Security Information and Event Management Services June, 2011 Minsk, Belarus.

Slides:



Advertisements
Similar presentations
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Advertisements

The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Components of GIS.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
It’s a jungle out there. IT Governance A 2009 Competitive Advantage.
Hillyard – Vektr CQI ™ Continuous Quality Improvement Hillyard Inc. has partnered with Nuvek LLC, to gain hosting capabilities for a new and innovative.
LOTUS to SharePoint Migration Services. © 2010 Star Knowledge Technology Team Alliance 2 Key Discussion Points Star Knowledge Value Proposition Microsoft.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Refresh, V.10, July 2, 2010 Name Title, Date Copyright © 2011 Infor. All rights reserved. INFOR – A LOOK INTO THE FUTURE NameJamie Bridgman TitleAccount.
By Collin Smith COBIT Introduction By Collin Smith
Software life cycle processes Purpose n A new international standard (ISO/IEC 12207:1995(E) that –establishes a common framework for software life cycle.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Easy Yet Powerful Data Visualization Christie Gunden Marketing Manager Jinfonet Software Rockville, MD Mike Obrebski System Engineer Jinfonet Software.
Robert J. Scott, Esq. Mariqus Alexander Managing PartnerDirector of IT Services.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Windows Server 2012 Certification and Training June 2012.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
Tivoli Software © 2010 IBM Corporation Maximo Everyplace Lori Landesman.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
Configuration Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser PR a-RMO, February 5 th, 2010 R. Moser 1 R. Gutleber.
Effective Methods for Software and Systems Integration
Global network of innovation Dr. Heidi Hohensohn Open Source in Business Solutions.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Exchange 2000 on Windows 2000 Data Center The Opportunity for Server Consolidation.
Chapter 8 : Software Quality Assurance Juthawut Chantharamalee Curriculum of Computer Science Faculty of Science and Technology, Suan Dusit University.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Using Outsourcing Partner’s Competence to Succeed During the Downturn 3 November 2009 Kaatsheuvel, The Netherlands Ulad Radkevitch, PhD VP marketing, sales.
SCSC 311 Information Systems: hardware and software.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
BPA 1 Verification in the Development of Medical Device Software Per IEC Tim Stein, Ph.D. CEO and President of Business Performance Associates, Inc.
Rational ClearCase and Rational ClearQuest IBM VA TPF User Conference Terry Durkin ClearCase Product Manager October 2000 Terry Durkin ClearCase Product.
I Copyright © 2007, Oracle. All rights reserved. Module i: Siebel 8.0 Essentials Training Siebel 8.0 Essentials.
Security Information and Event Management
® IBM Software Group © IBM Corporation Using ISA V4.0 for TSM and TPC Problem Resolution Troubleshooting Tools.
® IBM Software Group © 2006 IBM Corporation New Processor Value Unit Licensing for Middleware Evolving the Structure to Provide a Foundation for the Future.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
ONLINE KNOWLEDGE PRODUCT OF SAP GRC Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
Unit 1: IBM Tivoli Storage Manager 5.1 Overview. 2 Objectives Upon the completion of this unit, you will be able to: Identify the purpose of IBM Tivoli.
MBA/1092/10 MBA/1093/10 MBA/1095/10 MBA/1114/10 MBA/1115/10.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Week #5 1/10 Securing E-Transaction - SIEM.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 OS Management with TPM for OS Deployment.
1 Copyright © 2007, Oracle. All rights reserved. Installing and Setting Up the Warehouse Builder Environment.
© 2016 IBM Corporation Virtual Appliance migration self-assessment May 2016 IBM Security Identity Manager.
® IBM Software Group © 2006 IBM Corporation IBM Internal Use Only--Not to be shared outside the company until July 25, 2006 New Processor Value Unit Licensing.
© Akaza Research, LLC : 1 :: 10 Professional open source for clinical research.
© 2009 IBM Corporation IBM Configurator for e-business (e-config) Training Module 2 – Services Bill Luken – Global Client Value 02 February 2011.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
I/Watch™ Weekly Sales Conference Call Presentation (See next slide for dial-in details) Andrew May Technical Product Manager Dax French Product Specialist.
We Optimize. You Capitalize Software Development Services
Overview – TI Services September-2016.
Integrating ArcSight with Enterprise Ticketing Systems
Integrating ArcSight with Enterprise Ticketing Systems
Object Arena overview Object Arena is a premier provider of outsourced Information Technology (IT) services supporting Several Fortune 500 companies on.
Software Quality Assurance (SQA)
Description of Revision
2018 IBM C Real Questions Killtest
© 2011 ZOHO Corp. All Rights Reserved
EventLog Analyzer 5 Collects, Reports, and Archives on Systems, Devices, and Applications Logs for Internal Threat Management and Regulatory Compliance.
Enterprise Program Management Office
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Security Information and Event Management Services June, 2011 Minsk, Belarus

Security Information and Event Management “SIEM technology is used to analyze security event data in real time for internal and external threat management, and to collect, store, analyze and report in log data for regulatory compliance and forensics” “SIEM was $663.3 million in 2008 and is expected to grow up to $1.4 billion in 2013”

Presentation Plan 1.ScienceSoft’s SIEM Offerings at a Glance 2.SIEM Offerings in Detail: for End-users for Consultants and System Integrators for SIEM Solution Vendors 3.Focal Competence: IBM Tivoli 4.Focal Competence: Event Sources & User Information Sources Development

