Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Auditing Computer Systems
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Security Posture Assessment (SPA) Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur,
Network security policy: best practices
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Website Hardening HUIT IT Security | Sep
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Chapter 6 of the Executive Guide manual Technology.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Introduction to Information Security
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet regulatory compliance?
Risk Identification and Risk Assessment
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Cloud Professional Services Cloud Assessment Cloud Migration.
Security and resilience for Smart Hospitals Key findings
Managed IT Solutions More Reliable Networks Are Our Business
CS457 Introduction to Information Security Systems
Securing Information Systems
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Chapter 6: Securing the Cloud
3 Do you monitor for unauthorized intrusion activity?
Cybersecurity - What’s Next? June 2017
Cloud Firewall.
Critical Security Controls
AT&T Premises-Based Firewall Enhanced SBS Solution
Security Standard: “reasonable security”
Data Center Firewall.
Compliance with hardening standards
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Contact Center Security Strategies
Security week 1 Introductions Class website Syllabus review
GRC - A Strategic Approach
Capitalize on Your Business’s Technology
Cloud Computing for Wireless Networks
Presentation transcript:

Security Professional Services

Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services Security Professional Services Product Portfolio Proprietary and Confidential9

The Need for Security Professional Services

What keeps you up at night? How do I Enable the Business? Need to leverage technology in order to make people and business more productive How do I Reduce Costs? Need to reduce IT capital and operating expense in order to increase overall profitability How do I Manage Risk? Need to ensure enterprise data is secure from internal and external threats and plan for any business disruption

Typical Business IT Security Challenges  How can I ensure my business assets are secure?  How do I know if my network defenses can be breached?  How is my current security program performing?  Do we have the appropriate security measures in place?  Are my security policies up to date?

Security Statistics Point to Managed Services “In 2010, security researchers uncovered close to 100,000 new malware samples per day – more than one per second! More alarming; most organizations are not prepared or staffed to handle these new and numerous threats.” – Emerging Cyber Threats Report 2011, GTISC “Approximately 80% of small businesses that experience a data breach go bankrupt or suffer severe financial losses within two years of a security breach.” – Small Business Computing Magazine “71% of security breaches are perpetrated by authorized users” Security related image FBI Computer Crime Study

Why do you need Security Professional Services from EarthLink Business?

Security Professional Service Needs Concerns about employee security awareness Public facing IT infrastructure (Internet facing) Limited staffing with no time for patches and updates Governed by compliance or government regulations Stores confidential customer information Remote and mobile workers Concerned about secure web application access and general browsing EarthLink Security Solutions

When was the last time you conducted an independent, 3 rd party Vulnerability Assessment? Vulnerability Assessment Needs Ensuring your mission critical IT infrastructure is safe from internal and external security threats Never or more than 6 months ago: Then you are potentially vulnerable to external security threats. An expert, independent, 3 rd party assessment will give you peace-of-mind that your business is protected. Are you confident that you are protected against new threats from the Internet?

Are you constantly making internal and external changes to your IT environment? IT Security Assessment Needs Ensuring your mission critical IT infrastructure is safe from internal and external security threats IT environment changes introduce risk and if not properly assessed, risk can turn into exposure. EarthLink can perform compliance gap assessments to identify IT process gaps in customer IT environments Are you regulated by HIPPA, PCI or any other compliance requirements?

Firewall Migration Needs EarthLink can install and configure a firewall for customers under the following scenarios Customers migrating their firewall protection from: Another Service Provider Change in Equipment Manufacturer New solution architecture Customers migrating their firewall protection from: Another Service Provider Change in Equipment Manufacturer New solution architecture

Any professional security service not outlined as a standard EarthLink product. Items may include forensics and data recovery, security awareness training, operational and compliance assessments and disaster recovery planning. Custom Professional Security Needs EarthLink has experts to address your enterprise security needs

Features & Benefits

Identify known network, operating system, web application and web server exploits or vulnerabilities with the use of automated tools. External vulnerability scans give customers an overall picture of the vulnerabilities present on their external network and assist in vulnerability risk management. 14 Vulnerability Assessment An objective, qualified and certified 3rd party examines customer networks from the “outside” to identify security vulnerabilities posed by: Improperly configured servers Open server ports that are not needed for specific business purposes Services running on servers that are not needed for specific business purposes Website code that can be exploited for malicious purposes Recommendations are presented to eliminate or mitigate the identified security risks.

Evaluate organizations security framework against common industry standards as well as other companies of similar size, industry and geography. Overall assessment helps organizations reduce risk exposure, protect information assets and limit the impact of security-related events on business activity. 15 IT Security Assessment Evaluates 13 priority information security risk areas Physical Security File Backup & Recovery Logical Security End Point Security Servers & PCs Wireless Network Security Network Infrastructure AV, Spyware, Spam Security Policies, Procedures, Practices Social Engineering Internal Network Vulnerabilities Software Security External Network Vulnerabilities Consultant driven utilizing EarthLink partners Assessment identifies gaps for potential upsell of IT services

Professional services led firewall migrations from customer equipment to EarthLink Managed Premises firewall or Hosted Network Security solutions. 16 Firewall Migration Service 4 Migration Categories Re-architecture Migration Customer premise firewall migration to any EarthLink standard firewall product Provider Migration Third party network, data center or premise firewall migration to any EarthLink standard firewall product Vendor Migration SonicWALL, Juniper, Cisco, CheckPoint, and others to EarthLink’s premise based firewall product (Fortinet) Security Appliance Migration Migrating individual UTM components to a single firewall managed by EarthLink

EarthLink professional security services, including: forensics and data recovery, security awareness training, operational and compliance assessments and disaster recovery planning. 17 Custom Professional Security Services Some Benefits of IT Security Professional Services Enables customers to proactively address security issues before they impact business. Provides a business grounded plan to improve overall security Identifies the potential impact of both internal and external vulnerabilities. Helps to meet regulatory compliance requirements

Peace of Mind Minimize risk and protect your business’s mission-critical information. Save Money Lower operational costs and upfront capital expense associated with managing, monitoring and securing your infrastructure. Make your Life Easier Comply with government and industry regulations though proactive security monitoring, documented security policies and procedures. Security Professional Services Benefits

Delivers Value to Your Business Protecting your mission-critical data Reducing IT expenses Increasing productivity Ensuring compliance EarthLink Security Professional Services