is safely
managed by a team of experts 24 hours a day
Value to Customers
ÎÎ Improve your security posture within your
environment
ÎÎ Threat Awareness
ÎÎ Real-Time Trending
ÎÎ Proactive Maintenance and Monitoring
ÎÎ Risk Mitigation
6 Caretower’s SIEM Managed Security Services
Recommendations to
customers
ÎÎ Deploy Base-Line configuration based on NIST Top
20 Security Controls
ÎÎ Based on common IT security best practices
ÎÎ Perform accurate tuning of the correlation -
engine/rule’s based on the customer’s specific use
cases
ÎÎ Based-lined configuration support
ÎÎ Tuning of the out-of-the-box features
Custom and compliance
reports
ÎÎ Implemented during the design phase
ÎÎ Maintained later on by the Security Operations
Centre
SIEM or MSsP? - comparing capabilities
Features SIEM MSSP
Monitors log events
 
Helps attain regulatory compliance
 
Flexible service delivery

Provides 24/7 analysis by security analyst

Stores logs off-site in forensically-sound facility*

Provides security intelligence and expertise as part of the
solution

Built-in disaster recovery and business continuity planning
(DR/BCP)

Predictable fixed cost

May require additional infrastructure (server, network
devices, storage, etc.)

*Optional store raw log data on customers’ premises, which may involve additional cost, and where it may not be
protected against alteration or theft.
Caretower’s SIEM Managed Security Services 7
Speed of
Implementation
Our SIEM Managed Security Service seamlessly
integrates with your network and can be up running
within days, not months. We deliver instant results
through visibility of events and analyse on a live
dashboard with in-depth reporting.
Simplified
Compliance
Our SIEM Managed Security Service enables
companies to fulfil their compliance requirements by
providing you with on demand, enterprise-wide reports
that demonstrate the security status of your systems.
The SIEM service can provide auditing against the
following industry standards (e.g.):
ÎÎ PCI DSS Compliance
ÎÎ ISO 27001
ÎÎ Protective Monitoring (GPG13)
ÎÎ SOX
ÎÎ HIPAA
ÎÎ PSN
Flexible
Dashboards
and Robust Reporting
Our SIEM Managed Security Service brings you
comprehensive technical, operational and trend
reports that communicate security status and satisfy
compliance requirements. Dashboards are available
out-of-the-box and Caretower delivers customisable
dashboards to each and every customer based on their
requirements.
24/7 Caretower
Security Operation
Centre
Our SIEM Managed Security solution allows you to be
a SIEM user, not an administrator. This means that you
have access to SIEM to view the data and run required
reports whilst maintaining a certain level of privileges.
The SIEM service is constantly monitored by our 24/7
Security Operations Centre where the team will carry
out monitoring, management and incident response to
security events and alerts.
Why Caretower?
As an independent IT security specialist, with over 17
years experience, Caretower provide comprehensive
solutions to individual problems, thus allowing our
recommendations to be unbiased. Over the years,
we have quickly established many long standing
relationships with all of our vendors, achieving the
highest status within these organisations based on the
level of expertise within our internal sales, support and
professional services teams.
This relationship ensures we provide our customers
with key changes within the industry which assists in
their on-going security management strategy.
ÎÎ To provide live 24/7 McAfee SIEM Managed Service
in Europe
ÎÎ Dedicated GIAC Certified Digital Forensic Security
Engineers (SANS (SysAdmin, Audit, Networking,
and Security) Institute)
ÎÎ Full-onsite and hosted architecture options,
depending on your requirements
ÎÎ We are CSA (Cloud Security Alliance) member and
ISO 27001 Accredited
Benefits of Caretower’s
SIEM Managed Security
Service
Get in touch:
020 8372 1000
info@caretower.com
www.caretower.com

More Related Content

What's hot

SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
SecureData Europe
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
OWASP Delhi
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
rver21
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
Owais Ahmad
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
Luigi Perrone
 
SIEM
SIEMSIEM
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Tripwire
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
Coenraad Smith
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Vijilan IT Security solutions
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
ControlCase
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
CloudAccess
 
