© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.

Slides:



Advertisements
Similar presentations
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Advertisements

December 2010 Partner Support Service Overview. © 2010 Cisco Systems, Inc. All rights reserved. 2 Agenda Collaborative Services, Customer Response Collaborative.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
The Most Analytical and Comprehensive Defense Network in a Box.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
(Geneva, Switzerland, September 2014)
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Website Hardening HUIT IT Security | Sep
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are service.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
The Most Analytical and Comprehensive Defense Network in a Box.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Akamai Technologies - Overview RSA ® Conference 2013.
©2015 EarthLink. All rights reserved. EarthLink overview.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Your Business Challenges
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
11 IT Expo West 2010 General Session: Cloud Computing Nigel Williams SVP Sales.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
 2007 Level 3 Communications, Inc. All Rights Reserved. 1 Business Markets Group: Reliable and Responsive Prepared for CUSTOMER NAME PRESENTER’S NAME.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. The Level 3 Story © 2014 Level 3 Communications, LLC. All Rights.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Federal Acquisition Service 1 Networx – Enterprise Services: Awarded May 31, 2007 Telecommunications Services Communications Transport – Voice – Circuit.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Kona Security Solutions - Overview
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
IS3220 Information Technology Infrastructure Security
Investor Presentation May Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Vodafone Business Cloud
Content Delivery Cloud A Better Alternative To Your Content Delivery Network (CDN) ©2013 Riverbed Technology Confidential and Proprietary.
IPv6 – The New Technology to Embrace Product Management Group Enterprise Data Product.
CCI BUSINESS James W. Yates, MBA Regional Solutions Engineering Manager.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
©2015 EarthLink. All rights reserved. EarthLink overview.
Surveillance and Security Systems Cyber Security Integration.
Protect your Digital Enterprise
IoT Security Part 2, The Malware
OIT Security Operations
Comprehensive Security and Compliance at an Affordable Price.
How Smart Networks are Changing Corporate Networks
Infrastructure, Data Center & Managed Services
Networx – Enterprise Services: Awarded May 31, 2007
Cisco Collaborative Professional Services
Networx – Enterprise Services: Awarded May 31, 2007
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Managed Services in a Dynamic Cloud-Connected World
AT&T Firewall Battlecard
Presentation transcript:

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security Solutions Overview

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. The security problem of today’s environment 2 Changing Business ModelsEvolving Threat LandscapeComplexity and Fragmentation

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 3 "Digital business – characterized by cloud, social, analytics, mobility and IoT - is an unstoppable and irresistible catalyst for change; change that will affect the fundamental foundations and baseline assumptions of every business…creating significant security implications.” -- Gartner, 2014

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 4 *Available in Latam and EMEA today Managed and Professional Services Private Line, Wavelength and Ethernet Transport MPLS VPN and VPLS Solutions Dark Fiber and Managed Fiber Managed Network Services Cloud Connectivity Data Centers Managed Hosting Services* DATA NETWORKS Internet Services Vyvx ® Solutions Content Delivery Network (CDN) CONTENT DISTRIBUTION Voice Contact Center Unified Communications and Collaboration Audio, Video and Web conferencing services VOICE AND UC&C Managed Security: (MFW, IDS/IPS, Web Filtering, DLP, Incident Response) DDoS Mitigation Secure Access Security Consulting Threat Analytics Log Management SIEM SECURITY WAN Optimization Website Acceleration APPLICATION PERFORMANCE Security is a critical component of our comprehensive portfolio

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center (SOC) 5 Responsible for Securing Our Global IP Network 24 x 7 x 365 support, providing always on monitoring and management Provide managed security solutions backed by our people, systems and data The same team charged with protecting Level 3’s global infrastructure will be monitoring and managing your security solutions Our network and visibility into threats provides our security team with exceptional data – we leverage this information to protect your assets 20,000+ ENTERPRISE CUSTOMERS 120,000 NETWORK ELEMENTS 140,000 ROUTE MILES

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center 6 Provided With Exceptional Visibility In To A Dynamic Threat Environment 350,000 Alerts Per Day 1000 Command and Control Servers 1+ Million Malicious Packets Per Day 1.7+ Million Infected Machines with proprietary threat intelligence systems 36+ Billion Netflow Sessions Per Day 40 % OF THREATS DETECTED WERE PREVIOUSLY UNKNOWN

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Accelerate Organic Growth: Secure all Network customers Differentiate Level 3 ℠ Security Solutions Focus on Cloud-based Services Expand Addressable Market Level 3 Security Strategy 7 Increase attach-rate of Managed Security Services to Network sales through targeted marketing Extend Level 3’s unique threat intelligence to our customers, enabling informed security decisions and more control Enable customers to migrate to more scalable Security solutions, with less operational impact and robust protection by Level 3 Serve more customers through new products and geographic expansion Enabling enterprises to address increasingly complex Security challenges through network and cloud based security solutions

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Protecting the Networked World Secure Connectivity –Locking down network and Internet connections –Securing remote access Secure Cloud –Extending border security to include cloud –Threat mitigation Secure Mobility –Maintain secure connectivity and productivity on the move –Protecting employee BYO Device Secure Web –Safeguard online business –Content encryption, authentication, SSL Security Consulting –Risk analysis, compliance audit readiness Security Operations Center –24 x 7 monitoring and mitigation by experts 8 Cyber attacks on the Enterprise are occurring on multiple fronts. A holistic, multi- layered approach is needed to manage risk to brand and intellectual property

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 SM Cloud Security Solutions 9 Advanced SOC: 24 x 7 SOC that can cost effectively monitor, track and mitigate threats, utilizing the expertise and knowledge gained from protecting Level 3’s global network/infrastructure Unmatched Attack Traffic Visibility: A global network backbone with visibility in to attack traffic and advancing threats (IP, DNS, CDN) Comprehensive Internal And External Security: global security provider responsible for securing both your network and cloud based infrastructures, providing physical (network), logical (IP) and content security Proactive Versus Passive Mitigation: Ability to be more proactive, using our data and analytics to see threats forming while taking proactive measures ahead of an attack or more quickly mitigating an attack if/when one does occur with our visibility, control and data What Makes Level 3 Unique?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 10