Presentation is loading. Please wait.

Presentation is loading. Please wait.

S O U R C E T E K I T MANAGED SECURITY SERVICES | SECURITY OPERATIONS CENTER (SOC)

Similar presentations


Presentation on theme: "S O U R C E T E K I T MANAGED SECURITY SERVICES | SECURITY OPERATIONS CENTER (SOC)"— Presentation transcript:

1 S O U R C E T E K I T MANAGED SECURITY SERVICES | SECURITY OPERATIONS CENTER (SOC)

2 Agenda About Us Target sector and their Challenges Solution Offering
Service portfolio, Global Presence & Our Team Target sector and their Challenges Customers to target Solution Offering Showcasing our SOC-as-a-Service Next Steps What can you sell and how? SOURCETEKIT

3 About SourcetekIT MANAGED SECURITY SERVICES PROVIDER

4 WHO WE ARE Founded in 2009 SourcetekIT is a Professional & Managed Services organization, equipped with best breed of security tools and professional resources for incident response.   As an experienced IT Service Provider, our unique offerings allow our clients to tap into our in-depth knowledge and expertise within any given engagement. Our Professional Security Services Organization is made up of over 16 CCIEs and Certified Ethical Hackers, whose specialties & certifications span the IT spectrum. SourcetekIT SOC is the only Canadian government approved Security Operations Center in Canada We provide an end to end managed network security service solution. Rajiv Jolly CEO 4 SOURCETEKIT

5 CANADA | USA | INDIA | BRAZIL
GLOBAL PRESENCE CANADA | USA | INDIA | BRAZIL Developed & Emerging markets As a leading global Managed Services Provider we are committed to being at the forefront of technology and innovation, delivering superior capability in tandem with maximized cost efficiencies. With offices in Canada, USA, India & Brazil, serving customers across North America & Asia Pacific and having completed projects in many locations around the world, we have the global presence and experience necessary to help you capitalize on opportunities in developed and emerging markets. CANADA USA BRAZIL INDIA

6 WHAT WE DO Managed network operations center (noc)
Managing customer’s Network Infrastructure through a dedicated NOC in Toronto Managed security operations center (soc) Protecting customer’s network from security incidents and taking mitigating actions from a dedicated SOC in Toronto Internet of things operations center (ioc) From IP cameras to temperature sensors and anything that has an IP can be monitored from a dedicated IOC in Toronto Professional services With a team of 16 CCIEs ranging from Data Center to Routing and switching, our professional services cover the complete spectrum.

7 SECURITY SERVICES

8 CYBER ATTACK STATISTICS
Cyber attacks extracts 15-20% of the $3 trillion global internet economy, and Canada loses 0.17% of GDP to cybercrime, which is equal to $3.12 billion/year Costs Breach Canadian organizations are attacked in varying degrees of severity more than 450 times per year, with 87% suffering at least one successful breach Resources One-third of smaller organizations believe they don't have enough resources to effectively defend against attacks. Recovery The average company spends $3.7 million in direct and indirect costs to recover from security breaches. Hackers on the network The average number of days a hacker sits on a network is as high as 140 days

9 DO YOU KNOW 80% of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords 85% of businesses with <1000 employees have been hacked, and most don’t even know 4.2 BILLION account credentials and 85 MILLION stolen PII records (drivers license, SSN, DOB, etc.) for sale on the Dark Web

10 Why are we here Managing and strengthening security and privacy for the organizations' systems and data is now a top priority across all industries. Not only are security breaches costly and damaging, those businesses in regulated industries find it a challenge to ensure that they are compliant with all applicable regulations. Lack of Security resource SMBs to Blue Chips Biggest Challenges Multiple Vendors Ransomware Evolution IOT Threats

11 Solution Offering SHOWCASING OUR SECURITY SOLUTIONS

12 SourcetekIT Security Operations Center
Only government approved SOC Creation of Controls, Policies and their implementation as part of the solution Under SourcetekIT SOC, end-customers become Cyber Essentials Certified Detailed reporting of breaches with Cyber forensics evidence. Detect | Protect | Cyber Forensics | Cyber Essentials

13 MANAGED SECURITY OPERATIONS CENTER
SOURCETEKIT SOC MANAGED SECURITY OPERATIONS CENTER

14 SourcetekIT SOC – Deployment
Step 1: Deploy light-weight sensors in the end-customer’s environment Deployment of a cloud or Virtual sensor in your end-customer’s cloud or on-premise environments Cloud sensors In Public Cloud environments Virtual sensors In Physical and Virtual On-premises Cloud environments The sensors natively monitor AWS and Azure cloud. For on-premises virtual sensors run on VMware and Microsoft Hyper-V to monitor the physical and virtual IT infrastructure

15 SourcetekIT SOC – Deployment
Asset Discovery & Inventory Vulnerability Assessment Step 2: Scan the environment for assets and vulnerabilities Once the sensors are deployed, the scans to discover assets and vulnerabilities identification are launched

16 SourcetekIT SOC – Deployment
Step 3: Monitor for threats and Malicious behavior We monitor the cloud and/or on-premises network infrastructure through various trends and alarms that accelerate threat detection and incident response activities across the critical infrastructure Cloud Intrusion Detection (IDS) Host Intrusion Detection (HIDS) Network Intrusion Detection (NIDS)

17 SourcetekIT SOC – Deployment
SIEM event correlation Log Storage Step 4: Log data stored for analysis SourcetekIT stores Log data from the end-customer’s cloud and on-premises environments and can generate compliance-ready custom report views* Behavioral monitoring *Compliance reports are out of scope and will be charged per compliance review like HIPAA, PCI, ISO & GDPR

18 SourcetekIT SOC – Deployment
Security Analytics Step 5: Take action to defend against emerging threats* Our incident response team takes actions based on the threat data analysis Incident Investigation Security Orchestration Open Threat Exchange *Incident response is out of scope and will be charged per response

19 SECURITY DASHBOARDS Asset Discovery: This window showcases details of all the devices connected on the network with

20 SECURITY DASHBOARDS Behavioral Monitoring: Identify suspicious behavior, user activities and potentially compromised systems

21 SECURITY DASHBOARDS Intrusion detection: Detect and respond to threats faster with built-in host, network and cloud intrusion detection technologies

22 SECURITY DASHBOARDS Vulnerability Assessment: Identify vulnerabilities on your assets to avoid exploitation and compromise

23 SECURITY DASHBOARDS SIEM & Log Management: Correlate, analyze and securely store security event data from across your environments

24 Competitive Landscape
SIEM & Log Management › Event correlation › Log management Small Players Module 1: SIEM & Log Management › Event correlation › Log management › Incident response* › Integrated threat intelligence* › Security Team and the Open Threat Exchange® (OTX™)* Module 2: Asset Discovery › API-powered asset discovery › Network asset discovery › Software and services discovery Module 3: Vulnerability Assessment › Network vulnerability scanning › Cloud vulnerability scanning › Cloud infrastructure assessment Module 4: Intrusion Detection › Network Intrusion Detection (NIDS) › Cloud Intrusion Detection Module 5: Endpoint Detection and Response › Host-based Intrusion Detection (HIDS) › File integrity monitoring › Continuous endpoint monitoring & proactive querying Module 6: Behavioral Monitoring › Asset access logs › Cloud access and activity logs (Azure Monitor, AWS: CloudTrail, CloudWatch, S3, ELB) › AWS VPC Flow monitoring › VMware ESXi access logs SourcetekIT High pricing Complex agreements Long-term commitments No flexibility Hidden costs for feature sets Separate Cost per module No Customization Big Players

25 CYBER ESSENTIALS CERTIFIED MANAGED SOC
WHY CERTIFIED SOC Cyber Essentials Canada is the only government-developed and government-backed cybersecurity certification program. Collaboratively we help you address risk by providing fully managed and accredited approach to essential security practices. We also serve as a competitive differentiator for Canadian Companies SOC Threats continue to evolve; your security posture must too. SourcetekIT Managed SOC is designed to wrap experienced people and efficient processes around leading technologies to provide a business-focused SOC that will evolve with your organization’s needs and the changing threat landscape. Cyber Essentials Canada is a certification standard that helps protect businesses from over 80 percent of common internet threats.

26 SourcetekIT’s Edge only Canadian government certified soc: SourcetekIT‘s provides the only Canadian government-backed network and security operation center in Canada. Once implemented your company is entitled to receive Cyber Essential Canadian certification. QUALITY OF SERVICE: SourcetekIT‘s service architecture is designed to isolate and prevent any issues affecting one of your end-customers to affect the quality of service (QoS) delivered to the rest of your end-customers. DEPLOYMENT FLEXIBILITY: SourcetekIT’s SOC gives your partners the ability to offer their end-customers the right-sized solution they need for their environment and budget. EASE OF USE: SourcetekIT’s efficient monitoring of all security activities across your end-customers’ environments enables quick turn around time for investigation and response. DATA MANAGEMENT:  Each end-customer’s data is stored in its own dedicated container, completely isolated from other end-customers’ data which ensures that all customers’ data is kept separate and leak-proof. DATA PRIVACY & COMPLIANCE: SourcetekIT’s SOC solution has been attested as compliant to PCI DSS, SOC 2, NIST and HIPAA, giving you confidence in SourcetekIT’s ability to secure the confidentiality, integrity, and availability of your end-customers’ data.

27 Thank you sales@sourcetekit.com +1(844) 818-4646
Renowned for its expertise in Managed NOC, SOC and Infrastructure management, SourcetekIT is a Professional Services’ company specializing in large-scale urban infrastructure engagements +1(844) 365 Healey Rd, Bolton, ON L7E 5C1, Canada SOURCETEKIT


Download ppt "S O U R C E T E K I T MANAGED SECURITY SERVICES | SECURITY OPERATIONS CENTER (SOC)"

Similar presentations


Ads by Google