agc networks security solutions - cyber-i
TRANSCRIPT
![Page 1: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/1.jpg)
Ver 4.1_Jun16
AGC Networks LimitedCyber Security Overview
Atul Khatavkar
June 2016
![Page 2: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/2.jpg)
Agenda
2
05
04
03
02
01
Case Study
AGC CLIENTELE
GLOBAL SECURITY OPERATIONS CENTRE
AGC PORTFOLIO
CYBER SECURITY OVERVIEW
![Page 3: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/3.jpg)
Internet - The Powerhouse
3
![Page 4: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/4.jpg)
Few of the Reported Breaches
4
Source: http://www.informationisbeautiful.net/
Hackers steal $10 million from a
Ukrainian bank through SWIFT
loophole
![Page 5: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/5.jpg)
AGC Networks Corporate Overview
A Leading Global Information & Communications Technology (ICT) Solutions Provider, combining expertise with Best-in-Class technology
30 Years Of Experience Across 9 geographies
Serving Over 3000 Customers Partnering
with 20+ Technology Leaders
Global HQ : Mumbai, India
US HQ : Dallas, Texas
– the Cyber Security division of
AGC Networks • ISO/IEC 9001 and 27001:2005 certified, SOC2 Type 1
Certified
Our vision is to deliver enterprise innovation, creating clear and measurable success for our customers
5
![Page 6: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/6.jpg)
Customer Organization Imperatives
CFOImperatives
CEOImperatives
CIOImperatives
• Revenue Growth• Superior Customer Service• Business Efficiency
• Risk & Compliance• Cost Reduction• Cash Flows
• Investment Protection• Return on Technology
Investment • Rapid Deployment
1. Profitable Growth
2. Customer Experience
3. Security & Compliance
4. Operational Efficiencies
Key Focus Areas
6
![Page 7: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/7.jpg)
7
Global Customer Footprint
![Page 8: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/8.jpg)
Why Choose AGC Networks?
Experienceo AGC Networks has installed over 1 mn Unified
Communications ports, 500K data ports and 100K video end-points worldwide. This vast experience enables AGC to designthe perfect solution for even the most complex situation
Innovationo AGC Networks is committed to technology innovation. We
deliver solutions across multiple vendors, thereby offering andintegrating vendor-neutral, best-in-class solutions
o Our commitment is illustrated by a $3 mn investment inbuilding AGC’s Mumbai and Dallas-based Customer ExperienceCenters (CEC) - unique facilities showcasing next generationtechnologies in real application settings
8
![Page 9: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/9.jpg)
Exposure of New Cyber Attacks
9
Cybercrime is impacting the global economy significantly
with estimated annual losses of up to $ 575 billion
Cyber attack on Target alone striped banks and credit unions
of $200M
Nearly two-thirds of organizations learn of their
breach from an external source
A typical advanced attack goes unnoticed for nearly eight
months
Attackers are increasingly using outsourced service providers as a means to gain access to their
victims
While organizations have made significant security improvements,
they have yet to keep pace with today’s determined adversaries.
Many still rely on yesterday’s security practices to combat
today’s threats
![Page 10: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/10.jpg)
Technology Solutions
10
![Page 11: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/11.jpg)
Key Features: CYBER-i
Largest and the only “Global Managed Services Partner” ofIntel Security in India
Live Feeds available on Global Threat Intelligence from IntelSecurity
State-of-the-art Global Security Operations Center (G-SoC) inMumbai
Offering advanced services for “0” Day threat defense, activeresponse and integration with all Intel security partners
11
![Page 12: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/12.jpg)
Services Portfolio
12
A team of 65+ qualified, experienced and certified cyber security professionals form the backbone of the services portfolio
![Page 13: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/13.jpg)
Technology Portfolio
13
![Page 14: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/14.jpg)
Managed Security Offerings
Security Incident & Event Monitoring (SIEM)Vulnerability Assessment/Penetration TestingActive Threat Defense- “0” Day ProtectionData Leak PreventionWeb ProxyIntrusion Prevention SystemThreat IntelligenceActive Threat Defense- Anti Virus, Active Response, TIESecurity Device Management
14
CLOUD ON PREMHYBRID
![Page 15: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/15.jpg)
INTEL SECURITY’s MSSP of the Year 2016: CYBER-i
15
![Page 16: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/16.jpg)
Global Threat Intelligence-Intel Security
16
![Page 17: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/17.jpg)
Threat Intelligence- CYBER-i
17
![Page 18: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/18.jpg)
Threat Intelligence-CYBER-i
18
Total Data :
98,818 Malicious IP’s, Domains & URL’s
IP 83,178DOMAIN = 4,321URL = 11,319
Malware = 3,050Scanning Host = 6,134Ransomware = 1,433Phishing = 7,134Spamming = 1,474Malicious Host = 23,124Defacement = 22TOR = 6,933Service Exploitation = 49,514
![Page 19: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/19.jpg)
Business Challenges
A Dynamic Threat Landscape
Need to create Cyber Threat Awareness at the top level
Risk Perception and Mitigation Strategy
Investments – a must!
Technology Obsolesce – a reality!
Multiple Players with heterogeneous technologies and lack of end
to end offerings
Restricted availability of Skilled Manpower
Compliance adherence
19
![Page 20: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/20.jpg)
MSSP - Know your probable attacker
AGC receives data from Intel Security for billions of IPaddresses and network ports, providing hundreds oftrillions of unique views, and calculates a reputationscore based on network traffic, including port,destination, protocol, and inbound and outboundconnection requests. connections. This data helpsknow your probable attacker well in advance
Protects organisations from botnets, distributed denial-of-service (DDoS) attacks, command and control activity,advanced persistent threats, and risky web connections.
Reduces system and network burden by blocking threats atthe network edge.
Decreases downtime and remediation costs associated withnetwork-based attacks.
20
![Page 21: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/21.jpg)
Know What & How the attacker is attempting
Authentication Failed attempt
on this Device
Root user
Credentials triedTime of Incident
21
![Page 22: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/22.jpg)
Spam Email Traffic - Geo-location / Country
22
![Page 23: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/23.jpg)
Understanding the attack
Remote Shell Success connection from External IP’s by Geo location
23
![Page 24: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/24.jpg)
Track, Correlate, End Points Risks
Events with
Virus infected
file
24
![Page 25: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/25.jpg)
Managed Security Offerings
Threat Monitoring & Incident
Response on 24*7 Basis
Vulnerability Management
Forensic Analysis
Advanced Persistent Threats
GRC Management
Security Device Management
Firewall / IDS / IPS/ NGFW / UTM
WAF / DAM Management
25
![Page 26: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/26.jpg)
The Mobile Wallet Engagement
Cyber Threat
Management01
PCI DSS Consulting02
VM & Application
Security
03
Security Solution
Deployment04
30
![Page 27: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/27.jpg)
Cyber Threat Management
27
Traffic from Malicious Sources
Proactively
Blocked
Continuous Support for
Threat Mitigation &Compliance
Management
Global Security Intelligence
Applied to Local Network
CYBER-i Offering benefits
200+ Incidents Identified
![Page 28: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/28.jpg)
PCI DSS Certification
THE MOBILE WALLET’s PCI DSS CERTIFICATION
28
![Page 29: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/29.jpg)
29
Customer Speak
![Page 30: AGC Networks Security Solutions - Cyber-i](https://reader034.vdocuments.mx/reader034/viewer/2022042723/5870fba01a28ab5f528b5b6d/html5/thumbnails/30.jpg)
Let’s Begin!