SlideShare a Scribd company logo
Services Description 
October 2014
AGENDA 
● Cloud: 
○ Own v/s Lease 
○ Decentralization of IT 
● Network Security: 
○ Threats 
○ Impact and Urgency 
○ Cost of Breach 
○ Logs 
● Solution 
○ Overview 
○ Architecture 
○ Packages 
● Backup Slides
CLOUD
Cloud : Own versus Lease 
● Own the asset: you 
can modify it as 
you please 
● You can sell it 
whenever you 
want 
● More economical 
on the long run 
● High Investment - 
Depreciation 
● Lower down payment 
● Lower monthly 
payments 
● Lower maintenance 
costs 
● Ability to modify the 
offering at any time 
● Ability to change asset 
every year or two 
● Faster time to install 
● No need for in-house 
expertise 
● No rent space 
● Increase or decrease 
capacity at will 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Cloud Services 
Deploy faster and easier 
Decrease budget and avoid 
vendor lock-in 
Lower footprint on your network 
Save on technology upgrades and 
maintenance 
Ensure compliance to regulatory 
mandates. 
Gartner defines cloud 
computing as “...a style of 
computing in which 
scalable and elastic IT-enabled 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
capabilities are 
delivered as a service 
using Internet 
technologies.”
Cloud: Decentralization of IT 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
On-Premises 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
IaaS 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
PaaS 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Users 
Data 
Application 
Tools 
Database 
Network 
OS 
Hardware 
SaaS
SaaS: ROI 
Line item Cloud On-premise 
Initial license fee None Extensive 
Subscription fee Charged by usage None 
Maintenance fees Included Percentage of license fee 
Support costs Included Extra 
IT stang Significant reductions Significant 
Data center upkeep and 
maintenance 
None Large, ongoing 
Upgrade fees Included Significant 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
NETWORK SECURITY
Threats 
Trojan Horse 
File infection 
Spam email 
zero-day attacks 
Software vulnerabilities 
OS vulnerabilities 
Identify theft 
Mobile Loss 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Phishing
Causes 
Ponemon Institute / Symantec - Cost of Data Breach Study 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Impact 
and 
Urgency 
4 3 2 
3 2 
2 1 1 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
1 
Business Process 
affected. 
Workaround 
available. 
Business Process 
stopped. Can bare 
minimal delay. 
Very hard 
workaround 
Business Process 
stopped. No work 
around 
Urgency 
Impact 
Any system minor 
degradation non-business 
critical. 
<50% of users 
impacted 
Any system 
degraded or 
partially 
unavailable. >50% 
of users impacted 
Any system 
unavailable. 
100% of users 
impacted
Cost of Breach 
IBM Data Breach Statistics 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Logs 
log /lôg läg/ - noun 
"a record of performance, events, or day-to-day activities" 
synonyms: record, register, logbook, journal, diary, chronicle, 
daybook, record book, ledger; 
SNMP 
ODBC 
WMI 
SDEE 
CPMI 
syslog 
netflow 
ssh 
native FIM 
Registry 
Monitor 
custom XML-based 
One Solution 
Vulnerability 
Scanner 
Configuration 
Management 
Asset Analytics 
Performance 
Monitoring 
Network 
Behaviour 
Analysis 
RDEP Forensics 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Log 
Management
Log Management 
Functionality 
Log Management 
(LM) 
Security Information and Event 
Managment (SIEM) 
Log collection Collect all logs Collect security relevant logs + context data 
Log pre-processing 
Indexing, parsing 
Parsing (universal collection), normalization, 
categorization, enrichment 
Log retention Retain raw log data Retain parsed and normalized data 
Reporting Broad use reporting 
Focused reporting: security, asset, 
configuration... 
Analysis Full test analysis, tagging 
Real-time event correlation, threat scoring, 
event prioritization 
Alerting and 
notification 
Simple alerting on all logs 
Categorized focused alerting, user activity, 
dashboards, monitors, file integrity monitoring 
Other features 
High scalability of collection 
and storage 
Incident Management, analyst workflow, 
context analysis, forensics, configuration audit, 
application monitoring, compliance 
automation, vulnerability monitoring 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
SOLUTION 
SIEM as a Service
Solution Overview 
MSS is a Unified Security Management service that 
combines multiple security functions in a single 
console: 
● SIEM (security information and event 
management) 
● Secure Configuration Auditing 
● Compliance Automation 
● Contextual Forensic Analysis 
Network state and event data is collected 
continuously. The system deploys alert 
correlations schemes to identify suspicious activity 
that can develop into threats affecting your 
business. 
Network data collected is compressed and 
encrypted to avoid network congestion and 
ensure maximum security of your data. 
‘... customers need to 
examine security event 
data in real time for 
internal and external 
threat management, and 
to collect, store, analyze 
and report on log data for 
incident response, 
forensics, and regulatory 
compliance…’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Architecture 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Key Components 
● Full SIEM deployment with real-time security monitoring, 
historical analysis and event correlation 
● 24x7 security and configuration device monitoring: 
IPS/Firewall/VPN/Servers/Virtual Environments; up to 
160 different node types 
● Customized web-portal dashboard to provide real-time 
reports and statistics 
● Dedicated engineering consultants to support with 
forensic investigation and remediation 
● Compliance and security risk reviews: PCI DSS, HIPAA, 
ISO27001/27002, COBIT, NIST800-53… 
● Consulting Services - Security Posture Analysis and 
Recommendation 
● Full Engineering and Management Services 
‘...the technology 
provides real-time 
security monitoring, 
historical analysis, and 
other support for incident 
investigation and 
compliance reporting...’ 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Dashboards Online 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
Demo:
Summary 
Get Security Monitoring installed in minutes 
Low monthly subscription fees 
Scale very easily 
Leverage DataConsult’s expertise in security 
Ensure compliance to regulatory mandates. 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Packages 
MSS feature 
MSS1 
(Reporting) 
MSS2 
(Premium) 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 
MSSe 
(Consulting) 
MSSe+ 
(Managed) 
Log Collection X X X X 
Event Reporting X X X X 
Asset and Performance Monitoring X X X X 
Daily Security Status Reports X X X X 
Forensic Investigations X X X 
Configuration and Asset Management X X X 
Event Correlation X X X 
Network Behaviour Analysis X X X 
24x7 Live Alert Monitoring & Notification X X X 
Monthly Health Reports X X X 
Compliance Automation X X 
Security Analysis and Recommendation X X 
Remediation and Control X 
Full Device Management X
Thank You
BACKUP SLIDES 
Screen Shots
Critical Events per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Denied Connections per Hour 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Alert Configuration 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Blocking 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Destination Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
User by Protocol 
© Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
BACKUP SLIDES 
References
MALicious softWARE 
Cisco Annual Security Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Vulnerabilities 
Kaspersky Security Bulletin 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
Mobile Device Theft 
Sophos Security Threat Report 2014 
© Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission

More Related Content

PPTX
Data Consult - Managed Security Services
PPTX
Network Security Offering by GSS America
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
Tips to Remediate your Vulnerability Management Program
PDF
SIEM brochure A4 8pp FINAL WEB
PDF
Assessing the Security of Cloud SaaS Solutions
PDF
Unidirectional Security, Andrew Ginter of Waterfall Security
PDF
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
Data Consult - Managed Security Services
Network Security Offering by GSS America
Open Source IDS Tools: A Beginner's Guide
Tips to Remediate your Vulnerability Management Program
SIEM brochure A4 8pp FINAL WEB
Assessing the Security of Cloud SaaS Solutions
Unidirectional Security, Andrew Ginter of Waterfall Security
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]

What's hot (20)

PDF
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
PPTX
SAST Code Security Advisor for SAP [Webinar]
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
PPTX
5 Essential Capabilities You Need to Tackle Cyber Threats
PDF
Its Not You Its Me MSSP Couples Counseling
PPTX
Information Security: Advanced SIEM Techniques
PPTX
Top 10 tips for effective SOC/NOC collaboration or integration
PDF
AccelOps &amp; SOC-NOC Convergence
PDF
ITrust Security Operating Center (SOC) - Datasheet EN
PPTX
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
DOCX
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPTX
Using Assessment Tools on ICS (English)
PPTX
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
PPTX
Information Assurance Metrics: Practical Steps to Measurement
PPTX
PRESENTATION ON PLC AND SCADA
PDF
Unidirectional Network Architectures
PPTX
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PPSX
Next-Gen security operation center
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
SAST Code Security Advisor for SAP [Webinar]
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
5 Essential Capabilities You Need to Tackle Cyber Threats
Its Not You Its Me MSSP Couples Counseling
Information Security: Advanced SIEM Techniques
Top 10 tips for effective SOC/NOC collaboration or integration
AccelOps &amp; SOC-NOC Convergence
ITrust Security Operating Center (SOC) - Datasheet EN
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Security Outsourcing - Couples Counseling - Atif Ghauri
Using Assessment Tools on ICS (English)
SAST Threat Detection: What you stand to gain from intelligent, SAP real-time...
Information Assurance Metrics: Practical Steps to Measurement
PRESENTATION ON PLC AND SCADA
Unidirectional Network Architectures
SAP Security Dashboards: Gain complete transparency for your SAP systems. [We...
Using a Network Model to Address SANS Critical Controls 10 and 11
Next-Gen security operation center
Ad

