Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.

Similar presentations


Presentation on theme: "Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business."— Presentation transcript:

1 Managed Security Monitoring

2 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 The top 4 issues are security-related 0%10%40%30%20% Protecting highly sensitive data (e.g. client data, financial information) from specifically targeted attacks Preventing IT security breaches Data protection Ensuring continuity of service for business-critical systems (e.g. preventing DDoS attacks) Understanding the full range of new technologies that are available and how to use them Managing change in IT systems and infrastructure Ensuring IT systems are used fully to maximize the return on investment (ROI) of IT Making decisions about future IT investments Dealing with cost restraints Planning for and recovering from failure or destruction of IT infrastructure

3 3 ©2015 EarthLink. All rights reserved. Growth in reported cyber-security incidents in 2014, with approximately 117,339 attacks per day. Total financial losses attributed to security compromises increased 34% over 2013. 1 Percentage of organizations that will experience a data breach of at least 10,000 customer records in the next 24 months 2 These headlines are all-too common… Sources: 1.CIO, CSO &PWC, 2014 2.IBM/Ponemon Institute, 2014 3.NY Times 4.IBM X-Force Threat Intelligence Quarterly 2014 5.KrebsOnSecurity.com 6.CNN Dec. 2013 Jan. 2014 Apr. 2014 Sept. 2014 Sept. 2014 Target hacked for info on more than 100M customers 3 Michaels Stores loses data on 100M customers 3 Heartbleed vulnerability in Open SSL publicly disclosed; left more than 2M servers vulnerable to unencrypted data leaks 4 Home Depot announces data breach; 54M credit cards were breached 5 Apple iCloud accounts hacked for celebrity photos 6 48%22%

4 4 ©2015 EarthLink. All rights reserved. Perception of risk often lags reality. Q: How many new malicious malware programs emerge on a daily basis? Percentage of IT Survey Respondents A: On average, 315,000 new variants of malicious malware programs are detected daily. Source: IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 Only 4% of recent survey respondents knew magnitude of security threats

5 5 ©2015 EarthLink. All rights reserved. Common vulnerabilities for retailers:  43% Internal Operational Information  31% Customer Information  22% Financial Information  22% HR/Personnel Information Top Data Types Lost Source: 2014 Data Breach Investigations Report, Verizon 2014; IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014

6 6 ©2015 EarthLink. All rights reserved. Your challenge: attacks are becoming more frequent and your organization is looking to you for answers Costly and embarrassing network security breaches are constantly in the news and increasing in frequency. All eyes are on IT and security leaders to develop and deploy the right solution. You need to: – Have systems in place to understand your security risks – Guard against threats – Be prepared to react quickly to isolate threats as soon as they appear If you can’t respond quickly enough, your exposure grows as more customers are impacted and your brand image is damaged. Percentage of companies experiencing a cybersecurity incident in last 12 months 1 Sources: 1.IT Security Risks 2014: A Business Approach to Managing Data Security Threats, Kaspersky Lab 2014 2.Trustwave, 2014 3.2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute, 2014 $5.85 Million 134 94% Did you know? Mean time between an initial malicious attack until a resulting breach is detected 2 Average cost of data breach in U.S. 3

7 7 ©2015 EarthLink. All rights reserved. Your path forward: find and stop threats before they can do damage EarthLink’s Managed Security Monitoring offers a 24x7 Security Operations Center to monitor your Point of Sale (POS) endpoints, routers, servers, network equipment and more to alert you of suspicious security events according to your customized escalation procedures. Vulnerability identification and remediation services (available with Gold and Platinum packages) allow you to take proactive action to reduce risk. By partnering with EarthLink, you can be confident your IT assets and network are being monitored—and your brand protected—at every point.

8 8 ©2015 EarthLink. All rights reserved. Managed Security Monitoring 1.EarthLink collects customer log data from customer environment. 2.This data is sent to EarthLink's security systems (SIEM) for analysis. 3.EarthLink uses automated analytics to identify suspicious activity within the log data. 4.An EarthLink security analyst reviews suspicious activity, alerts the customer and collaborate on security event remediation. 5.EarthLink will work to proactively identify software vulnerabilities (Gold and Platinum only) and proactively apply software patches (Platinum level only). How it works: Secure SSL Connection (MPLS/IPSec) Customer EarthLink Store 1 POS x 6 Store 2 POS x 6 Store 3 POS x 6 Store 5 POS x 4 Store 4 POS x 4 Security Event Collector/ Vulnerability Scanner Security Tools Security Operations Team Infrastructure Management Team 1 2 3 45

9 9 ©2015 EarthLink. All rights reserved. Managed Security Monitoring Service Levels SilverGoldPlatinum Security Event Monitoring SLA 1x/day review and escalation 24x7 (1 hour review and escalation) Vulnerability Identification NoYes Vulnerability Remediation* No Yes *Includes EarthLink Unified Endpoint Management & Security or Server Management

10 10 ©2015 EarthLink. All rights reserved. EarthLink Managed Security Monitoring helps you: Constantly monitor your network and actively protect from breach attempts Identify, manage and remediate network, server or mobile device threats before they result in a security incident Keep your business and customer information safe and your brand protected Identify and prevent security vulnerabilities

11 11 ©2015 EarthLink. All rights reserved. Managed Security Monitoring Use Case Hacker targets a third party contractor 1 Hacker gains access to retailer’s network using stolen credentials 2 Contractor Portal Hacker infects retailer’s internal server 3a Hacker infects retailer’s POS systems with malware 3b Customer CC stripe data captured by malware at POS 4 Stolen data sent to retailer’s compromised internal server 5 Stolen data uploaded to hacker’s server and retrieved 6 Firewall Retailer Windows file servers Retailer POS systems Hacker FTP servers (external) Anatomy of a Data Breach: Managed Security Monitoring can detect threats at critical points in your IT ecosystem

12 12 Why EarthLink? Our proprietary security intelligence tools protect over 1 million customers and block over 200 million threats each day. EarthLink’s Managed Security Monitoring tracks real-time threats using the latest intelligence data that identifies threats to your network, servers and endpoints. Our 24x7 Security Operations Center is staffed by dedicated, trained and credentialed security experts. We maintain one of the most comprehensive threat catalogs in the world, containing over 1.2 billion attack vectors. Each day over 200,000 new threats are added to the catalog. Managed Security Monitoring


Download ppt "Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business."

Similar presentations


Ads by Google