SlideShare a Scribd company logo
1 of 33
Services Description 
October 2014
AGENDA 
● Cloud: 
○ Own v/s Lease 
○ Decentralization of IT 
● Network Security: 
○ Threats 
○ Impact and Urgency 
○ Cost of Breach 
○ Logs 
● Solution 
○ Overview 
○ Architecture 
○ Packages 
● Backup Slides
CLOUD
Cloud : Own versus Lease 
● Own the asset: you 
can modify it as 
you please 
● You can sell it 
whenever you 
want 
● More economical 
on the long run 
● High Investment - 
Depreciation 
● Lower down payment 
● Lower monthly 
payments 
● Lower maintenance 
costs 
● Ability to modify the 
offering at any time 
● Ability to change asset 
every year or two 
● Faster time to install 
● No need for in-house 
expertise 
● No rent space 
● Increase or decrease 
capacity at will 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud Services 
Deploy faster and easier 
Decrease budget and avoid 
vendor lock-in 
Lower footprint on your network 
Save on technology upgrades and 
maintenance 
Ensure compliance to regulatory 
mandates. 
Gartner defines cloud 
computing as “...a style of 
computing in which 
scalable and elastic IT-enabled 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
capabilities are 
delivered as a service 
using Internet 
technologies.”
Cloud: Decentralization of IT 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
On-Premises 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
IaaS 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
PaaS 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
SaaS
SaaS: ROI 
Line item Cloud On-premise 
Initial license fee None Extensive 
Subscription fee Charged by usage None 
Maintenance fees Included Percentage of license fee 
Support costs Included Extra 
IT stang Significant reductions Significant 
Data center upkeep and 
maintenance 
None Large, ongoing 
Upgrade fees Included Significant 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
NETWORK SECURITY
Threats 
Trojan Horse 
File infection 
Spam email 
zero-day attacks 
Software vulnerabilities 
OS vulnerabilities 
Identify theft 
Mobile Loss 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Phishing
Causes 
Ponemon Institute / Symantec - Cost of Data Breach Study 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Impact 
and 
Urgency 
4 3 2 
3 2 
2 1 1 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
1 
Business Process 
affected. 
Workaround 
available. 
Business Process 
stopped. Can bare 
minimal delay. 
Very hard 
workaround 
Business Process 
stopped. No work 
around 
Urgency 
Impact 
Any system minor 
degradation non-business 
critical. 
<50% of users 
impacted 
Any system 
degraded or 
partially 
unavailable. >50% 
of users impacted 
Any system 
unavailable. 
100% of users 
impacted
Cost of Breach 
IBM Data Breach Statistics 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Logs 
log /lôg läg/ - noun 
"a record of performance, events, or day-to-day activities" 
synonyms: record, register, logbook, journal, diary, chronicle, 
daybook, record book, ledger; 
SNMP 
ODBC 
WMI 
SDEE 
CPMI 
syslog 
netflow 
ssh 
native FIM 
Registry 
Monitor 
custom XML-based 
One Solution 
Vulnerability 
Scanner 
Configuration 
Management 
Asset Analytics 
Performance 
Monitoring 
Network 
Behaviour 
Analysis 
RDEP Forensics 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Log 
Management
Log Management 
Functionality 
Log Management 
(LM) 
Security Information and Event 
Managment (SIEM) 
Log collection Collect all logs Collect security relevant logs + context data 
Log pre-processing 
Indexing, parsing 
Parsing (universal collection), normalization, 
categorization, enrichment 
Log retention Retain raw log data Retain parsed and normalized data 
Reporting Broad use reporting 
Focused reporting: security, asset, 
configuration... 
Analysis Full test analysis, tagging 
Real-time event correlation, threat scoring, 
event prioritization 
Alerting and 
notification 
Simple alerting on all logs 
Categorized focused alerting, user activity, 
dashboards, monitors, file integrity monitoring 
Other features 
High scalability of collection 
and storage 
Incident Management, analyst workflow, 
context analysis, forensics, configuration audit, 
application monitoring, compliance 
automation, vulnerability monitoring 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
SOLUTION 
SIEM as a Service
Solution Overview 
MSS is a Unified Security Management service that 
combines multiple security functions in a single 
console: 
● SIEM (security information and event 
management) 
● Secure Configuration Auditing 
● Compliance Automation 
● Contextual Forensic Analysis 
Network state and event data is collected 
continuously. The system deploys alert 
correlations schemes to identify suspicious activity 
that can develop into threats affecting your 
business. 
Network data collected is compressed and 
encrypted to avoid network congestion and 
ensure maximum security of your data. 
‘... customers need to 
examine security event 
data in real time for 
internal and external 
threat management, and 
to collect, store, analyze 
and report on log data for 
incident response, 
forensics, and regulatory 
compliance…’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Architecture 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Key Components 
● Full SIEM deployment with real-time security monitoring, 
historical analysis and event correlation 
● 24x7 security and configuration device monitoring: 
IPS/Firewall/VPN/Servers/Virtual Environments; up to 
160 different node types 
● Customized web-portal dashboard to provide real-time 
reports and statistics 
● Dedicated engineering consultants to support with 
forensic investigation and remediation 
● Compliance and security risk reviews: PCI DSS, HIPAA, 
ISO27001/27002, COBIT, NIST800-53… 
● Consulting Services - Security Posture Analysis and 
Recommendation 
● Full Engineering and Management Services 
‘...the technology 
provides real-time 
security monitoring, 
historical analysis, and 
other support for incident 
investigation and 
compliance reporting...’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Dashboards Online 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Demo:
Summary 
Get Security Monitoring installed in minutes 
Low monthly subscription fees 
Scale very easily 
Leverage DataConsult’s expertise in security 
Ensure compliance to regulatory mandates. 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Packages 
MSS feature 
MSS1 
(Reporting) 
MSS2 
(Premium) 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
MSSe 
(Consulting) 
MSSe+ 
(Managed) 
Log Collection X X X X 
Event Reporting X X X X 
Asset and Performance Monitoring X X X X 
Daily Security Status Reports X X X X 
Forensic Investigations X X X 
Configuration and Asset Management X X X 
Event Correlation X X X 
Network Behaviour Analysis X X X 
24x7 Live Alert Monitoring & Notification X X X 
Monthly Health Reports X X X 
Compliance Automation X X 
Security Analysis and Recommendation X X 
Remediation and Control X 
Full Device Management X
Thank You
BACKUP SLIDES 
Screen Shots
Critical Events per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Denied Connections per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Alert Configuration 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Blocking 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
User by Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
BACKUP SLIDES 
References
MALicious softWARE 
Cisco Annual Security Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Vulnerabilities 
Kaspersky Security Bulletin 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Mobile Device Theft 
Sophos Security Threat Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