Viewers also liked (20)

PPTX
Managed Security Services Overview
PDF
Building a Security Architecture
PDF
Advanced threat security - Cyber Security For The Real World
PPTX
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
PDF
ICT Security: Defence strategies against targeted attack
PPTX
IDC Cloud Security and Managed Services Conference Riyadh KSA
PDF
AGC Networks’ Profile
PDF
Cisco contact center
PPTX
IBM Security Strategy
PDF
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
PPTX
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
PPTX
Real Time Target Marketing
PPTX
Pulseras de cuero
PDF
Promat Oil & Gas Brochure
PPT
Europroperties Web Tv Presentation
PPTX
Presentación monica botero
PPTX
All about me gareth rollason
PDF
Presentacion Memoria Jung Mayo 2015
PDF
Exploding Brand Value at the Local Level Revisited
PDF
Loesungen fuer die Hydraulik
Managed Security Services Overview
Building a Security Architecture
Advanced threat security - Cyber Security For The Real World
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
ICT Security: Defence strategies against targeted attack
IDC Cloud Security and Managed Services Conference Riyadh KSA
AGC Networks’ Profile
Cisco contact center
IBM Security Strategy
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Real Time Target Marketing
Pulseras de cuero
Promat Oil & Gas Brochure
Europroperties Web Tv Presentation
Presentación monica botero
All about me gareth rollason
Presentacion Memoria Jung Mayo 2015
Exploding Brand Value at the Local Level Revisited
Loesungen fuer die Hydraulik
Ad

Similar to Data Consult Managed Security Services (20)

PDF
SANS Log Management 1
PDF
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
PPTX
Manage services presentation
PDF
Axxera Security Solutions
PDF
IBM Infosphere Guardium - Database Security
PDF
SCOM 2007 & Audit Collection Services
PPTX
Security Information and Event Management (SIEM)
PDF
Securing your IT infrastructure with SOC-NOC collaboration TWP
PPT
Why Use Wes Tech Solutions
PPT
Why Use Westech Solutions
PDF
IBM InfoSphere Guardium overview
PDF
Presentation topic for Philippines SAP user group forum
PDF
Maceo Wattley Contributor Infosec
PDF
Preventing The Next Data Breach Through Log Management
PDF
Big security for big data
PPTX
It security cognic_systems
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PDF
Building Security Operation Center
PPTX
IBM i Security SIEM Integration
PPT
Ch10 Conducting Audits
SANS Log Management 1
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Manage services presentation
Axxera Security Solutions
IBM Infosphere Guardium - Database Security
SCOM 2007 & Audit Collection Services
Security Information and Event Management (SIEM)
Securing your IT infrastructure with SOC-NOC collaboration TWP
Why Use Wes Tech Solutions
Why Use Westech Solutions
IBM InfoSphere Guardium overview
Presentation topic for Philippines SAP user group forum
Maceo Wattley Contributor Infosec
Preventing The Next Data Breach Through Log Management
Big security for big data
It security cognic_systems
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Building Security Operation Center
IBM i Security SIEM Integration
Ch10 Conducting Audits

