Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Name COUNTRY 10 th Name COUNTRY 10 th Cheung Yee Man Hong Kong Cheung Yee Man Hong Kong.
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
© 2014 Microsoft Corporation. All rights reserved.
Mokala Christele Wasseu Toutou Frederique Maraise Awah Vanessa Injeh.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Bill McClanahan – Principal Business Consultant LPS Integration.
Click to edit Master title style Click to edit Master subtitle style.
Ilias Chantzos Senior Director, Government Affairs - EMEA Symantec Cyber-security & cyber-resilience: Policy implications in smart cities.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Empower People Around the World with a $25 Loan Design Skills Color Typography Layout Creativity Technical Skills Tool Use Layers Color Optimization.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Backup Modernization with NetBackup Appliances
Click to edit Master title style Click to edit Master subtitle style.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
1 Cybersecurity and web-based attacks A perspective from Symantec Zoltan Precsenyi Government Affairs Manager International Conference on Terrorism and.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
Linda Mitchell Evaluating Community Post-Editing - Bridging the Gap between Translation Studies and Social Informatics Linda Mitchell PhD student.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Cassio Goldschmidt June 29 th, Introduction 2.
Symantec Security Program Assessment and the Symantec Security Management Model.
1 Safely Using Shared Computers Amanda Grady December 2013.
Copyright 2011, Atmel December, 2011 Atmel ARM-based Flash Microcontrollers 1 1.
Symantec Confidence in a connected world. Symantec ConfidentialCorporate Overview2 Enterprises are interacting in new ways Consumers are embracing a digital.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
MSC.Software Corporation 2 MacArthur Place Santa Ana, CA 92707, USA Tel: (714) Fax: (714) Web: Munich, Germany.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Business Critical Services Introduction 1 Business Critical Services Overview BCAM NAME HERE Business Critical Account Manager.
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
NAS101, Workshop Page 1 NAS101 Workshop Book Basic MSC.Nastran Linear Static and Normal Modes Analysis NA*V2001*Z*Z*Z*SM-NAS101-WBK July 2001.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Mitigating Risk at the Endpoint 端點防護與風險管理 Harry Wong Symantec.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
NAS101 Seminar Basic MSC.Nastran Linear Static and Normal Modes Analysis Version 2001 July 2001.
Using Parallelspace TEAM Models to Design and Create Custom Profiles
“Introduction to Azure Security Center”
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Presentation transcript:

Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009

Symantec Managed Security ServicesSymantec Global Intelligence Services2 Agenda Symantec и аутсорсинг1 Практические подходы в аутсорсинге2 Примеры успешной реализации на практике3

Symantec ™ Managed Security Services

Symantec Managed Security ServicesSymantec Global Intelligence Services44 Symantec Managed Security Services Security Analyst Expert Query Engine Data mine Progressive Threat Model Relational Database Vulnerability Mgmt. Future Technologies IDS Firewalls Security Monitoring Services Management Add-On Services Vulnerability Assessment Services Global Intelligence Services Managed Threat Analysis Минимизация рисков и затрат клиента, используя удалённые: мониторинг, анализ и управление... Log Management Service

Symantec Managed Security ServicesSymantec Global Intelligence Services5 Symantec Managed Security Services Symantec™ DeepSight Early Warning Services –integrated with Symantec Managed Security Services subscription

Symantec Managed Security ServicesSymantec Global Intelligence Services6 Стандартная схема

Symantec Managed Security ServicesSymantec Global Intelligence Services7 Схема работы Symantec MSS

Symantec Managed Security ServicesSymantec Global Intelligence Services8 Symantec™ Global Intelligence Network > 6,200 Managed Security Devices Million Systems Worldwide + 30% of World’s Traffic + Advanced Honeypot Network Twyford, England Munich, Germany Alexandria, VA Sydney, Australia Redwood City, CA Santa Monica, CA Calgary, Canada San Francisco, CA Dublin, Ireland Pune, India Taipei, Taiwan Tokyo, Japan 4 Symantec SOCs 74 Symantec Monitored Countries 40,000+ Registered Sensors in 180+ Countries 8 Symantec Security Response Centers

Symantec Managed Security ServicesSymantec Global Intelligence Services9 Secure Internet Interface Single, Secure Access to Security Information

Спасибо! Алексей Чередниченко +7 (985) Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.