Security - IDS Refresh Project Phil Healey Date of Greenlight Meeting.

Slides:



Advertisements
Similar presentations
Indicative Business Case
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Lesson 1-Introducing Basic Network Concepts
MSIT 458: Information Security & Assurance By Curtis Pethley.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computer Security: Principles and Practice
1 Purchasing and Procurement Processes Module Four Revision Date: 2/06/2015.
ITSC Report From The CIO: Network Program Update 25 September 2014.
5205 – IT Service Delivery and Support
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
A Balancing Act Between Risk Appetite and Risk Tolerance Federal Information Systems Security Educators’ Association Conference March 2005 Ezra Cornell.
[Name / Title] [Date] Effective Threat Protection Strategies.
HIPAA COMPLIANCE WITH DELL
CDS Operational Risk Management - October 28, 2005 Existing Methodologies for Operational Risk Mitigation - CDS’s ERM Program ACSDA Seminar - October 26.
IDENTITY ACCESS MANAGEMENT – PHASE 0 – IDM REPLACEMENT December 5, 2013.
Vantage Report 3.0 Product Sales Guide
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees.
FY14 TV PROJECTS VISION VERSION 4 EMEA UPGRADES Date 03/09/2013.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Project Management Methodology Development Stage.
Need to Invest Investment Objectives and Case for Change Programme Option Identification and Assessment Analysis Strategic Case: Economic Case: Financial.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Reduction of Worker Ethylene Oxide Exposure (Interim Measures) Craig Torres M. Healy, S. Jahn, D. Gardner.
AIRLINES REVAMP 10/29/2013. Executive Summary Business Problem: The Airlines application is primarily used to sell, distribute and collect revenues for.
ENTERPRISE TIER 1 SAN STORAGE UPGRADE March 2014.
Cornerstone/Saba Replacement People & Organization Learning Management System Implementation August 15, 2013.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/4- OfficeServ 7200 Enterprise IP Solutions - Data Server –
Slot Management April Schneider 9/4/14 Greenlight Meeting.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
MDM IMPLEMENTATION TO REPLACE GPMS TITLE MANAGEMENT October 28, 2013.
Financial Summary For WebLogic Migration Greenlight (Group 2 Apps) Apr 13, 2012.
Jboss Evergreening Rahul Ojha/Kunal Mittal Date of Greenlight Meeting.
DNS/DHCP REFRESH June, Executive Summary The Domain Name System (DNS) and Dynamic Host Protocol (DHCP) are the lifeblood of the network. Without.
B2C Hosting March 21, Executive Summary Business Problem: The primary goal of the project is to provide a world class web hosting Infrastructure.
RUNNER April 29, Executive Summary Business Problem: – cineSHARE, ACORN and EAGL are critical components of major digital media workflows supporting.
Greenlight Presentation Oracle 11g Upgrade February 16, 2012.
Security Enhancement Proxy Replacement Firewall Replacement IDS Replacement January, 2012.
INTERPLAN RE-PLATFORM 06/14/2013. Business Problem Support and Maintenance Challenges Obsolete Technology (Codigo) Heavy Database driven business logic.
PLAYBOOK DATA PROCESS EVERGREENING August Executive Summary Business Problem: Data issues are prevalent across key data processes in the Playbook.
VISION & CHANDLER MIGRATION 10/03/2013. Executive Summary Last year we requested several critical Vision enhancements immediately post go-live.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
HOME ENTERTAINMENT PEGASUS/SAP FINANCIALS October 28, 2013.
WebMethods Platform Evergreening Phase II Sunil Seru 09/24/2014.
LEFT BANK PICTURES NETWORK INTEGRATION Date. Executive Summary Business Problem: In 2012 Sony Pictures Television purchased a majority share in Left Bank.
FY14 TV PROJECTS PROVYS CHANNEL MIGRATION Date 29/10/2013.
MEDIAMORPH ROYALTY STATEMENT PROCESSING 12/9/2013.
RADIANT LOGIC VDS/ICS PLATFORM EVERGREENING May 2013.
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
Worldwide Print Tracking System (WPTS) Merge to Interplan 2.0 Abhisek Rath July 24, 2014.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Managed IT Services JND Consulting Group LLC
Blue Mountain Quality Resources, Inc. Global Compliance and Standardization with an Enterprise CMS Jim Erickson, President Blue Mountain Quality Resources,
ITEC 275 Computer Networks – Switching, Routing, and WANs
Managed IT Solutions More Reliable Networks Are Our Business
Daily Update Cisco Questions Dumps4download.us
I have many checklists: how do I get started with cyber security?
Information Security Services CIO Council Update
Understanding the AMI Deployment/ Upgrade Process and Ensuring Quality Relationships with Your AMI Vendor July 2018.
IS4680 Security Auditing for Compliance
Presented to Department of Information Technology February 24, 2010
Filing the FCC Form 470 Special thanks to Julie Trent Schell (E-rate PA) and Anne Perloff (E-rate ME)
SHARE Special Project SHARE Benefits Optimization
Presentation transcript:

Security - IDS Refresh Project Phil Healey Date of Greenlight Meeting

Business Problem  Sourcefire Intrusion Detection devices on the SPE network are no longer the preferred IDS system  They are leased from a vendor at a cost of $278,472 per year, with $117,890 for maintenance on top  SPE bandwidth has grown since the Sourcefires were installed and we have now exceeded their threshold for monitoring  They are approaching end of life support with the manufacturer, therefore updates for new vulnerabilities will not be applied 2

Proposed Solution  HP Tipping Point appliances are the Sony Corp preferred model  They are higher capacity appliances so can monitor the SPE network effectively  They are also the latest spec, so will ensure we have ongoing vendor support for the foreseeable future  This is the Sony standard for IDS and IPS inside the Sony network 3

Financial Summary 4

Benefits Category$ BenefitDescription Cost Avoidance/ Reduction $589,884 o 5 Year Total Benefits – lease costs and 5 year maintenance costs saved from Sourcefire appliances ($1,981,810 in total over 5 years) Risk AvoidanceN/A o HP Tipping Points are higher capacity appliances o Sourcefire appliances are approaching end of life support with the manufacturer and will not receive new vulnerability updates Intangible Benefits N/A o HP Tipping Points align with Sony standard for IDS monitoring o IPS capability 5

Competitive Analysis  Other Sony entities are also deploying HP Tipping Point’s as IDS monitors at key network boundaries as they are GSIRT/Sony Corp’s preferred appliance 6

Project Timeline FY1 AprilMayJuneJulyAugSeptOctNov Installation, configuration & return of Sourcefire appliances Obtain funds Procurement, project planning Requirements & analysis Closure 7

Appendix 8

Resource Information (SAMPLE) 9

Security, Risk, and Compliance Considerations  HP Tipping Points align with Sony Corp/GSIRT standards for IDS monitoring  Sourcefires will not update for new vulnerabilities once they are end of vendor support so Tipping Point’s will insure SPE against this risk  Tipping Point’s will monitor more of the SPE bandwidth than the Sourcefires  Risk of scope increase as Infosec have requested coverage of the WAN and behind Palo Alto firewalls 10