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity

Data Consult Managed Security Services

  • 2. AGENDA ● Cloud: ○ Own v/s Lease ○ Decentralization of IT ● Network Security: ○ Threats ○ Impact and Urgency ○ Cost of Breach ○ Logs ● Solution ○ Overview ○ Architecture ○ Packages ● Backup Slides
  • 4. Cloud : Own versus Lease ● Own the asset: you can modify it as you please ● You can sell it whenever you want ● More economical on the long run ● High Investment - Depreciation ● Lower down payment ● Lower monthly payments ● Lower maintenance costs ● Ability to modify the offering at any time ● Ability to change asset every year or two ● Faster time to install ● No need for in-house expertise ● No rent space ● Increase or decrease capacity at will © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 5. Cloud Services Deploy faster and easier Decrease budget and avoid vendor lock-in Lower footprint on your network Save on technology upgrades and maintenance Ensure compliance to regulatory mandates. Gartner defines cloud computing as “...a style of computing in which scalable and elastic IT-enabled © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission capabilities are delivered as a service using Internet technologies.”
  • 6. Cloud: Decentralization of IT Users Data Application Tools Database Network OS Hardware On-Premises Users Data Application Tools Database Network OS Hardware IaaS Users Data Application Tools Database Network OS Hardware PaaS © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Users Data Application Tools Database Network OS Hardware SaaS
  • 7. SaaS: ROI Line item Cloud On-premise Initial license fee None Extensive Subscription fee Charged by usage None Maintenance fees Included Percentage of license fee Support costs Included Extra IT stang Significant reductions Significant Data center upkeep and maintenance None Large, ongoing Upgrade fees Included Significant © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 9. Threats Trojan Horse File infection Spam email zero-day attacks Software vulnerabilities OS vulnerabilities Identify theft Mobile Loss © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Phishing
  • 10. Causes Ponemon Institute / Symantec - Cost of Data Breach Study 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 11. Impact and Urgency 4 3 2 3 2 2 1 1 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 1 Business Process affected. Workaround available. Business Process stopped. Can bare minimal delay. Very hard workaround Business Process stopped. No work around Urgency Impact Any system minor degradation non-business critical. <50% of users impacted Any system degraded or partially unavailable. >50% of users impacted Any system unavailable. 100% of users impacted
  • 12. Cost of Breach IBM Data Breach Statistics 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 13. Logs log /lôg läg/ - noun "a record of performance, events, or day-to-day activities" synonyms: record, register, logbook, journal, diary, chronicle, daybook, record book, ledger; SNMP ODBC WMI SDEE CPMI syslog netflow ssh native FIM Registry Monitor custom XML-based One Solution Vulnerability Scanner Configuration Management Asset Analytics Performance Monitoring Network Behaviour Analysis RDEP Forensics © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Log Management
  • 14. Log Management Functionality Log Management (LM) Security Information and Event Managment (SIEM) Log collection Collect all logs Collect security relevant logs + context data Log pre-processing Indexing, parsing Parsing (universal collection), normalization, categorization, enrichment Log retention Retain raw log data Retain parsed and normalized data Reporting Broad use reporting Focused reporting: security, asset, configuration... Analysis Full test analysis, tagging Real-time event correlation, threat scoring, event prioritization Alerting and notification Simple alerting on all logs Categorized focused alerting, user activity, dashboards, monitors, file integrity monitoring Other features High scalability of collection and storage Incident Management, analyst workflow, context analysis, forensics, configuration audit, application monitoring, compliance automation, vulnerability monitoring © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 15. SOLUTION SIEM as a Service
  • 16. Solution Overview MSS is a Unified Security Management service that combines multiple security functions in a single console: ● SIEM (security information and event management) ● Secure Configuration Auditing ● Compliance Automation ● Contextual Forensic Analysis Network state and event data is collected continuously. The system deploys alert correlations schemes to identify suspicious activity that can develop into threats affecting your business. Network data collected is compressed and encrypted to avoid network congestion and ensure maximum security of your data. ‘... customers need to examine security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics, and regulatory compliance…’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 17. Architecture © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 18. Key Components ● Full SIEM deployment with real-time security monitoring, historical analysis and event correlation ● 24x7 security and configuration device monitoring: IPS/Firewall/VPN/Servers/Virtual Environments; up to 160 different node types ● Customized web-portal dashboard to provide real-time reports and statistics ● Dedicated engineering consultants to support with forensic investigation and remediation ● Compliance and security risk reviews: PCI DSS, HIPAA, ISO27001/27002, COBIT, NIST800-53… ● Consulting Services - Security Posture Analysis and Recommendation ● Full Engineering and Management Services ‘...the technology provides real-time security monitoring, historical analysis, and other support for incident investigation and compliance reporting...’ © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 19. Dashboards Online © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Demo:
  • 20. Summary Get Security Monitoring installed in minutes Low monthly subscription fees Scale very easily Leverage DataConsult’s expertise in security Ensure compliance to regulatory mandates. © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 21. Packages MSS feature MSS1 (Reporting) MSS2 (Premium) © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission MSSe (Consulting) MSSe+ (Managed) Log Collection X X X X Event Reporting X X X X Asset and Performance Monitoring X X X X Daily Security Status Reports X X X X Forensic Investigations X X X Configuration and Asset Management X X X Event Correlation X X X Network Behaviour Analysis X X X 24x7 Live Alert Monitoring & Notification X X X Monthly Health Reports X X X Compliance Automation X X Security Analysis and Recommendation X X Remediation and Control X Full Device Management X
  • 24. Critical Events per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 25. Denied Connections per Hour © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 26. Alert Configuration © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 27. Destination Blocking © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 28. Destination Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 29. User by Protocol © Copyright 2012 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 31. MALicious softWARE Cisco Annual Security Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 32. Vulnerabilities Kaspersky Security Bulletin 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission
  • 33. Mobile Device Theft Sophos Security Threat Report 2014 © Copyright 2014 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission