Download presentation
Presentation is loading. Please wait.
Published byMeredith Underwood Modified over 9 years ago
1
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security Solutions Overview
2
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. The security problem of today’s environment 2 Changing Business ModelsEvolving Threat LandscapeComplexity and Fragmentation
3
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 3 "Digital business – characterized by cloud, social, analytics, mobility and IoT - is an unstoppable and irresistible catalyst for change; change that will affect the fundamental foundations and baseline assumptions of every business…creating significant security implications.” -- Gartner, 2014
4
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 4 *Available in Latam and EMEA today Managed and Professional Services Private Line, Wavelength and Ethernet Transport MPLS VPN and VPLS Solutions Dark Fiber and Managed Fiber Managed Network Services Cloud Connectivity Data Centers Managed Hosting Services* DATA NETWORKS Internet Services Vyvx ® Solutions Content Delivery Network (CDN) CONTENT DISTRIBUTION Voice Contact Center Unified Communications and Collaboration Audio, Video and Web conferencing services VOICE AND UC&C Managed Security: (MFW, IDS/IPS, Web Filtering, DLP, Incident Response) DDoS Mitigation Secure Access Security Consulting Threat Analytics Log Management SIEM SECURITY WAN Optimization Website Acceleration APPLICATION PERFORMANCE Security is a critical component of our comprehensive portfolio
5
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center (SOC) 5 Responsible for Securing Our Global IP Network 24 x 7 x 365 support, providing always on monitoring and management Provide managed security solutions backed by our people, systems and data The same team charged with protecting Level 3’s global infrastructure will be monitoring and managing your security solutions Our network and visibility into threats provides our security team with exceptional data – we leverage this information to protect your assets 20,000+ ENTERPRISE CUSTOMERS 120,000 NETWORK ELEMENTS 140,000 ROUTE MILES
6
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center 6 Provided With Exceptional Visibility In To A Dynamic Threat Environment 350,000 Alerts Per Day 1000 Command and Control Servers 1+ Million Malicious Packets Per Day 1.7+ Million Infected Machines with proprietary threat intelligence systems 36+ Billion Netflow Sessions Per Day 40 % OF THREATS DETECTED WERE PREVIOUSLY UNKNOWN
7
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Accelerate Organic Growth: Secure all Network customers Differentiate Level 3 ℠ Security Solutions Focus on Cloud-based Services Expand Addressable Market Level 3 Security Strategy 7 Increase attach-rate of Managed Security Services to Network sales through targeted marketing Extend Level 3’s unique threat intelligence to our customers, enabling informed security decisions and more control Enable customers to migrate to more scalable Security solutions, with less operational impact and robust protection by Level 3 Serve more customers through new products and geographic expansion Enabling enterprises to address increasingly complex Security challenges through network and cloud based security solutions
8
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Protecting the Networked World Secure Connectivity –Locking down network and Internet connections –Securing remote access Secure Cloud –Extending border security to include cloud –Threat mitigation Secure Mobility –Maintain secure connectivity and productivity on the move –Protecting employee BYO Device Secure Web –Safeguard online business –Content encryption, authentication, SSL Security Consulting –Risk analysis, compliance audit readiness Security Operations Center –24 x 7 monitoring and mitigation by experts 8 Cyber attacks on the Enterprise are occurring on multiple fronts. A holistic, multi- layered approach is needed to manage risk to brand and intellectual property
9
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 SM Cloud Security Solutions 9 Advanced SOC: 24 x 7 SOC that can cost effectively monitor, track and mitigate threats, utilizing the expertise and knowledge gained from protecting Level 3’s global network/infrastructure Unmatched Attack Traffic Visibility: A global network backbone with visibility in to attack traffic and advancing threats (IP, DNS, CDN) Comprehensive Internal And External Security: global security provider responsible for securing both your network and cloud based infrastructures, providing physical (network), logical (IP) and content security Proactive Versus Passive Mitigation: Ability to be more proactive, using our data and analytics to see threats forming while taking proactive measures ahead of an attack or more quickly mitigating an attack if/when one does occur with our visibility, control and data What Makes Level 3 Unique?
10
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 10
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.