Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.

Similar presentations


Presentation on theme: "Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring."— Presentation transcript:

1 Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring

2 Internet Security Monitoring Security Monitoring and Management Security Control Panel Sensors, Control & Detection Devices

3 Security Management Solutions

4 World-Class eBusiness Protection Assess > Design > Deploy > Manage > Educate CONSULTING & EDUCATION SERVICES Internet Scanner Internet Scanner System Scanner System Scanner Database Scanner Database Scanner Security Assessment/ Policy Enforcement RealSecure Network SensorRealSecure Network Sensor RealSecure OS/Server SensorRealSecure OS/Server Sensor RealSecure Manager for HPOVRealSecure Manager for HPOV RealSecure Manager for TivoliRealSecure Manager for Tivoli RealSecure Network ApplianceRealSecure Network Appliance Intrusion Detection FWA/VOSVPN PKIRTRAUTHDBMSNOSSSL IT INFRASTRUCTURE TCP/IP KNOWLEDGE SERVICES X-Force - SAVANT - Advisory Services In Development ANALYSISMANAGEMENT & CONTROLPLANNING Security Management Applications Policy Definition Decisions Event Management Fix Management Incident Response Fix Management Incident Response SAFEsuite MSP

5 Security Mgt. Vulnerability Sensors IRM corrective action report Vulnerability: Severity: IP Address: OS: Fix: GetAdmin High Risk 215.011.200.255 Windows NT 4.0 From the Start menu, choose Programs/Administrative Tools/User Manager. Under Policies/User Rights, check the users who have admin privileges on that host. Stronger action may be needed, such as reinstalling the operating system from CD. Consider this host compromised, as well as any passwords from any other users on this host. In addition, Apply the post-SP3 getadmin patch, or SP4 when available. Also refer to Microsoft Knowledge Base Article Q146965.txt.

6 Security Mgt. Threat Sensors Manager EMAIL ALERT/ LOG ATTACK DETECTED RECORD SESSION TERMINATED RECONFIGURE FIREWALL/ ROUTER I NTERNAL ATTACK DETECTED SESSION LOGGED IRM Agent Engine

7 Enterprise Security Management Vulnerability DataThreat Data Firewall/Router Logs Internal Threats Vulnerabilities External Threats Time Enterprise Security Risk Profile

8 The “Self-Managing” Network Threat Status FileEditViewAction Threat Status - Enterprise View North American Operations European Operations Pac/Asia Operations DMZ E-Commerce Zone Intranet - Executive Intranet - Mgt Supply Chain - Vendors Supply Chain - Clients Extranet - Clients Extranet - Partners FileEditViewAction Threat Status - European Operations Supply Chain - Vendors FileEditViewAction Threat Status - Detail Problem Analysis/Resolution Problem AnalysisProblem Resolution X Server - Phoenix Red Button attack detected Vulnerability confirmed Sys Admin alerted Corrective action requested Session Terminated Firewall Reconfigured Vulnerability corrected Policy Updated X X X X X X X

9 for Managed Security Providers

10 SAFEsuite MSP: World-Class Managed Security PlatformFWA/VOSVPN PKIRTRAUTHDBMSNOSSSL IT INFRASTRUCTURE TCP/IP Assess > Design > Deploy > Manage > Educate CONSULTING & EDUCATION SERVICES KNOWLEDGE SERVICES X-Force - SAVANT - Advisory Services Internet Scanner Internet Scanner Security Assessment/ Policy Enforcement RealSecure Network SensorRealSecure Network Sensor RealSecure OS/Server SensorRealSecure OS/Server Sensor RealSecure Network ApplianceRealSecure Network Appliance Intrusion Detection Managed Service Provider Applications Firewall Management VPN Management Intrusion Detection Management Anti-Virus Management Firewall Management VPN Management Intrusion Detection Management Anti-Virus Management Remote Security Assessment Strong Authentication Router Management Site Blocking/URL Filtering Remote Security Assessment Strong Authentication Router Management Site Blocking/URL Filtering

11 SAFEsuite MSP “Powered by ISS”

12 Proprietary Knowledge “Independent Trusted Advisor” Dedicated team of security research engineers Proprietary security knowledge base Continuous product updates Industry’s largest online security “community” Security advisory services

13 The Benefits of SAFEsuite/ePatrol Enables E-Business applications Increased application availability and reliability –Increased E-Business revenues –Increased customer satisfaction Increased data integrity and confidentiality –Lower IT management costs –Increased employee productivity –Lower legal liability Integrates and controls all components of heterogeneous enterprise security

14 ISS Customers and Strategic Partners

15 Partnerships MANAGED SECURITY PARTNERS E-BUSINESS PARTNERS

16 ISS Customers 21 out of 25 top U.S. banking institutions The 10 top U.S. telecommunications companies Over 35 government agencies

17 ISS Market Share Source: International Data Corporation (IDC), August 1999 Network Vulnerability Assessment Market Network Intrusion Detection Market Network Intrusion Detection & Assessment Market

18 Thank You!


Download ppt "Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring."

Similar presentations


Ads by Google