More Related Content

What's hot

SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
akquinet enterprise solutions GmbH
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
SolarWinds
 

What's hot (20)

Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
AccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC ConvergenceAccelOps &amp; SOC-NOC Convergence
AccelOps &amp; SOC-NOC Convergence
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Ambesh
AmbeshAmbesh
Ambesh
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
 
Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
PRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADAPRESENTATION ON PLC AND SCADA
PRESENTATION ON PLC AND SCADA
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 

Viewers also liked

Promat Oil & Gas Brochure
Promat Oil & Gas BrochurePromat Oil & Gas Brochure
Promat Oil & Gas Brochure
Prasad Mandava
 
All about me gareth rollason
All about me gareth rollasonAll about me gareth rollason
All about me gareth rollason
mdhih123
 
Exploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level RevisitedExploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level Revisited
Saepio Technologies
 

Viewers also liked (20)

Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attack
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 
Real Time Target Marketing
Real Time Target MarketingReal Time Target Marketing
Real Time Target Marketing
 
Pulseras de cuero
 Pulseras de cuero Pulseras de cuero
Pulseras de cuero
 
Promat Oil & Gas Brochure
Promat Oil & Gas BrochurePromat Oil & Gas Brochure
Promat Oil & Gas Brochure
 
Europroperties Web Tv Presentation
Europroperties Web Tv PresentationEuroproperties Web Tv Presentation
Europroperties Web Tv Presentation
 
Presentación monica botero
Presentación monica boteroPresentación monica botero
Presentación monica botero
 
All about me gareth rollason
All about me gareth rollasonAll about me gareth rollason
All about me gareth rollason
 
Presentacion Memoria Jung Mayo 2015
Presentacion Memoria Jung Mayo 2015Presentacion Memoria Jung Mayo 2015
Presentacion Memoria Jung Mayo 2015
 
Exploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level RevisitedExploding Brand Value at the Local Level Revisited
Exploding Brand Value at the Local Level Revisited
 
Loesungen fuer die Hydraulik
Loesungen fuer die HydraulikLoesungen fuer die Hydraulik
Loesungen fuer die Hydraulik
 

Similar to Data Consult Managed Security Services

Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similar to Data Consult Managed Security Services (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Information Security
Information SecurityInformation Security
Information Security
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Data Consult Managed Security Services

  • 2. AGENDA ● Cloud: ○ Own v/s Lease ○ Decentralization of IT ● Network Security: ○ Threats ○ Impact and Urgency ○ Cost of Breach ○ Logs ● Solution ○ Overview ○ Architecture ○ Packages ● Backup Slides
  • 4. Cloud : Own versus Lease ● Own the asset: you can modify it as you please ● You can sell it whenever you want ● More economical on the long run ● High Investment - Depreciation ● Lower down payment ● Lower monthly payments ● Lower maintenance costs ● Ability to modify the offering at any time ● Ability to change asset every year or two ● Faster time to install ● No need for in-house expertise ● No rent space ● Increase or decrease capacity at will © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 5. Cloud Services Deploy faster and easier Decrease budget and avoid vendor lock-in Lower footprint on your network Save on technology upgrades and maintenance Ensure compliance to regulatory mandates. Gartner defines cloud computing as “...a style of computing in which scalable and elastic IT-enabled © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission capabilities are delivered as a service using Internet technologies.”
  • 6. Cloud: Decentralization of IT Users Data Application Tools Database Network OS Hardware On-Premises Users Data Application Tools Database Network OS Hardware IaaS Users Data Application Tools Database Network OS Hardware PaaS © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Users Data Application Tools Database Network OS Hardware SaaS
  • 7. SaaS: ROI Line item Cloud On-premise Initial license fee None Extensive Subscription fee Charged by usage None Maintenance fees Included Percentage of license fee Support costs Included Extra IT stang Significant reductions Significant Data center upkeep and maintenance None Large, ongoing Upgrade fees Included Significant © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 9. Threats Trojan Horse File infection Spam email zero-day attacks Software vulnerabilities OS vulnerabilities Identify theft Mobile Loss © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Phishing
  • 10. Causes Ponemon Institute / Symantec - Cost of Data Breach Study 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 11. Impact and Urgency 4 3 2 3 2 2 1 1 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 1 Business Process affected. Workaround available. Business Process stopped. Can bare minimal delay. Very hard workaround Business Process stopped. No work around Urgency Impact Any system minor degradation non-business critical. <50% of users impacted Any system degraded or partially unavailable. >50% of users impacted Any system unavailable. 100% of users impacted
  • 12. Cost of Breach IBM Data Breach Statistics 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 13. Logs log /lôg läg/ - noun "a record of performance, events, or day-to-day activities" synonyms: record, register, logbook, journal, diary, chronicle, daybook, record book, ledger; SNMP ODBC WMI SDEE CPMI syslog netflow ssh native FIM Registry Monitor custom XML-based One Solution Vulnerability Scanner Configuration Management Asset Analytics Performance Monitoring Network Behaviour Analysis RDEP Forensics © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Log Management
  • 14. Log Management Functionality Log Management (LM) Security Information and Event Managment (SIEM) Log collection Collect all logs Collect security relevant logs + context data Log pre-processing Indexing, parsing Parsing (universal collection), normalization, categorization, enrichment Log retention Retain raw log data Retain parsed and normalized data Reporting Broad use reporting Focused reporting: security, asset, configuration... Analysis Full test analysis, tagging Real-time event correlation, threat scoring, event prioritization Alerting and notification Simple alerting on all logs Categorized focused alerting, user activity, dashboards, monitors, file integrity monitoring Other features High scalability of collection and storage Incident Management, analyst workflow, context analysis, forensics, configuration audit, application monitoring, compliance automation, vulnerability monitoring © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 15. SOLUTION SIEM as a Service
  • 16. Solution Overview MSS is a Unified Security Management service that combines multiple security functions in a single console: ● SIEM (security information and event management) ● Secure Configuration Auditing ● Compliance Automation ● Contextual Forensic Analysis Network state and event data is collected continuously. The system deploys alert correlations schemes to identify suspicious activity that can develop into threats affecting your business. Network data collected is compressed and encrypted to avoid network congestion and ensure maximum security of your data. ‘... customers need to examine security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics, and regulatory compliance…’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 17. Architecture © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 18. Key Components ● Full SIEM deployment with real-time security monitoring, historical analysis and event correlation ● 24x7 security and configuration device monitoring: IPS/Firewall/VPN/Servers/Virtual Environments; up to 160 different node types ● Customized web-portal dashboard to provide real-time reports and statistics ● Dedicated engineering consultants to support with forensic investigation and remediation ● Compliance and security risk reviews: PCI DSS, HIPAA, ISO27001/27002, COBIT, NIST800-53… ● Consulting Services - Security Posture Analysis and Recommendation ● Full Engineering and Management Services ‘...the technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting...’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 19. Dashboards Online © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Demo:
  • 20. Summary Get Security Monitoring installed in minutes Low monthly subscription fees Scale very easily Leverage DataConsult’s expertise in security Ensure compliance to regulatory mandates. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 21. Packages MSS feature MSS1 (Reporting) MSS2 (Premium) © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission MSSe (Consulting) MSSe+ (Managed) Log Collection X X X X Event Reporting X X X X Asset and Performance Monitoring X X X X Daily Security Status Reports X X X X Forensic Investigations X X X Configuration and Asset Management X X X Event Correlation X X X Network Behaviour Analysis X X X 24x7 Live Alert Monitoring & Notification X X X Monthly Health Reports X X X Compliance Automation X X Security Analysis and Recommendation X X Remediation and Control X Full Device Management X
  • 24. Critical Events per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 25. Denied Connections per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 26. Alert Configuration © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 27. Destination Blocking © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 28. Destination Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 29. User by Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 31. MALicious softWARE Cisco Annual Security Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 32. Vulnerabilities Kaspersky Security Bulletin 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 33. Mobile Device Theft Sophos Security Threat Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission