Centralized Logging and Reporting for Managed Security Services Providers.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
BalaBit Shell Control Box
Which server is right for you? Get in Contact with us
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
ACER CONFIDENTIAL Acer Chromebooks for Education.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Citrix Partner Update The Citrix Delivery Centre.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Unified Threat Management Cyberoam End Point Data.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
by Evolve IP Managed Services
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
Dell Connected Security Solutions Simplify & unify.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Vantage Report 3.0 Product Sales Guide
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Microsoft Management Seminar Series SMS 2003 Change Management.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
Introduction TO Network Administration
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
© Copyright 2012 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Intelligent Logging & Reporting
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Kaspersky Small Office Security INTRODUCING New for 2014!
Maintaining and Updating Windows Server 2008 Lesson 8.
Centralized Logging and Reporting for Enterprises.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Web Content Security Unlock the Power of the Web
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Barracuda Web Security Flex
Barracuda Web Filtering Service
AT&T Premises-Based Firewall Enhanced SBS Solution
Using Internet Layer 8 Reporting
Securing the Network Perimeter with ISA 2004
Active Cyber Security, OnDemand
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Getting Started with LANGuardian
BOMGAR REMOTE SUPPORT Karl Lankford
Infrastructure, Data Center & Managed Services
© 2011 ZOHO Corp. All Rights Reserved
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
A 5-minute overview of ADAudit Plus
Microsoft Data Insights Summit
Presentation transcript:

Centralized Logging and Reporting for Managed Security Services Providers

Office Apps IM Collaboration Apps VoIP Enterprise Apps Web Apps POS Increasing number of employees Partners & Suppliers Customers Organization’s Network Users Applications Devices Increasing mobile workforce Evolving Enterprise Networks More Windows of Vulnerabilities More Data being Generated Increasing Network Complexity

Malicious insiders Unintended actions by insiders Increasing external attacks New vulnerabilities Changing Threat Landscape

Challenge faced by IT managers

Distributed security deployment across Customers Managed Security Ltd HQ, SC, USA John, SOC manager Managed Security Ltd RISE HIGH SCHOOL LIFE PHARMA UNIVERSAL ENGINEERING PROFIT BANK

MSP Customer # 2 Customer # 3 Customer # 4 Highly time Consuming Complex Higher Operational Costs Customer # 1 Managing a Multitude of Customers and Appliances

IMPOSSIBLE TASK! Going through Logs on Separate devices to identify possible threats Even For SINGLE Customer: Mammoth of logs; Difficult to Identify Threats Network and Security Devices deployed at various customer sites…. Generates lots and lots of logs… Site 3 Site 1 Site 4 John, SOC manager Managed Security Ltd Site 2 For Customer: LIFE PHARMA

Site 3 Site 1 Site 4 Site Threats may go un-noticed!! Mac:Hey John, Mac this side. I am not able to access the internet today. John:Hey Mac. Let me see what is happening. Once in a while someone calls up with a problem; John logs into that specific device, sees the logs and resolves it John:Gotcha Mac. Your problem has been resolved. BUT, John might not have received any calls for a mishap that is later identified after several months Mac, Nw Admin John, SOC manager Managed Security Ltd For Customer: LIFE PHARMA

Site 3 Site 1 Site 4 Site John had to submit a forensic root cause report for the unfortunate attack happened at Life Pharma a week before Threats may go un-noticed!! John, SOC manager Managed Security Ltd This is a humongous task!! and I might run into mistakes!! For Customer: LIFE PHARMA

Challenge: Multiple security devices, Many logs, Shortage of resources Identifying trends /patterns to form story and not just see logs for better decision making Easy to provide Monitoring Services - Viewing reports & logs of all customers at one place Timely attentiveness for EVENTS - Quickly responding to incidents by identifying security attacks and incidents Troubleshoot problems easily; Quick Forensic investigation Identifying unusual activity within the network Generating compliance reports in minutes rather than taking hours

Introducing Cyberoam iView Next Generation Intelligent Logging and Reporting Appliances

Get centralized visibility into distributed networks Servers Firewalls IDP / IPS Switches Routers UTM / NGFW Applications Desktop systems Logs & Events Compliance Management Forensic Analysis Log Management Security Management Identity LoggingReporting

Centralized Logging & Reporting of user and network activities of multiple devices across locations Centralized Visibility Search and Filter through Logs and Bookmark search results for re-use Log Management Comprehensive Reporting; predefined Reports, Customized Reports, Report Scheduling Security Management Inbuilt Compliance Reports - PCI DSS, SOX, GLBA, FISMA, HIPAA Compliance Management Allow Administrative or Viewer rights for individual or group of devices Security Administration Graphical summary and Details of all Network activities with customized Dashboards and Views Forensic Analysis What does CYBEROAM iView offer?

How iView helps John… John deploys Cyberoam’s iView appliance at Managed Security Ltd Managed Security Ltd Life Pharma Rise High School Universal Engineering Internet John, SOC manager Managed Security Ltd iView Next Generation Intelligent Logging and Reporting Appliance Cyberoam Central Console

iView helps with…

Customer-wise Grouping of Security Appliances View Customer specific Dashboard Get centralized visibility into customer networks

Give your customers visibility into network activities with Custom dashboards Traffic Dashboard Security Dashboard Executive Dashboard

1200+ predefined reports

Help customers identify employees consuming most bandwidth

Users accessing P2P Applications Unproductive Web surfing and Users behind it Help customers identify the employees using P2P AND Unproductive Surfing

Top Websites Give information on Web sites and Applications used in customer networks

Top Risky Applications Help customer identify Risky applications used within the network

Visibility into Attacks, attackers and the victims Give visibility on network attacks to customers

Top viruses detected and blocked Give visibility on Virus detected and blocked to customers

Save days of effort with the help of inbuilt compliance reports Help your customers achieve compliance

More Features to meet Customer’s special needs Bookmark reports for later reference Schedule Reports & Get them ed Customer-wise User Access – Only viewer or admin rights can be assigned

Powerful Hardware with Reliable Storage Appliance Features  RAID 5 Technology  Ultra fast Processing with Quad core chips  Hardened OS for security against future attacks and system downtime  Dual and Redundant Power Supply for Higher Availability and Reliability Appliance Benefits  Simplicity in deployment -Turnkey Logging & Reporting Solution -Eliminates need for Technical expertise to set up  Terabytes of storage space – Available upto 16TB -Compliance needs -Long-term reporting/archiving needs in Enterprises  Data Redundancy -Faster data retrieval, event investigation -Storage reliability  Safety of logs, reports in case of disk failure  Reliable support through telephone, chat and -8x5 and 24x7 support -Annual Maintenance Contracts

Features of Cyberoam iView Log Management  Near real-time log retrieval  Archival and Search facility Forensic Analysis  Reconstructing sequence of events in a security breach  Reporting stands in the face of legal scrutiny Compliance Management  Reduces compliance costs  Single click access to reports - Simplified compliance management  Easy visibility into access by users Security Management  iView dashboard – Shows network attacks on single screen  Drill-down reports – 3rd level drill-down for attack details  Identity-based logging and reporting – Pinpoints the user  Reports

Security Benefits  Centralized control  Identifies attacks based on – -Attack Reports (Type of Reports) -Deviation from norm in access or usage of resources  Allows quick investigation and determination of cause of breach Compliance Benefits  Access and Usage logs of -Activity in critical applications, databases -Data transmitted to external entities  Enables setting user identity-based thresholds for acceptable use Productivity Benefits  Shows deviation in resource consumption Financial Benefits  Low capital requirements  Low technical manpower requirements Benefits of Cyberoam iView

Thank You Thank you!