Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Advertisements

©2015 EarthLink. All rights reserved. EarthLink Professional Services.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Target Data Breach – Cost of the Learning Curve Discuss the recent Target data breach and its impact on the industry as well as individuals January 29/30,
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Boost your network security with NETASQ Vulnerability Manager.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
FFIEC Cyber Security Assessment Tool
Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet regulatory compliance?
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Managed Security Service. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
©2015 EarthLink. All rights reserved. EarthLink Professional Services.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Proactive Incident Response
Protect your Digital Enterprise
Cybersecurity as a Business Differentiator
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Cybersecurity - What’s Next? June 2017
Case Study - Target.
Cloud Firewall.
Building A Security Program From The Ground Up
Cisco 2017 Security Annual Report
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Data Center Firewall.
Real-time protection for web sites and web apps against ATTACKS
Joe, Larry, Josh, Susan, Mary, & Ken
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Today’s Risk. Today’s Solutions. Cyber security and
Healthcare Cloud Security Stack for Microsoft Azure
cyberopsalliance.com |
National Cyber Security
Securing the Threats of Tomorrow, Today.
Healthcare Cloud Security Stack for Microsoft Azure
Threat Monitoring and Defense A fully managed and monitored security and compliance solution for cloud, hybrid, & on-premises infrastructure.
Protect Your Ecommerce Site From Hacking and Fraud
Strategic threat assessment
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Managed Security Monitoring

2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 The top 4 issues are security-related 0%10%40%30%20% Protecting highly sensitive data (e.g. client data, financial information) from specifically targeted attacks Preventing IT security breaches Data protection Ensuring continuity of service for business-critical systems (e.g. preventing DDoS attacks) Understanding the full range of new technologies that are available and how to use them Managing change in IT systems and infrastructure Ensuring IT systems are used fully to maximize the return on investment (ROI) of IT Making decisions about future IT investments Dealing with cost restraints Planning for and recovering from failure or destruction of IT infrastructure

3 ©2015 EarthLink. All rights reserved. Growth in reported cyber-security incidents in 2014, with approximately 117,339 attacks per day. Total financial losses attributed to security compromises increased 34% over Percentage of organizations that will experience a data breach of at least 10,000 customer records in the next 24 months 2 These headlines are all-too common… Sources: 1.CIO, CSO &PWC, IBM/Ponemon Institute, NY Times 4.IBM X-Force Threat Intelligence Quarterly KrebsOnSecurity.com 6.CNN Dec Jan Apr Sept Sept Target hacked for info on more than 100M customers 3 Michaels Stores loses data on 100M customers 3 Heartbleed vulnerability in Open SSL publicly disclosed; left more than 2M servers vulnerable to unencrypted data leaks 4 Home Depot announces data breach; 54M credit cards were breached 5 Apple iCloud accounts hacked for celebrity photos 6 48%22%

4 ©2015 EarthLink. All rights reserved. Perception of risk often lags reality. Q: How many new malicious malware programs emerge on a daily basis? Percentage of IT Survey Respondents A: On average, 315,000 new variants of malicious malware programs are detected daily. Source: IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 Only 4% of recent survey respondents knew magnitude of security threats

5 ©2015 EarthLink. All rights reserved. Common vulnerabilities for retailers:  43% Internal Operational Information  31% Customer Information  22% Financial Information  22% HR/Personnel Information Top Data Types Lost Source: 2014 Data Breach Investigations Report, Verizon 2014; IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014

6 ©2015 EarthLink. All rights reserved. Your challenge: attacks are becoming more frequent and your organization is looking to you for answers Costly and embarrassing network security breaches are constantly in the news and increasing in frequency. All eyes are on IT and security leaders to develop and deploy the right solution. You need to: – Have systems in place to understand your security risks – Guard against threats – Be prepared to react quickly to isolate threats as soon as they appear If you can’t respond quickly enough, your exposure grows as more customers are impacted and your brand image is damaged. Percentage of companies experiencing a cybersecurity incident in last 12 months 1 Sources: 1.IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab Trustwave, Cost of Data Breach Study: Global Analysis, Ponemon Institute, 2014 $5.85 Million % Did you know? Mean time between an initial malicious attack until a resulting breach is detected 2 Average cost of data breach in U.S. 3

7 ©2015 EarthLink. All rights reserved. Your path forward: find and stop threats before they can do damage EarthLink’s Managed Security Monitoring offers a 24x7 Security Operations Center to monitor your Point of Sale (POS) endpoints, routers, servers, network equipment and more to alert you of suspicious security events according to your customized escalation procedures. Vulnerability identification and remediation services (available with Gold and Platinum packages) allow you to take proactive action to reduce risk. By partnering with EarthLink, you can be confident your IT assets and network are being monitored—and your brand protected—at every point.

8 ©2015 EarthLink. All rights reserved. Managed Security Monitoring 1.EarthLink collects customer log data from customer environment. 2.This data is sent to EarthLink's security systems (SIEM) for analysis. 3.EarthLink uses automated analytics to identify suspicious activity within the log data. 4.An EarthLink security analyst reviews suspicious activity, alerts the customer and collaborate on security event remediation. 5.EarthLink will work to proactively identify software vulnerabilities (Gold and Platinum only) and proactively apply software patches (Platinum level only). How it works: Secure SSL Connection (MPLS/IPSec) Customer EarthLink Store 1 POS x 6 Store 2 POS x 6 Store 3 POS x 6 Store 5 POS x 4 Store 4 POS x 4 Security Event Collector/ Vulnerability Scanner Security Tools Security Operations Team Infrastructure Management Team

9 ©2015 EarthLink. All rights reserved. Managed Security Monitoring Service Levels SilverGoldPlatinum Security Event Monitoring SLA 1x/day review and escalation 24x7 (1 hour review and escalation) Vulnerability Identification NoYes Vulnerability Remediation* No Yes *Includes EarthLink Unified Endpoint Management & Security or Server Management

10 ©2015 EarthLink. All rights reserved. EarthLink Managed Security Monitoring helps you: Constantly monitor your network and actively protect from breach attempts Identify, manage and remediate network, server or mobile device threats before they result in a security incident Keep your business and customer information safe and your brand protected Identify and prevent security vulnerabilities

11 ©2015 EarthLink. All rights reserved. Managed Security Monitoring Use Case Hacker targets a third party contractor 1 Hacker gains access to retailer’s network using stolen credentials 2 Contractor Portal Hacker infects retailer’s internal server 3a Hacker infects retailer’s POS systems with malware 3b Customer CC stripe data captured by malware at POS 4 Stolen data sent to retailer’s compromised internal server 5 Stolen data uploaded to hacker’s server and retrieved 6 Firewall Retailer Windows file servers Retailer POS systems Hacker FTP servers (external) Anatomy of a Data Breach: Managed Security Monitoring can detect threats at critical points in your IT ecosystem

12 Why EarthLink? Our proprietary security intelligence tools protect over 1 million customers and block over 200 million threats each day. EarthLink’s Managed Security Monitoring tracks real-time threats using the latest intelligence data that identifies threats to your network, servers and endpoints. Our 24x7 Security Operations Center is staffed by dedicated, trained and credentialed security experts. We maintain one of the most comprehensive threat catalogs in the world, containing over 1.2 billion attack vectors. Each day over 200,000 new threats are added to the catalog. Managed Security Monitoring