1. ScienceSoft SIEM Offerings at a Glance SIEM End users Advice in choosing SIEM solutions SIEM systems discovery, design, deployment, configuration, and maintenance Development of Event Sources and User Information Sources Security systems audit Subcontracting of SIEM systems design, implementation and maintenance SIEM consulting / development resources Development of Event Sources and User Information Sources Subcontracting in product components development Event Sources and User Information Sources development, testing, and integration Consultants System integrators Consultants System integrators SIEM Solution vendors SIEM Solution vendors

2. Offerings – for End-users Already have a SIEM solution installed? Yes No We provide support and customization: ArcSight RSA EnVision IBM TSIEM Quest Software Q1 Labs Qradar Symantec SSIM NetIQ Cisco MARS CA Enterprise Log Management We provide full cycle consulting: Security systems audit Advice in choosing SIEM solutions SIEM consulting, implementation, configuration, and support or maintenance Development of Event Sources and User Information Sources

2. Offerings – for Consultants and System integrators Subcontracting in TCIM, TSIEM, and TSOM products deployment, configuration, and support Subcontracting in SIEM system design, implementation and maintenance Subcontracting in LM, SIM, SEM, and SIEM products deployment, configuration, and support SIEM consulting / development resources Development of Event Sources and User Information Sources

2. Offerings – for SIEM Solution Vendors Subcontracting in product components development Event Sources and User Information Sources development, testing, and integration Practical assistance with the existing Event Sources and User Information Sources; Full support for unique sources of audit data Customize/update Compliance Management Modules (CMM) and Reports to support regulatory and security standards

3. Focal Competence – IBM Tivoli: TCIM, TSIEM, and TSOM Services IBM TCIM, TSIEM, and TSOM deployment, configuration, and maintenance IBM TCIM and TSIEM Event Sources, User Information Sources, Compliance Management Module customization and development IBM TSOM Device Rules development IBM TCIM, TSIEM, and TSOM products customization Key points Expert knowledge in IBM TCIM, TSIEM, and TSOM architecture and implementation Wide experience in TCIM, TSIEM, and TSOM deployment, configuration, support, and maintenance Deep knowledge in operating systems, software and devices audit, logging, and security subsystems Experience in configuring and maintaining operating systems, software, and devices (including almost all Tivoli’s)

3. Focal Competence – Experience with TCIM and TSIEM Participation in development of key product components Core functionality (server, database engine, mapper, agents, web application) UI (including redesign and migration to web-based UI) Completely responsible for Event Sources and User Information Sources Compliance Management Modules Quality assurance and testing Established significant number of QA procedures Full cycle of TCIM and TSIEM releases testing Completely responsible for Event Sources and User Information Sources testing Completely responsible for Compliance Management Modules testing Support activities L3 support (including regular fixpacks development and testing) Maintenance of specific building environments

3. Focal Competence - IBM Tivoli: Milestones and Accomplishments Milestones 2004 ScienceSoft became a software vendor for Consul Risk Management 2007 IBM acquired Consul Risk Management 2008 ScienceSoft became completely responsible for TCIM and TSIEM Event Sources and TSOM Device Rules development 2009 ScienceSoft picked up TCIM and TSIEM Compliance Management Modules development Milestones 2004 ScienceSoft became a software vendor for Consul Risk Management 2007 IBM acquired Consul Risk Management 2008 ScienceSoft became completely responsible for TCIM and TSIEM Event Sources and TSOM Device Rules development 2009 ScienceSoft picked up TCIM and TSIEM Compliance Management Modules development Deliveries 3 major releases of Consul InSight Security Manager (CISM) ( ) 2 major releases of IBM TCIM ( ) 3 major releases of IBM Tivoli Security Information and Event Manager (TSIEM) major releases ( ) More than 120 completed CISM, TCIM, and TSIEM Event Sources and Compliance Management Modules projects More than 30 completed TSOM device rules projects Deliveries 3 major releases of Consul InSight Security Manager (CISM) ( ) 2 major releases of IBM TCIM ( ) 3 major releases of IBM Tivoli Security Information and Event Manager (TSIEM) major releases ( ) More than 120 completed CISM, TCIM, and TSIEM Event Sources and Compliance Management Modules projects More than 30 completed TSOM device rules projects

4. Focal Competence - Event Sources & User Information Sources Full cycle of Event Sources and User Information Sources development and testing Requirements clarification and analysis; investigation of target platform Security subsystem and audit settings analysis Architecture and design, W7 model mapping design ES and UIS development, integration to TCIM and TSIEM releases ES and UIS testing (all of configurations, all of supported platforms) Development tools and environment Operating systems: IBM AIX, HP-UX, Sun Solaris, RHEL, SUSE, MS Windows, OS400, z/OS, zLinux TCIM and TSIEM internal development tools and languages: GVS, GSL, GML, Pearl Any programming language or development tool to provide better design and implementation of required functionality

Contact Details SCIENCESOFT, INC. 4th Floor, 2 Bedy Str., Minsk, Belarus Phone: USA phone: USA Fax: Web: SCIENCESOFT OY Porkkalankatu 20 A Helsinki, Finland Phone: Web: