SlideShare a Scribd company logo
Axxera
Security Solutions
Contents

Security Market Trends


    Company Profile


      Framework


    Products & Services


Partners
Security Market Trends – Top 10 threats


1. Excessive Internal Data Access Privileges
2. Thirty Party Access
3. Political Hactivism
4. Social Engineering
5. Mobile Threats
6. Steganography
7. Internal / External Vulnerabilities
8. Wireless Security
9. Advanced Malware Detection
10.Content Management
Security Cycle




     A             P                S




Availability   Performance      Security
Product & Services


        1                    2                    3               4

     PRODUCT               MSSP                  MSP          Consulting

  Central              Managed             Managed Services      Security
Intelligence         Security            Provider             Professional
                     Services Provider                          Services
  Integrated SIEM                          Availability &
                       Cloud Security    Performance
 Security Incident   Services            Monitoring
Event Management
1. Integrated S I E M

•Integrated SIEM
                                                                    SIEM
       Correlation Engine
       CI Logger
       Sensors - Integration with over 250 products ( Cisco, HP, McAfee,
       Sentrigo, Entrust, Encase, Tipping Point, Tripwire, Websense, Bluecoat etc )

       Portal / Console
       ITIL based Ticketing System ( auto ticketing )
       Reporting - Business Intelligence Tool
       Security Action Plans ( Knowledge Base )

• Compliancy – HIPPA, GLBA, FISMA, PCI DSS, SOX etc
Axxera Security Solutions
1. S I E M Solution cont

                             Users

                  Portal

3rd Party                            Axxera CI
  Tools
                                     •   Correlation
   •Cisco        Ticketing                  • ITIL

                                         • Sensors
•IPS Tipping
                                         • Log Mgt
    Point        CI Engine
                                           • Auto
 •Blue Coat
  •Imperva
                                         Ticketing
  •Tripwire
                 Reporting
 •Cyber-Ark




                 Console


                              SOC
2. Managed Security Services

Managed Security Services
         Early Warning Protection
         IDS/IPS Monitoring & Management
         Firewall Monitoring & Management
         Vulnerability Management
         Infection Management
         Database Security
         Web Application
         Log Management

Advantages –
          Dynamic Early Warning & Real-time Protection
          Prevents - SPAM, VIRUS, ZERO DAY ATTACKS
          Prevents exploits from occurring
          Centralized View – IDS. Firewall, Vulnerability, Patch
        Management, Database Security, Web Application etc
          Live & Historical Compliance Reporting
3. Infrastructure Management

Infrastructure Management Services
  Network Monitoring & Management
  System Monitoring & Management
  Application Monitoring & Management
  Database Monitoring & Management
  Synthetic Transaction Monitoring & Management
  Reporting & Analysis

             Advantages –
              24x7 Pro-active Monitoring of Infrastructure
              View Impact on infrastructure during security incident
              Integration of IT monitoring toolsets
              Prevents - System or Network outages
              Centralized Portal View for reporting
              SLA management of Infrastructure Stability & Performance
4. Security Assessment

1.   - Security Assessment and Auditing - Services
2.   - Vulnerability Assessment
3.   - Security Policy & Procedures review
4.    - Penetration Testing
5.   - Forensic Services
6.   - Web Application Penetration Testing
7.   - Web Application Database Testing                Security Policies
8.   - Onsite Professional Services
                                              Web App / DB Testing


                                        Vulnerability Assessment


                                     Security Assessment
Security Portal & Console ( SIEM, MSP, MSSP )

Early Warning Console
    Early Warning Attack Tracking
    Early Warning C&C Tracking
    Global Botnet tracking




                                    Real-time Portal
                                      Security Attack / Vulnerability
                                      Monitoring
                                      Availability & Performance Monitoring
                                      Ticketing System
                                      SLA Management
                                      Reporting engine
Organization Partners

• Integrated with today’s security organizations exchanging
  Attack & Vulnerability trends & Intelligence
Axxera Security Solutions

