SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Commercial in Confidence 1
Enterprise Security Services
Symantec ™ Web Content Service
Managed staff access to inappropriate or malicious web based content
Overview
Organisations around the world provide the
Internet for staff to perform their work.
Unfortunately a large amount of content available
through this medium contains viruses and
illegal or inappropriate content.
During Jul to Dec 2004, 7360 new viruses and
worms were detected, an increase of 64% on
the previous 6 months, and a 300% increase over
the same period the previous year. (Source:
Symantec Internet Security Threat Report VII)
There is no debate and numerous examples
within organisations where content containing
illegal or inappropriate content has created legal
and complex HR issues. Organisations
continue to set policy and attempt to educate
staff. However traditional approaches have not
been as effective as management would like.
To effectively address the issue, you need an
approach which will continuously monitor and
screen content being accessed by staff according
to your corporate policy.
Symantec Web Content Control Service (SWCS)
manages this business risk for your organisation.
This service manages all inappropriate, offensive,
illegal and malicious content which staff may
access. Figure 1 highlights this model.
Figure 1 - Web Content Control Overview
This service leverages people, process and
technology to deliver a capability which is more
effective and cost effective than an organisation
can provided with internal resources.
Key Benefits
The key benefits to your organisation are:
Reduce HR & legal issues – Stop
inappropriate and offensive content being
accessed by staff.
Reduce operational costs – Lower cost than
companies can provide internally.
All year round protection – 24 hours a day,
365 days a year the service monitors and
protects your business.
Guaranteed service – Backed by Symantec
Service Level Agreements (SLA).
Predictable cost model – Fixed fee per
month service based on the number of users
with no capital costs.
Complete visibility – With direct access to
management analysis and reporting tools,
clients can view status and important statistical
information from anywhere they choose.
Key Features
Key features of the Symantec Compliance
Management service are:
Complete coverage – Coverage across all
your mobile, desktop and server environments.
Vendor independent – Manage Symantec,
heterogeneous, or other major vendor
products.
24 hour incident response capability –
The service is monitored on a 24 hour, 365
day basis with a team ready to respond and
manage issues.
Management Dashboard – A secure
management portal to view status of service.
Reporting – Regular reporting to
management on service metrics and security
statistics.
Service desk integration – Automatic
ticketing integration with Peregrine and
Remedy service desks.
Fixed contracts – Fixed price agreements
based on 3, 4 and 5 year periods.
Commercial in Confidence 2
Enterprise Security Services
Symantec ™ Web Content Service
Managed staff access to inappropriate or malicious web based content
Our Approach
As the approach is not product driven, Symantec
take a methodical process oriented approach to
ensure success. This involves:
An analysis of the customer’s current network
and internal processes.
Establishment of a transition plan for moving
to the new service.
Design, build, test and transition to the
service.
Perform reporting, maintenance, monitoring
and incident response services ongoing.
To achieving this in a cost effective manner,
Symantec:
Establishes automated processes and
capability through world leading technology.
Utilises the best industry experts to rapidly
and efficiently manage the service.
Symantec ensures this approach is globally
consistent and repeatable with a quality outcome
by:
Using Symantec tried and tested practices
integrated into your business processes.
Establishment of automated tools to manage
the content flowing between staff and the
outside world.
Simply put, all year round Symantec utilise best of
breed technology, expert people and proven
processes to establish an integrated management
practice. This approach can be demonstrated by
Figure 2.
Figure 2 - Symantec's approach
Symantec establishes and maintains three
important activities around this service:
1. 24 by 7 monitoring and incident
response – Automated services track and
notify our incident response teams of potential
and actual issues.
2. Management reports – Baseline and trend
reporting for operational and executive
management.
3. Workflow management – Automated
remediation and activity tracking integrated
into major helpdesk ticketing systems (e.g.:
Peregrine, Remedy etc).
These activities are delivered by expert staff
trained and experienced in security risk
management to ensure relevance to your business.
About Symantec
Symantec is the global leader in information
security providing services designed to help mid-
sized businesses and large enterprises secure and
manage their IT infrastructure.
Symantec Australia Head Quarters
Riverside Corporate Park
Level 2, 1 Julius Avenue
North Ryde NSW 2113
More Information
Telstra/KAZ Account Manager
Richard Dufty
Email: richard_dufty@symantec.com
Phone: 02 8220 7035
Mobile: 0414 754 325
Telstra/KAZ Business Development Manager
Glenn Hurn
Email: glenn_hurn@symantec.com
Phone: 03 9864 2629
Mobile: 0407 775 672

Contenu connexe

Tendances

CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
Jim Robins
 

Tendances (18)

Automated Regulatory Compliance Management
Automated Regulatory Compliance ManagementAutomated Regulatory Compliance Management
Automated Regulatory Compliance Management
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
A18 compliance
A18 complianceA18 compliance
A18 compliance
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Catalyst research institute
Catalyst research instituteCatalyst research institute
Catalyst research institute
 
'Re-writing' Infrastructure management
'Re-writing' Infrastructure management'Re-writing' Infrastructure management
'Re-writing' Infrastructure management
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 
Compliance Software For Proactive Compliance Management | ComplyGlobal
Compliance Software For Proactive Compliance Management | ComplyGlobalCompliance Software For Proactive Compliance Management | ComplyGlobal
Compliance Software For Proactive Compliance Management | ComplyGlobal
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
 
Comply Global
Comply GlobalComply Global
Comply Global
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 

En vedette

Prototype Sports Performance Lab Package
Prototype Sports Performance Lab PackagePrototype Sports Performance Lab Package
Prototype Sports Performance Lab Package
devale ellis
 

En vedette (16)

українська література 8 кл
українська література 8 клукраїнська література 8 кл
українська література 8 кл
 
NBIC PPT-2016
NBIC PPT-2016NBIC PPT-2016
NBIC PPT-2016
 
The petroleum cycle
The petroleum cycleThe petroleum cycle
The petroleum cycle
 
đề Tài xây dựng hệ cỡ số trang phục áo sơ mi nam
đề Tài xây dựng hệ cỡ số trang phục áo sơ mi namđề Tài xây dựng hệ cỡ số trang phục áo sơ mi nam
đề Tài xây dựng hệ cỡ số trang phục áo sơ mi nam
 
Prototype Sports Performance Lab Package
Prototype Sports Performance Lab PackagePrototype Sports Performance Lab Package
Prototype Sports Performance Lab Package
 
Creativity + Innovation 1.10
Creativity + Innovation 1.10Creativity + Innovation 1.10
Creativity + Innovation 1.10
 
презентация большая красная 10
презентация большая красная 10презентация большая красная 10
презентация большая красная 10
 
CV 1ST JAN
CV 1ST JANCV 1ST JAN
CV 1ST JAN
 
презентация пушкина 56а
презентация пушкина 56апрезентация пушкина 56а
презентация пушкина 56а
 
Cостав среды бизнес-моделирования Rytsev Business Model
Cостав среды бизнес-моделирования Rytsev Business ModelCостав среды бизнес-моделирования Rytsev Business Model
Cостав среды бизнес-моделирования Rytsev Business Model
 
Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0Statycznie czy dynamicznie? v.2.0
Statycznie czy dynamicznie? v.2.0
 
“What the App?”… A Modernization Strategy for Your Business Applications
“What the App?”… A Modernization Strategy for Your Business Applications “What the App?”… A Modernization Strategy for Your Business Applications
“What the App?”… A Modernization Strategy for Your Business Applications
 
Vectors parrallel and coplanar
Vectors  parrallel and coplanarVectors  parrallel and coplanar
Vectors parrallel and coplanar
 
To πολίτευμα και η κοινωνία της Αθήνας στα χρόνια του Περικλή
To πολίτευμα και η κοινωνία της Αθήνας στα χρόνια του ΠερικλήTo πολίτευμα και η κοινωνία της Αθήνας στα χρόνια του Περικλή
To πολίτευμα και η κοινωνία της Αθήνας στα χρόνια του Περικλή
 
H Μακεδονία, μια νέα ελληνική δύναμη. 1ο μέρος
H Μακεδονία, μια νέα ελληνική δύναμη. 1ο μέροςH Μακεδονία, μια νέα ελληνική δύναμη. 1ο μέρος
H Μακεδονία, μια νέα ελληνική δύναμη. 1ο μέρος
 
夢中にさせる授業「ゲーミフィケーション×授業」2016最新事例
夢中にさせる授業「ゲーミフィケーション×授業」2016最新事例夢中にさせる授業「ゲーミフィケーション×授業」2016最新事例
夢中にさせる授業「ゲーミフィケーション×授業」2016最新事例
 

Similaire à Symantec Secure Web Content Service - KAZ

Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
Michael Xevgenis
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
Mohan M
 

Similaire à Symantec Secure Web Content Service - KAZ (20)

Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
 
RTCM.pptx
RTCM.pptxRTCM.pptx
RTCM.pptx
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 

Symantec Secure Web Content Service - KAZ

  • 1. Commercial in Confidence 1 Enterprise Security Services Symantec ™ Web Content Service Managed staff access to inappropriate or malicious web based content Overview Organisations around the world provide the Internet for staff to perform their work. Unfortunately a large amount of content available through this medium contains viruses and illegal or inappropriate content. During Jul to Dec 2004, 7360 new viruses and worms were detected, an increase of 64% on the previous 6 months, and a 300% increase over the same period the previous year. (Source: Symantec Internet Security Threat Report VII) There is no debate and numerous examples within organisations where content containing illegal or inappropriate content has created legal and complex HR issues. Organisations continue to set policy and attempt to educate staff. However traditional approaches have not been as effective as management would like. To effectively address the issue, you need an approach which will continuously monitor and screen content being accessed by staff according to your corporate policy. Symantec Web Content Control Service (SWCS) manages this business risk for your organisation. This service manages all inappropriate, offensive, illegal and malicious content which staff may access. Figure 1 highlights this model. Figure 1 - Web Content Control Overview This service leverages people, process and technology to deliver a capability which is more effective and cost effective than an organisation can provided with internal resources. Key Benefits The key benefits to your organisation are: Reduce HR & legal issues – Stop inappropriate and offensive content being accessed by staff. Reduce operational costs – Lower cost than companies can provide internally. All year round protection – 24 hours a day, 365 days a year the service monitors and protects your business. Guaranteed service – Backed by Symantec Service Level Agreements (SLA). Predictable cost model – Fixed fee per month service based on the number of users with no capital costs. Complete visibility – With direct access to management analysis and reporting tools, clients can view status and important statistical information from anywhere they choose. Key Features Key features of the Symantec Compliance Management service are: Complete coverage – Coverage across all your mobile, desktop and server environments. Vendor independent – Manage Symantec, heterogeneous, or other major vendor products. 24 hour incident response capability – The service is monitored on a 24 hour, 365 day basis with a team ready to respond and manage issues. Management Dashboard – A secure management portal to view status of service. Reporting – Regular reporting to management on service metrics and security statistics. Service desk integration – Automatic ticketing integration with Peregrine and Remedy service desks. Fixed contracts – Fixed price agreements based on 3, 4 and 5 year periods.
  • 2. Commercial in Confidence 2 Enterprise Security Services Symantec ™ Web Content Service Managed staff access to inappropriate or malicious web based content Our Approach As the approach is not product driven, Symantec take a methodical process oriented approach to ensure success. This involves: An analysis of the customer’s current network and internal processes. Establishment of a transition plan for moving to the new service. Design, build, test and transition to the service. Perform reporting, maintenance, monitoring and incident response services ongoing. To achieving this in a cost effective manner, Symantec: Establishes automated processes and capability through world leading technology. Utilises the best industry experts to rapidly and efficiently manage the service. Symantec ensures this approach is globally consistent and repeatable with a quality outcome by: Using Symantec tried and tested practices integrated into your business processes. Establishment of automated tools to manage the content flowing between staff and the outside world. Simply put, all year round Symantec utilise best of breed technology, expert people and proven processes to establish an integrated management practice. This approach can be demonstrated by Figure 2. Figure 2 - Symantec's approach Symantec establishes and maintains three important activities around this service: 1. 24 by 7 monitoring and incident response – Automated services track and notify our incident response teams of potential and actual issues. 2. Management reports – Baseline and trend reporting for operational and executive management. 3. Workflow management – Automated remediation and activity tracking integrated into major helpdesk ticketing systems (e.g.: Peregrine, Remedy etc). These activities are delivered by expert staff trained and experienced in security risk management to ensure relevance to your business. About Symantec Symantec is the global leader in information security providing services designed to help mid- sized businesses and large enterprises secure and manage their IT infrastructure. Symantec Australia Head Quarters Riverside Corporate Park Level 2, 1 Julius Avenue North Ryde NSW 2113 More Information Telstra/KAZ Account Manager Richard Dufty Email: richard_dufty@symantec.com Phone: 02 8220 7035 Mobile: 0414 754 325 Telstra/KAZ Business Development Manager Glenn Hurn Email: glenn_hurn@symantec.com Phone: 03 9864 2629 Mobile: 0407 775 672