SlideShare a Scribd company logo
ESDS SOC Services
WHY SOC Services needed?
WHAT value we offer?
HOW you get Benefited ?
SOC
SERVICES
If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you
know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know
neither the enemy nor yourself, you will succumb in every battle.
― Sun Tzu, The Art of War
”
“
WHY SOC Services
needed?
About Security challenge & need of SOC
Introduction & Background
No More
Capex
please
Only OPEX Please
Real, aggressive and
organized Threats –
Crime as a Service
Increased Awareness in
India and across the
Globe
SOC As a Service
Business -Augments
and Complements
Existing Products and
Company Brand Image
Natural Progression and
Requirement for ESDS
as an Organization
Regulator, other Govt
Guideline’s Influence on
the Security Posturing
of Organizations
Security not Core
Business but
transitioning into a
Must Have for many
organizations.
Prohibitive Capex &
Expertise involved in
maintaining and
running a Effective
Security Team internally
Opportunity for cost
effective SOC As Service
Cyber security in Indian perspective.
Cybersecurity is gaining importance at the back of increased cyberattacks.
Estimates suggest that Indian companies have lost USD 500,000 to
cyberattacks over the last 18 months.
78% Companies with
no Cyber incident
response plan
74% Companies with
no detailed cyber risk
assessment
61% lack data leakage
prevention
62% with No logging
& monitoring of critical
systems
74% BFSI Sector is a
Top Target
63% attacks amounted
to financial loss
What is a SOC
Represents the Overall Security (Cyber, Digital & Information Security) Team functionality of any
Environment/Organization
Responsible for Assessing and implementing the Security Posture of an Organization
putting in place and managing layers of Security with the objective of protecting Information that is
valuable to the organization.
Responsible for thinking ahead of the Potential Attackers, monitoring for and plugging potential
vulnerabilities in various components.
Involves infrastructure, Process, People & various Systems/Devices for covert and reactive
monitoring, Assessment, Testing & remediation of threats both potential and actual.
Involves continuous knowledge, skill & System /Technology Augmentation to fish out potential
Threats from tons of data collected and analyzed.
SOC As Service - ESDS Perspective
Customer 1
Customer 2
Customer N
 Managing Various Security Functions (Security
Assessment, Threat management etc.) for
Organisations as a Service via partial or complete
utilization of ESDS SOC.
 Subscription based or one time service based on
the Service offered.
 Leverages the Existing Cloud and Hosting Service
Infrastructure, people, process & Brand value
 Cost effective Security Services offering achieved
through multitenant utilization of
Resources/Security Systems /appliances , People
and infrastructure
 Protects against Odd hour Security threats and
Cyber attacks through 24x7x365 based SOC.
Top Cyber security threats Globally.
Ransomware
Trojan (Trojan Horse)
Phishing
Insider threat
TOP
Cyber
Security
Threats
Social Engineering
Exploit Kits
What value we offer?About ESDS SOC services
eNlight Cloud Hosting on Patented
Technology
Software Products
ESDS - Business Model
SAP HANA Community Cloud
Government Community Cloud
Smart Cities Community Cloud
Enterprise Community Cloud
Banking & FSI Community Cloud
Public Cloud
Remote Managed Services for on-
premise Data Centers and eNlight 360°
Customers
Database Administration
OS Management
Cloud Enablement and Migration
Application Support
SOC Services
Network / Storage / Backup Mgmt
ESDS has innovative
hybrid offerings.
Complete Coverage No Capex only Opex Experience of 10+ years
Cost Effective Services 24X7X365 Available Certified Team
Managing Various Security
Functions (Security Assessment,
Threat management etc.) for
Organisations as a Service via
partial or complete utilization
of ESDS SOC.
Subscription based or one time
service based on the Service
offered.
Leverages the Existing Cloud
and Hosting Service
Infrastructure, people, process
& Brand value
Cost effective Security
Services offering achieved
through multitenant
utilization of
Resources/Security Systems
/appliances , People and
infrastructure
Protects against Odd hour
Security threats and Cyber
attacks through 24x7x365
based SOC.
ESDS has best in industry
, highly experience &
certified team of expert
security engineers.
What value
we offer ?
About ESDS SOC Services offerings &
benefits to you.
What value
we offer ?
About ESDS SOC Services offerings &
benefits to you.
Exuberant Support Industry Recognition Trusted Alliances
Preferred Choice Govt. Initiatives Great Place to Work
The Company focuses on
providing exuberant and
multilingual support to its
customers round the clock.
Company’s proven track record
and success is recognized by
the industry Partnering with
ESDS has helped Giant IT
companies such as Oracle,
Dell, Mastek, ATOS, KPIT to be
the lowest bidder for SaaS
offerings.
Oracle, Dell, Mastek, ATOS,
KPIT, Infrasoft, Virmati & FIS
Global have recently
partnered with company
Jointly approach the market
with combined service and
product offerings.
Company has been preferred
by many large organizations
against its competitors on the
basis of its execution skills,
strong SLA’s and technology
expertise in Cloud.
Recent initiatives taken by
the Central government
like MUDRA Bank, Startup
India, Standup India and
the Smart cities initiative
has only 1 winner and that
is “eNlight Cloud”.
ESDS in 2018 won the
most prestigious “Great
Place to Work”
3rd Time in a Row.
Ranked 8th in All India
ranking.
ESDS
Certifications
WORLD CLASS DATA-CENTER STANDARDS
CRISIL
Uptime TIER III TIA TIER III
ISO/SEC 20000 ISO 9001/2005
ISO 27001/2005 ISO 22301:2012
PCI-DSS CMMi Level - III
Meity Empanel
Nashik DC ->
Mumbai DC ->
ESDS SOC Services
Fully managed Service portfolio
SecurityInSight
Services
EagleEye
Services
TotalSecure
Services
How you get benefited?About ESDS SOC Services
ESDS SOC Services
Fully managed Service portfolio
SecurityInSight
Services
EagleEye
Services
TotalSecure
Services
Security InSight Services
• Everyday we hear at least one case where an organization was attacked due to no or weak
security which turned out to be a great loss for them. Online threats are very common these
days but the security concerns are increasing day-by-day.
• Organizations worry about the loss of their business, finance and reputation in case a security
attack comes their way and often question their organization’s preparedness to handle such
incidents.
• ESDS has been analyzing data and customer environments for years and with such expertise,
ESDS helps organizations get answer to their questions by consulting and providing security for
their business needs via Security InSight Services
Security InSight Services - Covers
• Project Driven Approach
• Security posturing assessment
• Security Incident & Threat Analysis
• Gap Analysis
• Network Security Assessment
• Email Assessment
• Wireless Assessment
• Malware Threat Modeling
• Database Activity monitoring & Vulnerability Scanning
• SIEM effectiveness modeling
• Configuration Auditing
• Process Auditing
• Application Vulnerability Assessment
• DDOS Attack Preparedness Testing
• DLP Analysis
Customer
centric
approach in
service
planning &
Execution
Experienced
Security
professionals
onsite & at ESDS
based for
effective Service
delivery
Requirement based
Best in breed onsite
and ESDS cloud
based tools
Leverages ESDS
Panel of experts in
various faculties of
IT internally
for analysis and
recommendations
Detailed Customer
Customizable
Reports and
Presentations
SOC Services
Landing URL:
https://esds.co.in/soc-as-a-service

More Related Content

What's hot

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
Komand
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
AlienVault
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
Infosec
 

What's hot (20)

Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 

Similar to WHY SOC Services needed?

Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
Sabrina Chan
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Lviv Startup Club
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
dchadwick
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
Srinivasan M.S
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
ACS Networks & Technologies
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
SafeNet
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRPaul Enright
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 
4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global
DevLabs Global
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
Sneha .
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
Insights success media and technology pvt ltd
 
What is Cloud Based Network Security ? | Reves Enterprise
What is Cloud Based Network Security ? | Reves EnterpriseWhat is Cloud Based Network Security ? | Reves Enterprise
What is Cloud Based Network Security ? | Reves Enterprise
Reves Enterprise
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
seoteameits
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
frenchnenglish bulldog4u
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
Tesseract Consulting
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
InsightsSuccess3
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
ITrust - Cybersecurity as a Service
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
Lori McInnes
 

Similar to WHY SOC Services needed? (20)

Cyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data LtdCyber security service portfolio of Future Data Ltd
Cyber security service portfolio of Future Data Ltd
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Seekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IRSeekintoo-Security Assessment & IR
Seekintoo-Security Assessment & IR
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
What is Cloud Based Network Security ? | Reves Enterprise
What is Cloud Based Network Security ? | Reves EnterpriseWhat is Cloud Based Network Security ? | Reves Enterprise
What is Cloud Based Network Security ? | Reves Enterprise
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
go secure cloud.pdf
go secure cloud.pdfgo secure cloud.pdf
go secure cloud.pdf
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 

More from manoharparakh

Generative AI-driven defense for safeguarding network and systems
Generative AI-driven defense for safeguarding network and systemsGenerative AI-driven defense for safeguarding network and systems
Generative AI-driven defense for safeguarding network and systems
manoharparakh
 
A Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdfA Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdf
manoharparakh
 
How Cloud Services Drive Digital Transformation
How Cloud Services Drive Digital TransformationHow Cloud Services Drive Digital Transformation
How Cloud Services Drive Digital Transformation
manoharparakh
 
How Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdfHow Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdf
manoharparakh
 
How Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdfHow Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdf
manoharparakh
 
Top 10 Data Centers in India in 2024.pdf
Top 10 Data Centers in India in 2024.pdfTop 10 Data Centers in India in 2024.pdf
Top 10 Data Centers in India in 2024.pdf
manoharparakh
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
manoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
manoharparakh
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
manoharparakh
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?
manoharparakh
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offerings
manoharparakh
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproof
manoharparakh
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdf
manoharparakh
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Email
manoharparakh
 
Cloud for startups
Cloud for startupsCloud for startups
Cloud for startups
manoharparakh
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Driving
manoharparakh
 

More from manoharparakh (20)

Generative AI-driven defense for safeguarding network and systems
Generative AI-driven defense for safeguarding network and systemsGenerative AI-driven defense for safeguarding network and systems
Generative AI-driven defense for safeguarding network and systems
 
A Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdfA Guide to the Role of Generative AI in Cybersecurity.pdf
A Guide to the Role of Generative AI in Cybersecurity.pdf
 
How Cloud Services Drive Digital Transformation
How Cloud Services Drive Digital TransformationHow Cloud Services Drive Digital Transformation
How Cloud Services Drive Digital Transformation
 
How Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdfHow Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdf
 
How Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdfHow Cloud Services Drive Digital Transformation (2).pdf
How Cloud Services Drive Digital Transformation (2).pdf
 
Top 10 Data Centers in India in 2024.pdf
Top 10 Data Centers in India in 2024.pdfTop 10 Data Centers in India in 2024.pdf
Top 10 Data Centers in India in 2024.pdf
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?What is SOC and why do banks need SOC-as-a-Service?
What is SOC and why do banks need SOC-as-a-Service?
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
ESDS Community Cloud Offerings
ESDS Community Cloud OfferingsESDS Community Cloud Offerings
ESDS Community Cloud Offerings
 
Cloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks FutureproofCloud Computing- Making Banks Futureproof
Cloud Computing- Making Banks Futureproof
 
Considering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdfConsidering Data Centers in India to Overcome Economic Conditions.pdf
Considering Data Centers in India to Overcome Economic Conditions.pdf
 
Email Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating EmailEmail Migration- Essential Questions to Ask Before Migrating Email
Email Migration- Essential Questions to Ask Before Migrating Email
 
Cloud for startups
Cloud for startupsCloud for startups
Cloud for startups
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Driving
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

WHY SOC Services needed?

  • 2. WHY SOC Services needed? WHAT value we offer? HOW you get Benefited ? SOC SERVICES
  • 3. If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. ― Sun Tzu, The Art of War ” “
  • 4. WHY SOC Services needed? About Security challenge & need of SOC
  • 5. Introduction & Background No More Capex please Only OPEX Please Real, aggressive and organized Threats – Crime as a Service Increased Awareness in India and across the Globe SOC As a Service Business -Augments and Complements Existing Products and Company Brand Image Natural Progression and Requirement for ESDS as an Organization Regulator, other Govt Guideline’s Influence on the Security Posturing of Organizations Security not Core Business but transitioning into a Must Have for many organizations. Prohibitive Capex & Expertise involved in maintaining and running a Effective Security Team internally Opportunity for cost effective SOC As Service
  • 6. Cyber security in Indian perspective. Cybersecurity is gaining importance at the back of increased cyberattacks. Estimates suggest that Indian companies have lost USD 500,000 to cyberattacks over the last 18 months. 78% Companies with no Cyber incident response plan 74% Companies with no detailed cyber risk assessment 61% lack data leakage prevention 62% with No logging & monitoring of critical systems 74% BFSI Sector is a Top Target 63% attacks amounted to financial loss
  • 7. What is a SOC Represents the Overall Security (Cyber, Digital & Information Security) Team functionality of any Environment/Organization Responsible for Assessing and implementing the Security Posture of an Organization putting in place and managing layers of Security with the objective of protecting Information that is valuable to the organization. Responsible for thinking ahead of the Potential Attackers, monitoring for and plugging potential vulnerabilities in various components. Involves infrastructure, Process, People & various Systems/Devices for covert and reactive monitoring, Assessment, Testing & remediation of threats both potential and actual. Involves continuous knowledge, skill & System /Technology Augmentation to fish out potential Threats from tons of data collected and analyzed.
  • 8. SOC As Service - ESDS Perspective Customer 1 Customer 2 Customer N  Managing Various Security Functions (Security Assessment, Threat management etc.) for Organisations as a Service via partial or complete utilization of ESDS SOC.  Subscription based or one time service based on the Service offered.  Leverages the Existing Cloud and Hosting Service Infrastructure, people, process & Brand value  Cost effective Security Services offering achieved through multitenant utilization of Resources/Security Systems /appliances , People and infrastructure  Protects against Odd hour Security threats and Cyber attacks through 24x7x365 based SOC.
  • 9. Top Cyber security threats Globally. Ransomware Trojan (Trojan Horse) Phishing Insider threat TOP Cyber Security Threats Social Engineering Exploit Kits
  • 10. What value we offer?About ESDS SOC services
  • 11. eNlight Cloud Hosting on Patented Technology Software Products ESDS - Business Model SAP HANA Community Cloud Government Community Cloud Smart Cities Community Cloud Enterprise Community Cloud Banking & FSI Community Cloud Public Cloud Remote Managed Services for on- premise Data Centers and eNlight 360° Customers Database Administration OS Management Cloud Enablement and Migration Application Support SOC Services Network / Storage / Backup Mgmt ESDS has innovative hybrid offerings.
  • 12. Complete Coverage No Capex only Opex Experience of 10+ years Cost Effective Services 24X7X365 Available Certified Team Managing Various Security Functions (Security Assessment, Threat management etc.) for Organisations as a Service via partial or complete utilization of ESDS SOC. Subscription based or one time service based on the Service offered. Leverages the Existing Cloud and Hosting Service Infrastructure, people, process & Brand value Cost effective Security Services offering achieved through multitenant utilization of Resources/Security Systems /appliances , People and infrastructure Protects against Odd hour Security threats and Cyber attacks through 24x7x365 based SOC. ESDS has best in industry , highly experience & certified team of expert security engineers. What value we offer ? About ESDS SOC Services offerings & benefits to you.
  • 13. What value we offer ? About ESDS SOC Services offerings & benefits to you. Exuberant Support Industry Recognition Trusted Alliances Preferred Choice Govt. Initiatives Great Place to Work The Company focuses on providing exuberant and multilingual support to its customers round the clock. Company’s proven track record and success is recognized by the industry Partnering with ESDS has helped Giant IT companies such as Oracle, Dell, Mastek, ATOS, KPIT to be the lowest bidder for SaaS offerings. Oracle, Dell, Mastek, ATOS, KPIT, Infrasoft, Virmati & FIS Global have recently partnered with company Jointly approach the market with combined service and product offerings. Company has been preferred by many large organizations against its competitors on the basis of its execution skills, strong SLA’s and technology expertise in Cloud. Recent initiatives taken by the Central government like MUDRA Bank, Startup India, Standup India and the Smart cities initiative has only 1 winner and that is “eNlight Cloud”. ESDS in 2018 won the most prestigious “Great Place to Work” 3rd Time in a Row. Ranked 8th in All India ranking.
  • 14. ESDS Certifications WORLD CLASS DATA-CENTER STANDARDS CRISIL Uptime TIER III TIA TIER III ISO/SEC 20000 ISO 9001/2005 ISO 27001/2005 ISO 22301:2012 PCI-DSS CMMi Level - III Meity Empanel Nashik DC -> Mumbai DC ->
  • 15. ESDS SOC Services Fully managed Service portfolio SecurityInSight Services EagleEye Services TotalSecure Services
  • 16. How you get benefited?About ESDS SOC Services
  • 17. ESDS SOC Services Fully managed Service portfolio SecurityInSight Services EagleEye Services TotalSecure Services
  • 18. Security InSight Services • Everyday we hear at least one case where an organization was attacked due to no or weak security which turned out to be a great loss for them. Online threats are very common these days but the security concerns are increasing day-by-day. • Organizations worry about the loss of their business, finance and reputation in case a security attack comes their way and often question their organization’s preparedness to handle such incidents. • ESDS has been analyzing data and customer environments for years and with such expertise, ESDS helps organizations get answer to their questions by consulting and providing security for their business needs via Security InSight Services
  • 19. Security InSight Services - Covers • Project Driven Approach • Security posturing assessment • Security Incident & Threat Analysis • Gap Analysis • Network Security Assessment • Email Assessment • Wireless Assessment • Malware Threat Modeling • Database Activity monitoring & Vulnerability Scanning • SIEM effectiveness modeling • Configuration Auditing • Process Auditing • Application Vulnerability Assessment • DDOS Attack Preparedness Testing • DLP Analysis Customer centric approach in service planning & Execution Experienced Security professionals onsite & at ESDS based for effective Service delivery Requirement based Best in breed onsite and ESDS cloud based tools Leverages ESDS Panel of experts in various faculties of IT internally for analysis and recommendations Detailed Customer Customizable Reports and Presentations