More Related Content

PDF
Axxera Security Solutions Ver 2.0
PDF
IBM Security SaaS IaaS and PaaS
PDF
Zero Trust Enterprise Network at Adobe
PPTX
The Zero Trust Model of Information Security
PDF
IBM MaaS360 with watson
PDF
Ibm security domains 2015[3]
PDF
Workshop: Threat Intelligence - Part 1
PDF
IBM Security Software Solutions - One Pager
Axxera Security Solutions Ver 2.0
IBM Security SaaS IaaS and PaaS
Zero Trust Enterprise Network at Adobe
The Zero Trust Model of Information Security
IBM MaaS360 with watson
Ibm security domains 2015[3]
Workshop: Threat Intelligence - Part 1
IBM Security Software Solutions - One Pager

What's hot (20)

PDF
[Round table] zeroing in on zero trust architecture
PPTX
Zero Trust Framework for Network Security​
PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
PPTX
What is zero trust model (ztm)
PPTX
Zero Trust Network Access
PDF
IBM Security Software Solutions
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
PPTX
What is Zero Trust
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
Security Information Event Management - nullhyd
PPTX
Zero Trust Networks
PDF
3 Tips for Choosing a Next Generation Firewall
PPT
Extend Your Market Reach with IBM Security QRadar for MSPs
PDF
Top 7 Security Measures for IoT Systems
PPTX
SIEM Primer:
PDF
Malicious Mobile Code Fact Sheet from Finjan
PPTX
Zero Trust Model
PPTX
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
[Round table] zeroing in on zero trust architecture
Zero Trust Framework for Network Security​
Navigating the Zero Trust Journey for Today's Everywhere Workplace
What is zero trust model (ztm)
Zero Trust Network Access
IBM Security Software Solutions
Adopting A Zero-Trust Model. Google Did It, Can You?
Micro segmentation and zero trust for security and compliance - Guardicore an...
What is Zero Trust
LoginCat - Zero Trust Integrated Cybersecurity
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Security Information Event Management - nullhyd
Zero Trust Networks
3 Tips for Choosing a Next Generation Firewall
Extend Your Market Reach with IBM Security QRadar for MSPs
Top 7 Security Measures for IoT Systems
SIEM Primer:
Malicious Mobile Code Fact Sheet from Finjan
Zero Trust Model
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Ad

Viewers also liked (20)

PPTX
Presentation1 copy
KEY
Chapter 2
PPT
Anaesthesia for elective neurosurgery journal (zuhura)
PPT
Non conventional ventilator modes
PPTX
Hemophilia
PPT
Anesthesia for neurosurgery (zuhura)
DOCX
Md _Sane_Maruf_Khan_CV -BBA
PPTX
Dozvillya studentskoyi molodi
PPTX
PRESENTACION
PDF
Comparative and superlative
DOCX
PDF
Practica2 miriam palaciods_4o_a
PPT
blog
PPT
09 informações do sistema
PPTX
Cajal Neuronas
PPT
05 hacking
DOCX
Doc maf
ODP
Practica 2 oscar_salazar_gimenez
PPT
Proyecto Integrado
PPT
Arquitectura Sustentable
Presentation1 copy
Chapter 2
Anaesthesia for elective neurosurgery journal (zuhura)
Non conventional ventilator modes
Hemophilia
Anesthesia for neurosurgery (zuhura)
Md _Sane_Maruf_Khan_CV -BBA
Dozvillya studentskoyi molodi
PRESENTACION
Comparative and superlative
Practica2 miriam palaciods_4o_a
blog
09 informações do sistema
Cajal Neuronas
05 hacking
Doc maf
Practica 2 oscar_salazar_gimenez
Proyecto Integrado
Arquitectura Sustentable
Ad

Similar to Axxera Security Solutions (20)

PPTX
Axxera
PPTX
Axxera Ppt
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
PDF
Qradar ibm partner_enablement_220212_final
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
SOC Architecture Workshop - Part 1
PDF
IDBI Intech - Information security consulting
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PPTX
Retail IT 2013: Data Security & PCI Compliance Briefing
PDF
VSD Infotech
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
IBM QRadar Security Intelligence Overview
PDF
IBM QRadar Security Intelligence Overview
PPTX
Cyber Security Needs and Challenges
PDF
2012 Data Center Security
PPTX
Enterprise Sec + User Bahavior Analytics
PDF
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
PDF
Aujas Cyber Security
Axxera
Axxera Ppt
Sådan undgår du misbrug af kundedata og fortrolig information
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Qradar ibm partner_enablement_220212_final
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
SOC Architecture Workshop - Part 1
IDBI Intech - Information security consulting
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Retail IT 2013: Data Security & PCI Compliance Briefing
VSD Infotech
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Cyber Security Needs and Challenges
2012 Data Center Security
Enterprise Sec + User Bahavior Analytics
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Aujas Cyber Security

Axxera Security Solutions

  • 2. Contents Security Market Trends Company Profile Framework Products & Services Partners
  • 3. Security Market Trends – Top 10 threats 1. Excessive Internal Data Access Privileges 2. Thirty Party Access 3. Political Hactivism 4. Social Engineering 5. Mobile Threats 6. Steganography 7. Internal / External Vulnerabilities 8. Wireless Security 9. Advanced Malware Detection 10.Content Management
  • 4. Security Cycle A P S Availability Performance Security
  • 5. Product & Services 1 2 3 4 PRODUCT MSSP MSP Consulting Central Managed Managed Services Security Intelligence Security Provider Professional Services Provider Services Integrated SIEM Availability & Cloud Security Performance Security Incident Services Monitoring Event Management
  • 6. 1. Integrated S I E M •Integrated SIEM SIEM Correlation Engine CI Logger Sensors - Integration with over 250 products ( Cisco, HP, McAfee, Sentrigo, Entrust, Encase, Tipping Point, Tripwire, Websense, Bluecoat etc ) Portal / Console ITIL based Ticketing System ( auto ticketing ) Reporting - Business Intelligence Tool Security Action Plans ( Knowledge Base ) • Compliancy – HIPPA, GLBA, FISMA, PCI DSS, SOX etc
  • 8. 1. S I E M Solution cont Users Portal 3rd Party Axxera CI Tools • Correlation •Cisco Ticketing • ITIL • Sensors •IPS Tipping • Log Mgt Point CI Engine • Auto •Blue Coat •Imperva Ticketing •Tripwire Reporting •Cyber-Ark Console SOC
  • 9. 2. Managed Security Services Managed Security Services Early Warning Protection IDS/IPS Monitoring & Management Firewall Monitoring & Management Vulnerability Management Infection Management Database Security Web Application Log Management Advantages – Dynamic Early Warning & Real-time Protection Prevents - SPAM, VIRUS, ZERO DAY ATTACKS Prevents exploits from occurring Centralized View – IDS. Firewall, Vulnerability, Patch Management, Database Security, Web Application etc Live & Historical Compliance Reporting
  • 10. 3. Infrastructure Management Infrastructure Management Services Network Monitoring & Management System Monitoring & Management Application Monitoring & Management Database Monitoring & Management Synthetic Transaction Monitoring & Management Reporting & Analysis Advantages – 24x7 Pro-active Monitoring of Infrastructure View Impact on infrastructure during security incident Integration of IT monitoring toolsets Prevents - System or Network outages Centralized Portal View for reporting SLA management of Infrastructure Stability & Performance
  • 11. 4. Security Assessment 1. - Security Assessment and Auditing - Services 2. - Vulnerability Assessment 3. - Security Policy & Procedures review 4. - Penetration Testing 5. - Forensic Services 6. - Web Application Penetration Testing 7. - Web Application Database Testing Security Policies 8. - Onsite Professional Services Web App / DB Testing Vulnerability Assessment Security Assessment
  • 12. Security Portal & Console ( SIEM, MSP, MSSP ) Early Warning Console Early Warning Attack Tracking Early Warning C&C Tracking Global Botnet tracking Real-time Portal Security Attack / Vulnerability Monitoring Availability & Performance Monitoring Ticketing System SLA Management Reporting engine
  • 13. Organization Partners • Integrated with today’s security organizations exchanging Attack & Vulnerability trends & Intelligence