Docker container webinar final
Docker container webinar finalDocker container webinar final
Docker container webinar final
ControlCase
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
Stijn Vande Casteele
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
hardik soni
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Jay Steidle
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
Osama Ellahi
 

What's hot (20)

SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
SIEM
SIEMSIEM
SIEM
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
Docker container webinar final
Docker container webinar finalDocker container webinar final
Docker container webinar final
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 

Viewers also liked

Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
Teri Radichel
 
Frontline solutions For Security Practitioners 1008
Frontline solutions For Security Practitioners 1008Frontline solutions For Security Practitioners 1008
Frontline solutions For Security Practitioners 1008
Rick Wanner
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
Eng. Mohammed Ahmed Siddiqui
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
Cláudio André
 
AndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security ReloadedAndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security Reloaded
Jaime Sánchez
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
 

Viewers also liked (9)

Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 
Frontline solutions For Security Practitioners 1008
Frontline solutions For Security Practitioners 1008Frontline solutions For Security Practitioners 1008
Frontline solutions For Security Practitioners 1008
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
AndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security ReloadedAndroIDS: Mobile Security Reloaded
AndroIDS: Mobile Security Reloaded
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
 

Similar to SIEM brochure A4 8pp FINAL WEB

Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
neoalt
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
Logicalis Security Conference
Logicalis Security ConferenceLogicalis Security Conference
Logicalis Security Conference
Paul Dutot IEng MIET MBCS CITP OSCP CSTM
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
karthikvcyber
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
InfosecTrain
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
rver21
 
Siem pdf
Siem pdfSiem pdf
Siem pdf
kmehul
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
jduhaime
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
Ajit Wadhawan
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
Chapter247 Infotech
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
Satya Harish
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
Ajit Wadhawan
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
EMC
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 

Similar to SIEM brochure A4 8pp FINAL WEB (20)

Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Logicalis Security Conference
Logicalis Security ConferenceLogicalis Security Conference
Logicalis Security Conference
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Siem pdf
Siem pdfSiem pdf
Siem pdf
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
The ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expertThe ultimate guide to cloud computing security-Hire cloud expert
The ultimate guide to cloud computing security-Hire cloud expert
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 

SIEM brochure A4 8pp FINAL WEB

  • 1. Caretower’s SIEM Managed Security Services 1 Caretower’s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists
  • 2. 2 Caretower’s SIEM Managed Security Services Challenges During recent times, organisations all over the globe are facing many challenges irrelevant of size or vertical when it comes to Security Information and Event Management (SIEM) solutions. Advanced persistent threats Many organisations have implemented a defence in depth strategy around their critical assets using APT, firewalls and IDS/IPS at the perimeter, two- factor authentication, internal firewalls, network segmentation, HIDS, AV and as well as other technologies. All of these devices generate a huge amount of data, which is difficult to monitor. A security team cannot realistically have all these dashboards open and correlate events among several components fast enough to keep up with the packets traversing the network. Compliance Almost every business is bound by some sort of industry regulation such as PCI-DSS, GPG13, ISO27001/2, HIPAA, SOX. Attaining and maintaining these regulations is a daunting task. Virtually every regulatory mandate requires some form of log management to maintain an audit trail of activity. Zero-day threat detection New attack vectors and vulnerabilities are discovered every day. Firewalls, IDS/IPS and AV solutions all look for malicious activity at various points within the IT infrastructure, from the perimeter to endpoints. However, many of these solutions are not equipped to detect zero-day attacks. Operation support The size and complexity of today’s enterprises is growing exponentially, along with the number of IT personnel to support them. Operations are often split among different groups such as the Network Operations Centre (NOC), the Security Operations Centre (SOC), the server team, desktop team, network team etc. Each with their own tools to monitor and respond to events. This makes information sharing and collaboration difficult when problems occur. Forensics Not only must a forensics analyst interpret log data to determine what actually happened, the analyst must preserve the data in a way that makes it admissible in a court of law. Since log data represents the digital fingerprints of all activity that occurs across IT infrastructures, it can be mined to detect security, operations and regulatory compliance problems. Challenges & Solution
  • 3. Caretower’s SIEM Managed Security Services 3 Whether it is the challenges of managing many disparate devices across different locations or having to face a cyber attack in the ever growing threat landscape, systems are compromised and affected with data being taken, along with the complexity of adhering to and maintaining industry driven compliances. These factors are major concerns for businesses as they are difficult to combat which need to be addressed and overcome in an effective and timely manner. Solution Caretower’s Security Information and Event Management (SIEM) service collects, analyses and stores logs from networks, hosts and various applications. SIEM allows clients to: ÎÎ Collect logs from multiple locations into a central system: This enables numerous receivers to feed into one central system for monitoring and reporting. ÎÎ Summarise key incidents: Critical events and alarms are reported to the client, in turn decreasing the period and resource. ÎÎ Correlate critical events: A pro-active holistic approach that ensures threats are identified where individual devices alone may not detect them. ÎÎ Report on incidents: A full reporting engine and dashboard is built into the Caretower’s MSS SIEM service, providing clients with a real-time visibility and historic reporting activity. ÎÎ Take immediate and suitable remediation activities: This minimises the implication of threats on our client’s network and allows our Incident Response Team to take immediate action. Caretower’s Vendor Agnostic MS SIEM Service Existing SIEM Solution Customer Network Security Devices Endpoints Network Devices
  • 4. 4 Caretower’s SIEM Managed Security Services SIEM Managed Security Services Architecture In the architecture diagram below, multiple receivers from multiple locations collect logs from various devices and ELM (Enterprise Log Manager) and ESM (Enterprise Security Manager) fetch these logs from the receiver periodically. ELM Stores the RAW logs mainly for compliance purposes and ESM uses normalised logs for reporting, correlation and alerting. Situational Awareness and Advanced Correlation Real time Risk Based Alerting and Remediation Ad-hoc and Scheduled Reports Centralised Overview, Analyse, Alert and Report (ESM - Enterprise Security Manager) Receiver A Receiver B Receiver C Storage Devices Business Apps Servers Location A Security Devices Endpoints Network Devices Location B Security Devices Mobile Devices Servers Location C Enterpise Log Manager (Raw Event Archive) SIEM Managed Security Service We can host the solution or the solution can reside within our customer’s network. We wrap our services around either option which offers flexibility of architecture and management. We monitor security events 24/7 and provide in-depth security expertise. We also provide reports on spot-patterns across a number of customers to provide advanced warning on new threats. ÎÎ Proactive management ÎÎ Run by dedicated and industry leading certified security engineers (GIAC Certified Forensic Analyst) – GCFA ÎÎ SOC Engineer’s vendor certified ÎÎ Escalation from tier 1 to tier 3 engineers ÎÎ 24/7 x 365 SOC cover ÎÎ Fully ISO27001 accredited SOC SIEM Managed Security Services
  • 5. Caretower’s SIEM Managed Security Services 5 ÎÎ Service based on ITIL3 framework ÎÎ Customer oriented, process driven and service driven ÎÎ Transition, incident, problem and change management ÎÎ Portal access for incident and change management ÎÎ Multiple logins available for customer staff ÎÎ Change requests initiated by SOC or by the customer ÎÎ Incident tickets raised in management system automatically or manually via web portal ÎÎ Email notification of tickets raised and updated ÎÎ Bi-weekly/monthly reports generated for customers ÎÎ SLA - Measurable Escalations – industry leading SLAs ÎÎ Incident Response - SANS (SysAdmin, Audit, Networking, and Security) Incident Response ÎÎ Receive alerts in real-time ÎÎ Perform forensic investigation ÎÎ Provide security reports with expert advice within SLAs ÎÎ SLAs depend on the business impact for the inbound alerts. ÎÎ Different SLAs are implemented for traditional support (change requests, patching, upgrading, etc.) and incident response (advice on alerts) and work through a remediation ÎÎ Remediation plan and infrastructure recommendations ÎÎ Change requests ÎÎ Fully logged and reports for audit trail Minimise Operational Expenditure ÎÎ Improve productivity/effectiveness of the solution ÎÎ Maximise your investments ÎÎ Help achieve compliance ÎÎ Traditional monitoring and support ÎÎ Maintenance of rules and reports ÎÎ Offer agility and flexibility ÎÎ Reduce Internal Resource and Training Costs ÎÎ Gives you peace of mind that your security is safely managed by a team of experts 24 hours a day Value to Customers ÎÎ Improve your security posture within your environment ÎÎ Threat Awareness ÎÎ Real-Time Trending ÎÎ Proactive Maintenance and Monitoring ÎÎ Risk Mitigation
  • 6. 6 Caretower’s SIEM Managed Security Services Recommendations to customers ÎÎ Deploy Base-Line configuration based on NIST Top 20 Security Controls ÎÎ Based on common IT security best practices ÎÎ Perform accurate tuning of the correlation - engine/rule’s based on the customer’s specific use cases ÎÎ Based-lined configuration support ÎÎ Tuning of the out-of-the-box features Custom and compliance reports ÎÎ Implemented during the design phase ÎÎ Maintained later on by the Security Operations Centre SIEM or MSsP? - comparing capabilities Features SIEM MSSP Monitors log events   Helps attain regulatory compliance   Flexible service delivery  Provides 24/7 analysis by security analyst  Stores logs off-site in forensically-sound facility*  Provides security intelligence and expertise as part of the solution  Built-in disaster recovery and business continuity planning (DR/BCP)  Predictable fixed cost  May require additional infrastructure (server, network devices, storage, etc.)  *Optional store raw log data on customers’ premises, which may involve additional cost, and where it may not be protected against alteration or theft.
  • 7. Caretower’s SIEM Managed Security Services 7 Speed of Implementation Our SIEM Managed Security Service seamlessly integrates with your network and can be up running within days, not months. We deliver instant results through visibility of events and analyse on a live dashboard with in-depth reporting. Simplified Compliance Our SIEM Managed Security Service enables companies to fulfil their compliance requirements by providing you with on demand, enterprise-wide reports that demonstrate the security status of your systems. The SIEM service can provide auditing against the following industry standards (e.g.): ÎÎ PCI DSS Compliance ÎÎ ISO 27001 ÎÎ Protective Monitoring (GPG13) ÎÎ SOX ÎÎ HIPAA ÎÎ PSN Flexible Dashboards and Robust Reporting Our SIEM Managed Security Service brings you comprehensive technical, operational and trend reports that communicate security status and satisfy compliance requirements. Dashboards are available out-of-the-box and Caretower delivers customisable dashboards to each and every customer based on their requirements. 24/7 Caretower Security Operation Centre Our SIEM Managed Security solution allows you to be a SIEM user, not an administrator. This means that you have access to SIEM to view the data and run required reports whilst maintaining a certain level of privileges. The SIEM service is constantly monitored by our 24/7 Security Operations Centre where the team will carry out monitoring, management and incident response to security events and alerts. Why Caretower? As an independent IT security specialist, with over 17 years experience, Caretower provide comprehensive solutions to individual problems, thus allowing our recommendations to be unbiased. Over the years, we have quickly established many long standing relationships with all of our vendors, achieving the highest status within these organisations based on the level of expertise within our internal sales, support and professional services teams. This relationship ensures we provide our customers with key changes within the industry which assists in their on-going security management strategy. ÎÎ To provide live 24/7 McAfee SIEM Managed Service in Europe ÎÎ Dedicated GIAC Certified Digital Forensic Security Engineers (SANS (SysAdmin, Audit, Networking, and Security) Institute) ÎÎ Full-onsite and hosted architecture options, depending on your requirements ÎÎ We are CSA (Cloud Security Alliance) member and ISO 27001 Accredited Benefits of Caretower’s SIEM Managed Security Service
  • 8. Get in touch: 020 8372 1000 info@caretower.com www.caretower.com