SlideShare a Scribd company logo
SECURING YOUR
INFRASTRUCTURE WITH
WEBINDIA
Alex Webster, t ve
Cloud Defender: Built to deliver Security as a Service
Complete Visibility
 Threat detection across the application stack
 Real-time asset discovery
 Comprehensive view of risks
ContinuousMonitoring
 24x7 security monitoring
 Expert assisted remediation
 Faster incident response
Actionable Security Intelligence
 Near real-time incident identification
 Prioritized remediation actions
 Dedicated research to identify emerging threats
Webindia ActiveWatch: 24x7 Security Monitoring
24x7 Security
Availability Coverage
Expert review, investigation,
and analysis by certified
security experts
Incident response,
escalation, and
recommendations for
resolution
Continuous Security
Value Delivery
Initial tuning of data sources for
new customers
Tuning in response to changing
attacks and customer application
changes
Identification of new attack
patterns and creation of new
security content
Webindia Onboarding and Integration
The Webindia® customer Onboarding and Integration program is a critical step
in operationalizing Webindia security solutions.
Security investments often go unused or are deployed with partial or default settings – placing businesses at risk
while never fully realizing their investments. Our security professionals ensure proper deployment, configuration,
tuning and optimization of your new Webindia® security solutions.
Every customer is assigned an Webindia onboarding project manager (OPM) to manage the entire process and
onboarding team of 20+ specialist including:
 Project Managers
 Onboarding Engineers
 NOC Technicians
 Network & System Administrators
 Security Analysts
 Product Trainers
Leading Provider of Security & Compliance for the Cloud
Fully managed and monitored security and compliance
solutions for cloud, hybrid, and on-premises infrastructure Revenue: $103 M
 Growth rate: 40%
 Customers: 4,000+
 Founded: 2002
 Employees: Over 800
 Headquarters: Houston, Texas
Deep Security
Insight
Continuous
Protection
Lower Total
Costs
INDUSTRY RECOGNITION and CERTIFICATIONS
Over 4,000 Organizations Worldwide Trust Webindia
Over 4,000 Organizations Worldwide Trust Webindia
Millions
of devices secured of log data under
management
Hundreds of
Millions
of security events
correlated per month
Thousands
of incidents identified
and reviewed
per month
Petabytes
Compliance without Complexity
Webindia
Solution
PCI DSS SOX HIPAA & HITECH
Webindia
Web Security
Manager™
• 6.5.d Have processes in place to protect applications
from common vulnerabilities such as injection flaws,
buffer overflows and others
• 6.6 Address new threats and vulnerabilities on an
ongoing basis by installing a web application firewall in
front of public-facing web applications.
• DS 5.10 Network Security
• AI 3.2 Infrastructure resource
protection and availability
• 164.308(a)(1) Security
Management Process
• 164.308(a)(6) Security Incident
Procedures
Webindia Log
Manager™
• 10.2 Automated audit trails
• 10.3 Capture audit trails
• 10.5 Secure logs
• 10.6 Review logs at least daily
• 10.7 Maintain logs online for three months
• 10.7 Retain audit trail for at least one year
• DS 5.5 Security Testing,
Surveillance and
Monitoring
• 164.308 (a)(1)(ii)(D) Information
System Activity Review
• 164.308 (a)(6)(i) Login Monitoring
• 164.312 (b) Audit Controls
Webindia
Threat
Manager™
• 5.1.1 Monitor zero day attacks not covered by anti-virus
• 6.2 Identify newly discovered security vulnerabilities
• 11.2 Perform network vulnerability scans quarterly by
an ASV or after any significant network change
• 11.4 Maintain IDS/IPS to monitor and alert personnel;
keep engines up to date
• DS5.9 Malicious Software
Prevention, Detection and
Correction
• DS 5.6 Security Incident
Definition
• DS 5.10 Network Security
• 164.308 (a)(1)(ii)(A) Risk
Analysis
• 164.308 (a)(1)(ii)(B) Risk
Management
• 164.308 (a)(5)(ii)(B) Protection
from Malicious Software
• 164.308 (a)(6)(iii) Response &
Reporting
Webindia Security Operations Center providing Monitoring, Protection, and Reporting
Scalable Threat Intel Process Delivers Relevant Content
BIG DATA
REFERENCE
ARCHITECTURES
Alex Webster, t ve
AWS – Reference
VPC
AWS – Webindia Threat Manager
VPC
AWS – Webindia Log Manager
VPC
AWS – Webindia Cloud Defender
(with Web Security Manager)
VPC
AWS – Webindia Web Security Manager Premier
Single Deployment
VPC
AWS – Webindia Web Security Manager Premier
HA Deployment
VPC
AWS – Webindia Web Security Manager Premier
Auto scaling
VPC
ENT– Threat Manager
ENT– Log Manager
ENT– Web Security Manager
LICENSING
Alex Webster, t ve
How we License
 Threat Manager (IDS) & Out of Band WAF-
Number of hosts
 Log Manager- GB/day from all log sources
 In-Line WAF-Number of websites
 Cloud Insight- Number of hosts per day
Are you looking for an IT Infrastructure Services & Management? We help to manage IT
risks at all levels of an Organization with a focus on planning & protect your information
from security breaches. For more details, please visit our site: http://www.webindia.com

More Related Content

PDF
It Infrastructure Security - 24x7 Security Monitoring
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PDF
Outpost24 webinar - Busting the myths of cloud security
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PDF
VMUGIT UC 2013 - 03b Trend Micro
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
PPTX
Managed security services
PDF
Outpost24 webinar - Mastering the art of multicloud security
It Infrastructure Security - 24x7 Security Monitoring
Using a Network Model to Address SANS Critical Controls 10 and 11
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar: Security Analytics: what's in a risk score
VMUGIT UC 2013 - 03b Trend Micro
What's Wrong with Vulnerability Management & How Can We Fix It
Managed security services
Outpost24 webinar - Mastering the art of multicloud security

What's hot (20)

PPTX
5 Steps to Reduce Your Window of Vulnerability
PDF
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
PPTX
Network Security Best Practices - Reducing Your Attack Surface
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
PDF
Top 5 Cloud Security Predictions for 2016
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PDF
Cisco Advanced Services
PPTX
Network Security Trends for 2016: Taking Security to the Next Level
PPTX
Protecting Critical Infastrucutre: Zero Tolerance
PDF
Data Center Server security
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PPTX
HIPAA 101 Compliance Threat Landscape & Best Practices
PPTX
2015 Security Report
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
Disección de amenazas en entornos de nube
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
PDF
NEWSentinel_services15
PDF
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
PDF
Cisco Endpoint Security for MSSPs
5 Steps to Reduce Your Window of Vulnerability
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Network Security Best Practices - Reducing Your Attack Surface
Outpost24 webinar - Implications when migrating to a Zero Trust model
Top 5 Cloud Security Predictions for 2016
Outpost24 Webinar - Creating a sustainable application security program to dr...
Cisco Advanced Services
Network Security Trends for 2016: Taking Security to the Next Level
Protecting Critical Infastrucutre: Zero Tolerance
Data Center Server security
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
HIPAA 101 Compliance Threat Landscape & Best Practices
2015 Security Report
Journey to the Cloud: Securing Your AWS Applications - April 2015
Disección de amenazas en entornos de nube
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
NEWSentinel_services15
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Cisco Endpoint Security for MSSPs
Ad

Similar to Discover an IT Infrastructure Services & Management (20)

PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PPTX
5 Steps to an Effective Vulnerability Management Program
PPTX
Security on AWS
PPTX
AWS Spotlight Series - Modernization and Security with AWS
PDF
Safeguarding Your Mission Understanding Common Security Threats and How to P...
PPTX
hyderabad ins tech and management cyber security
PPTX
5 minutes on security
PPT
Indian perspective of cyber security
PDF
Understanding Network and Web Security: How to Safeguard Your Digital Assets
PDF
A New Approach to Healthcare Security
PPTX
Cybersecurity Framework Luncheon Presentation 1-18-18.pptx
PPT
MIS chap # 9.....
PDF
vmware-best-practices-healthcare-it-security-whitepaper
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
5 Steps to an Effective Vulnerability Management Program
Security on AWS
AWS Spotlight Series - Modernization and Security with AWS
Safeguarding Your Mission Understanding Common Security Threats and How to P...
hyderabad ins tech and management cyber security
5 minutes on security
Indian perspective of cyber security
Understanding Network and Web Security: How to Safeguard Your Digital Assets
A New Approach to Healthcare Security
Cybersecurity Framework Luncheon Presentation 1-18-18.pptx
MIS chap # 9.....
vmware-best-practices-healthcare-it-security-whitepaper
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars

Discover an IT Infrastructure Services & Management

  • 2. Cloud Defender: Built to deliver Security as a Service Complete Visibility  Threat detection across the application stack  Real-time asset discovery  Comprehensive view of risks ContinuousMonitoring  24x7 security monitoring  Expert assisted remediation  Faster incident response Actionable Security Intelligence  Near real-time incident identification  Prioritized remediation actions  Dedicated research to identify emerging threats
  • 3. Webindia ActiveWatch: 24x7 Security Monitoring 24x7 Security Availability Coverage Expert review, investigation, and analysis by certified security experts Incident response, escalation, and recommendations for resolution Continuous Security Value Delivery Initial tuning of data sources for new customers Tuning in response to changing attacks and customer application changes Identification of new attack patterns and creation of new security content
  • 4. Webindia Onboarding and Integration The Webindia® customer Onboarding and Integration program is a critical step in operationalizing Webindia security solutions. Security investments often go unused or are deployed with partial or default settings – placing businesses at risk while never fully realizing their investments. Our security professionals ensure proper deployment, configuration, tuning and optimization of your new Webindia® security solutions. Every customer is assigned an Webindia onboarding project manager (OPM) to manage the entire process and onboarding team of 20+ specialist including:  Project Managers  Onboarding Engineers  NOC Technicians  Network & System Administrators  Security Analysts  Product Trainers
  • 5. Leading Provider of Security & Compliance for the Cloud Fully managed and monitored security and compliance solutions for cloud, hybrid, and on-premises infrastructure Revenue: $103 M  Growth rate: 40%  Customers: 4,000+  Founded: 2002  Employees: Over 800  Headquarters: Houston, Texas Deep Security Insight Continuous Protection Lower Total Costs INDUSTRY RECOGNITION and CERTIFICATIONS
  • 6. Over 4,000 Organizations Worldwide Trust Webindia
  • 7. Over 4,000 Organizations Worldwide Trust Webindia Millions of devices secured of log data under management Hundreds of Millions of security events correlated per month Thousands of incidents identified and reviewed per month Petabytes
  • 8. Compliance without Complexity Webindia Solution PCI DSS SOX HIPAA & HITECH Webindia Web Security Manager™ • 6.5.d Have processes in place to protect applications from common vulnerabilities such as injection flaws, buffer overflows and others • 6.6 Address new threats and vulnerabilities on an ongoing basis by installing a web application firewall in front of public-facing web applications. • DS 5.10 Network Security • AI 3.2 Infrastructure resource protection and availability • 164.308(a)(1) Security Management Process • 164.308(a)(6) Security Incident Procedures Webindia Log Manager™ • 10.2 Automated audit trails • 10.3 Capture audit trails • 10.5 Secure logs • 10.6 Review logs at least daily • 10.7 Maintain logs online for three months • 10.7 Retain audit trail for at least one year • DS 5.5 Security Testing, Surveillance and Monitoring • 164.308 (a)(1)(ii)(D) Information System Activity Review • 164.308 (a)(6)(i) Login Monitoring • 164.312 (b) Audit Controls Webindia Threat Manager™ • 5.1.1 Monitor zero day attacks not covered by anti-virus • 6.2 Identify newly discovered security vulnerabilities • 11.2 Perform network vulnerability scans quarterly by an ASV or after any significant network change • 11.4 Maintain IDS/IPS to monitor and alert personnel; keep engines up to date • DS5.9 Malicious Software Prevention, Detection and Correction • DS 5.6 Security Incident Definition • DS 5.10 Network Security • 164.308 (a)(1)(ii)(A) Risk Analysis • 164.308 (a)(1)(ii)(B) Risk Management • 164.308 (a)(5)(ii)(B) Protection from Malicious Software • 164.308 (a)(6)(iii) Response & Reporting Webindia Security Operations Center providing Monitoring, Protection, and Reporting
  • 9. Scalable Threat Intel Process Delivers Relevant Content BIG DATA
  • 12. AWS – Webindia Threat Manager VPC
  • 13. AWS – Webindia Log Manager VPC
  • 14. AWS – Webindia Cloud Defender (with Web Security Manager) VPC
  • 15. AWS – Webindia Web Security Manager Premier Single Deployment VPC
  • 16. AWS – Webindia Web Security Manager Premier HA Deployment VPC
  • 17. AWS – Webindia Web Security Manager Premier Auto scaling VPC
  • 22. How we License  Threat Manager (IDS) & Out of Band WAF- Number of hosts  Log Manager- GB/day from all log sources  In-Line WAF-Number of websites  Cloud Insight- Number of hosts per day Are you looking for an IT Infrastructure Services & Management? We help to manage IT risks at all levels of an Organization with a focus on planning & protect your information from security breaches. For more details, please visit our site: http://www.webindia.com