We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMeredith Underwood
Modified over 4 years ago
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security Solutions Overview
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. The security problem of today’s environment 2 Changing Business ModelsEvolving Threat LandscapeComplexity and Fragmentation
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 3 "Digital business – characterized by cloud, social, analytics, mobility and IoT - is an unstoppable and irresistible catalyst for change; change that will affect the fundamental foundations and baseline assumptions of every business…creating significant security implications.” -- Gartner, 2014
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 4 *Available in Latam and EMEA today Managed and Professional Services Private Line, Wavelength and Ethernet Transport MPLS VPN and VPLS Solutions Dark Fiber and Managed Fiber Managed Network Services Cloud Connectivity Data Centers Managed Hosting Services* DATA NETWORKS Internet Services Vyvx ® Solutions Content Delivery Network (CDN) CONTENT DISTRIBUTION Voice Contact Center Unified Communications and Collaboration Audio, Video and Web conferencing services VOICE AND UC&C Managed Security: (MFW, IDS/IPS, Web Filtering, DLP, Incident Response) DDoS Mitigation Secure Access Security Consulting Threat Analytics Log Management SIEM SECURITY WAN Optimization Website Acceleration APPLICATION PERFORMANCE Security is a critical component of our comprehensive portfolio
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center (SOC) 5 Responsible for Securing Our Global IP Network 24 x 7 x 365 support, providing always on monitoring and management Provide managed security solutions backed by our people, systems and data The same team charged with protecting Level 3’s global infrastructure will be monitoring and managing your security solutions Our network and visibility into threats provides our security team with exceptional data – we leverage this information to protect your assets 20,000+ ENTERPRISE CUSTOMERS 120,000 NETWORK ELEMENTS 140,000 ROUTE MILES
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 Security Operations Center 6 Provided With Exceptional Visibility In To A Dynamic Threat Environment 350,000 Alerts Per Day 1000 Command and Control Servers 1+ Million Malicious Packets Per Day 1.7+ Million Infected Machines with proprietary threat intelligence systems 36+ Billion Netflow Sessions Per Day 40 % OF THREATS DETECTED WERE PREVIOUSLY UNKNOWN
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Accelerate Organic Growth: Secure all Network customers Differentiate Level 3 ℠ Security Solutions Focus on Cloud-based Services Expand Addressable Market Level 3 Security Strategy 7 Increase attach-rate of Managed Security Services to Network sales through targeted marketing Extend Level 3’s unique threat intelligence to our customers, enabling informed security decisions and more control Enable customers to migrate to more scalable Security solutions, with less operational impact and robust protection by Level 3 Serve more customers through new products and geographic expansion Enabling enterprises to address increasingly complex Security challenges through network and cloud based security solutions
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Protecting the Networked World Secure Connectivity –Locking down network and Internet connections –Securing remote access Secure Cloud –Extending border security to include cloud –Threat mitigation Secure Mobility –Maintain secure connectivity and productivity on the move –Protecting employee BYO Device Secure Web –Safeguard online business –Content encryption, authentication, SSL Security Consulting –Risk analysis, compliance audit readiness Security Operations Center –24 x 7 monitoring and mitigation by experts 8 Cyber attacks on the Enterprise are occurring on multiple fronts. A holistic, multi- layered approach is needed to manage risk to brand and intellectual property
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Level 3 SM Cloud Security Solutions 9 Advanced SOC: 24 x 7 SOC that can cost effectively monitor, track and mitigate threats, utilizing the expertise and knowledge gained from protecting Level 3’s global network/infrastructure Unmatched Attack Traffic Visibility: A global network backbone with visibility in to attack traffic and advancing threats (IP, DNS, CDN) Comprehensive Internal And External Security: global security provider responsible for securing both your network and cloud based infrastructures, providing physical (network), logical (IP) and content security Proactive Versus Passive Mitigation: Ability to be more proactive, using our data and analytics to see threats forming while taking proactive measures ahead of an attack or more quickly mitigating an attack if/when one does occur with our visibility, control and data What Makes Level 3 Unique?
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 10
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
December 2010 Partner Support Service Overview. © 2010 Cisco Systems, Inc. All rights reserved. 2 Agenda Collaborative Services, Customer Response Collaborative.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
The Most Analytical and Comprehensive Defense Network in a Box.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
(Geneva, Switzerland, September 2014)
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Website Hardening HUIT IT Security | Sep
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are service.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Dell Connected Security Solutions Simplify & unify.
© 2020 SlidePlayer.com Inc. All rights reserved.